USENIX Security '23 | HOLMES: Efficient Distribution Testing for Secure Collaborative Learning | Ian Chang, Katerina Sotiraki, Weikeng Chen, Murat Kantarcioglu, Raluca Popa |
USENIX Security '23 | MobileAtlas: Geographically Decoupled Measurements in Cellular Networks for Security and Privacy Research | Gabriel K. Gegenhuber, Wilfried Mayer, Edgar Weippl, Adrian Dabrowski |
USENIX Security '23 | Don’t be Dense: Efficient Keyword PIR for Sparse Databases | Sarvar Patel, Joon Young Seo, Kevin Yeo |
USENIX Security '23 | Proxy Hunting: Understanding and Characterizing Proxy-based Upgradeable Smart Contracts in Blockchains | William E Bodell III, Sajad Meisami, Yue Duan |
USENIX Security '23 | Fine-grained Poisoning Attack to Local Differential Privacy Protocols for Mean and Variance Estimation | Xiaoguang Li, Ninghui Li, Wenhai Sun, Neil Zhenqiang Gong, Hui Li |
USENIX Security '23 | PrivateFL: Accurate, Differentially Private Federated Learning via Personalized Data Transformation | Yuchen Yang, Bo Hui, Haolin Yuan, Neil Gong, Yinzhi Cao |
USENIX Security '23 | Controlled Data Races in Enclaves: Attacks and Detection | Sanchuan Chen, Zhiqiang Lin, Yinqian Zhang |
USENIX Security '23 | BalanceProofs: Maintainable Vector Commitments with Fast Aggregation | Weijie Wang, Annie Ulichney, Charalampos Papamanthou |
USENIX Security '23 | autofz: Automated Fuzzer Composition at Runtime | Yu-Fu Fu, Jaehyuk Lee, Taesoo Kim |
USENIX Security '23 | Multi-Factor Key Derivation Function (MFKDF) for Fast, Flexible, Secure, & Practical Key Management | Vivek Nair, Dawn Song |
USENIX Security '23 | PROGRAPHER: An Anomaly Detection System based on Provenance Graph Embedding | Fan Yang, Jiacen Xu, Chunlin Xiong, Zhou Li, Kehuan Zhang |
USENIX Security '23 | Rosetta: Enabling Robust TLS Encrypted Traffic Classification in Diverse Network Environments with TCP-Aware Traffic Augmentation | Renjie Xie, Jiahao Cao, Enhuan Dong, Mingwei Xu, Kun Sun, Qi Li, Licheng Shen, Menghao Zhang |
USENIX Security '23 | Aegis: Mitigating Targeted Bit-flip Attacks against Deep Neural Networks | Jialai Wang, Ziyuan Zhang, Meiqi Wang, Han Qiu, Tianwei Zhang, Qi Li, Zongpeng Li, Tao Wei, Chao Zhang |
USENIX Security '23 | Design of Access Control Mechanisms in Systems-on-Chip with Formal Integrity Guarantees | Dino Mehmedagić, Mohammad Rahmani Fadiheh, Johannes Müller, Anna Lena Duque Antón, Dominik Stoffel, Wolfgang Kunz |
USENIX Security '23 | ICSPatch: Automated Vulnerability Localization and Non-Intrusive Hotpatching in Industrial Control Systems using Data Dependence Graphs | Prashant Hari Narayan Rajput, Constantine Doumanidis, Michail Maniatakos |
USENIX Security '23 | VeriZexe: Decentralized Private Computation with Universal Setup | Alex Luoyuan Xiong, Binyi Chen, Zhenfei Zhang, Benedikt Bünz, Ben Fisch, Fernando Krell, Philippe Camacho |
USENIX Security '23 | MTSan: A Feasible and Practical Memory Sanitizer for Fuzzing COTS Binaries | Xingman Chen, Yinghao Shi, Zheyu Jiang, Yuan Li, Ruoyu Wang, Haixin Duan, Haoyu Wang, Chao Zhang |
USENIX Security '23 | Lessons Lost: Incident Response in the Age of Cyber Insurance and Breach Attorneys | Daniel W. Woods, Rainer Böhme, Josephine Wolff, Daniel Schwarcz |
USENIX Security '23 | NRDelegationAttack: Complexity DDoS attack on DNS Recursive Resolvers | Yehuda Afek, Anat Bremler-Barr, Shani Stajnrod |
USENIX Security '23 | Jinn: Hijacking Safe Programs with Trojans | Komail Dharsee, John Criswell |
USENIX Security '23 | Hiding in Plain Sight: An Empirical Study of Web Application Abuse in Malware | Mingxuan Yao, Jonathan Fuller, Ranjita Pai Kasturi, Saumya Agarwal, Amit Kumar Sikder, Brendan Saltaformaggio |
USENIX Security '23 | CSHER: A System for Compact Storage with HE-Retrieval | Adi Akavia, Neta Oren, Boaz Sapir, Margarita Vald |
USENIX Security '23 | The Case for Learned Provenance Graph Storage Systems | Hailun Ding, Juan Zhai, Dong Deng, Shiqing Ma |
USENIX Security '23 | Understand Users' Privacy Perception and Decision of V2X Communication in Connected Autonomous Vehicles | Zekun Cai, Aiping Xiong |
USENIX Security '23 | Long Live The Honey Badger: Robust Asynchronous DPSS and its Applications | Thomas Yurek, Zhuolun Xiang, Yu Xia, Andrew Miller |