USENIX Security '23 | URET: Universal Robustness Evaluation Toolkit (for Evasion) | Kevin Eykholt, Taesung Lee, Douglas Schales, Jiyong Jang, Ian Molloy |
USENIX Security '23 | Investigating Verification Behavior and Perceptions of Visual Digital Certificates | Dañiel Gerhardt, Alexander Ponticello, Adrian Dabrowski, Katharina Krombholz |
USENIX Security '23 | The Role of Professional Product Reviewers in Evaluating Security and Privacy | Wentao Guo, Jason Walter, Michelle L. Mazurek |
USENIX Security '23 | We Really Need to Talk About Session Tickets: A Large-Scale Analysis of Cryptographic Dangers with TLS Session Tickets | Sven Hebrok, Simon Nachtigall, Marcel Maehren, Nurullah Erinola, Robert Merget, Juraj Somorovsky, Jörg Schwenk |
USENIX Security '23 | Fourteen Years in the Life: A Root Server’s Perspective on DNS Resolver Security | Alden Hilton, Casey Deccio, Jacob Davis |
USENIX Security '23 | BoKASAN: Binary-only Kernel Address Sanitizer for Effective Kernel Fuzzing | Mingi Cho, Dohyeon An, Hoyong Jin, Taekyoung Kwon |
USENIX Security '23 | KextFuzz: Fuzzing macOS Kernel EXTensions on Apple Silicon via Exploiting Mitigations | Tingting Yin, Zicong Gao, Zhenghang Xiao, Zheyu Ma, Min Zheng, Chao Zhang |
USENIX Security '23 | HOMESPY: The Invisible Sniffer of Infrared Remote Control of Smart TVs | Kong Huang, YuTong Zhou, Ke Zhang, Jiacen Xu, Jiongyi Chen, Di Tang, Kehuan Zhang |
USENIX Security '23 | No more Reviewer #2: Subverting Automatic Paper-Reviewer Assignment using Adversarial Learning | Thorsten Eisenhofer, Erwin Quiring, Jonas Möller, Doreen Riepel, Thorsten Holz, Konrad Rieck |
USENIX Security '23 | Assessing Anonymity Techniques Employed in German Court Decisions: A De-Anonymization Experiment | Dominic Deuber, Michael Keuchen, Nicolas Christin |
USENIX Security '23 | Content-Type: multipart/oracle - Tapping into Format Oracles in Email End-to-End Encryption | Fabian Ising, Damian Poddebniak, Tobias Kappert, Christoph Saatjohann, Sebastian Schinzel |
USENIX Security '23 | PCAT: Functionality and Data Stealing from Split Learning by Pseudo-Client Attack | Xinben Gao, Lan Zhang |
USENIX Security '23 | Guarding Serverless Applications with Kalium | Deepak Sirone Jegan, Liang Wang, Siddhant Bhagat, Michael Swift |
USENIX Security '23 | PatchVerif: Discovering Faulty Patches in Robotic Vehicles | Hyungsub Kim, Muslum Ozgur Ozmen, Z. Berkay Celik, Antonio Bianchi, Dongyan Xu |
USENIX Security '23 | A Research Framework and Initial Study of Browser Security for the Visually Impaired | Elaine Lau, Zachary Peterson |
USENIX Security '23 | X-Adv: Physical Adversarial Object Attacks against X-ray Prohibited Item Detection | Aishan Liu, Jun Guo, Jiakai Wang, Siyuan Liang, Renshuai Tao, Wenbo Zhou, Cong Liu, Xianglong Liu, Dacheng Tao |
USENIX Security '23 | A Data-free Backdoor Injection Approach in Neural Networks | Peizhuo Lv, Chang Yue, Ruigang Liang, Yunfei Yang, Shengzhi Zhang, Hualong Ma, Kai Chen |
USENIX Security '23 | A Large Scale Study of the Ethereum Arbitrage Ecosystem | Robert McLaughlin, Christopher Kruegel, Giovanni Vigna |
USENIX Security '23 | Design of Access Control Mechanisms in Systems-on-Chip with Formal Integrity Guarantees | Dino Mehmedagić, Mohammad Rahmani Fadiheh, Johannes Müller, Anna Lena Duque Antón, Dominik Stoffel, Wolfgang Kunz |
USENIX Security '23 | Eavesdropping Mobile App Activity via Radio-Frequency Energy Harvesting | Tao Ni, Guohao Lan, Jia Wang, Qingchuan Zhao, Weitao Xu |
USENIX Security '23 | Defining "Broken": User Experiences and Remediation Tactics When Ad-Blocking or Tracking-Protection Tools Break a Website’s User Experience | Alexandra Nisenoff, Arthur Borem, Madison Pickering, Grant Nakanishi, Maya Thumpasery, Blase Ur |
USENIX Security '23 | User Awareness and Behaviors Concerning Encrypted DNS Settings in Web Browsers | Alexandra Nisenoff, Ranya Sharma, Nick Feamster |
USENIX Security '23 | ACon^2: Adaptive Conformal Consensus for Provable Blockchain Oracles | Sangdon Park, Osbert Bastani, Taesoo Kim |
USENIX Security '23 | The Blockchain Imitation Game | Kaihua Qin, Stefanos Chaliasos, Liyi Zhou, Benjamin Livshits, Dawn Song, Arthur Gervais |
USENIX Security '23 | ARGUS: Context-Based Detection of Stealthy IoT Infiltration Attacks | Phillip Rieger, Marco Chilese, Reham Mohamed, Markus Miettinen, Hossein Fereidooni, Ahmad-Reza Sadeghi |