USENIX Security '23 | GAP: Differentially Private Graph Neural Networks with Aggregation Perturbation | Sina Sajadmanesh, Ali Shahin Shamsabadi, Aurélien Bellet, Daniel Gatica-Perez |
USENIX Security '23 | Forming Faster Firmware Fuzzers | |
USENIX Security '23 | AIFORE: Smart Fuzzing Based on Automatic Input Format Reverse Engineering | Ji Shi, Zhun Wang, Zhiyao Feng, Yang Lan, Shisong Qin, Wei You, Wei Zou, Mathias Payer, Chao Zhang |
USENIX Security '23 | Hey Kimya, Is My Smart Speaker Spying on Me? Taking Control of Sensor Privacy Through Isolation and Amnesia | Piet De Vaere, Adrian Perrig |
USENIX Security '23 | HECO: Fully Homomorphic Encryption Compiler | Alexander Viand, Patrick Jattke, Miro Haller, Anwar Hithnawi |
USENIX Security '23 | BalanceProofs: Maintainable Vector Commitments with Fast Aggregation | Weijie Wang, Annie Ulichney, Charalampos Papamanthou |
USENIX Security '23 | xNIDS: Explaining Deep Learning-based Network Intrusion Detection Systems for Active Intrusion Responses | Feng Wei, Hongda Li, Ziming Zhao, Hongxin Hu |
USENIX Security '23 | Exorcising "Wraith": Protecting LiDAR-based Object Detector in Automated Driving System from Appearing Attacks | Qifan Xiao, Xudong Pan, Yifan Lu, Mi Zhang, Jiarun Dai, Min Yang |
USENIX Security '23 | Silent Bugs Matter: A Study of Compiler-Introduced Security Bugs | Jianhao Xu, Kangjie Lu, Zhengjie Du, Zhu Ding, Linke Li, Qiushi Wu, Mathias Payer, Bing Mao |
USENIX Security '23 | PROGRAPHER: An Anomaly Detection System based on Provenance Graph Embedding | Fan Yang, Jiacen Xu, Chunlin Xiong, Zhou Li, Kehuan Zhang |
USENIX Security '23 | DDRace: Finding Concurrency UAF Vulnerabilities in Linux Drivers with Directed Fuzzing | |
USENIX Security '23 | Automated Exploitable Heap Layout Generation for Heap Overflows Through Manipulation Distance-Guided Fuzzing | Bin Zhang, Jiongyi Chen, Runhao Li, Chao Feng, Ruilin Li, Chaojing Tang |
USENIX Security '23 | DiffSmooth: Certifiably Robust Learning via Diffusion Models and Local Smoothing | Jiawei Zhang, Zhongzhu Chen, Huan Zhang, Chaowei Xiao, Bo Li |
USENIX Security '23 | It's all in your head(set): Side-channel attacks on AR/VR systems | Yicheng Zhang, Carter Slocum, Jiasi Chen, Nael Abu-Ghazaleh |
USENIX Security '23 | Minimalist: Semi-automated Debloating of PHP Web Applications through Static Analysis | Rasoul Jahanshahi, Babak Amin Azad, Nick Nikiforakis, Manuel Egele |
USENIX Security '23 | Hiding in Plain Sight: An Empirical Study of Web Application Abuse in Malware | Mingxuan Yao, Jonathan Fuller, Ranjita Pai Kasturi, Saumya Agarwal, Amit Kumar Sikder, Brendan Saltaformaggio |
USENIX Security '23 | Bilingual Problems: Studying the Security Risks Incurred by Native Extensions in Scripting Languages | Cristian-Alexandru Staicu, Sazzadur Rahaman, Ágnes Kiss, Michael Backes |
USENIX Security '23 | Did the Shark Eat the Watchdog in the NTP Pool? Deceiving the NTP Pool’s Monitoring System | Jonghoon Kwon, Jeonggyu Song, Junbeom Hur, Adrian Perrig |
USENIX Security '23 | An Efficient Design of Intelligent Network Data Plane | Guangmeng Zhou, Zhuotao Liu, Chuanpu Fu, Qi Li, Ke Xu |
USENIX Security '23 | Fact-Saboteurs: A Taxonomy of Evidence Manipulation Attacks against Fact-Verification Systems | Sahar Abdelnabi, Mario Fritz |
USENIX Security '23 | FABRID: Flexible Attestation-Based Routing for Inter-Domain Networks | Cyrill Krähenbühl, Marc Wyss, David Basin, Vincent Lenders, Adrian Perrig, Martin Strohmeier |
USENIX Security '23 | ARMore: Pushing Love Back Into Binaries | Luca Di Bartolomeo, Hossein Moghaddas, Mathias Payer |
USENIX Security '23 | The Impostor Among US(B): Off-Path Injection Attacks on USB Communications | Robert Dumitru, Daniel Genkin, Andrew Wabnitz, Yuval Yarom |
USENIX Security '23 | FreeEagle: Detecting Complex Neural Trojans in Data-Free Cases | Chong Fu, Xuhong Zhang, Shouling Ji, Ting Wang, Peng Lin, Yanghe Feng, Jianwei Yin |
USENIX Security '23 | Decompiling x86 Deep Neural Network Executables | Zhibo Liu, Yuanyuan Yuan, Shuai Wang, Xiaofei Xie, Lei Ma |