USENIX Security '23 | Person Re-identification in 3D Space: A WiFi Vision-based Approach | Yili Ren, Yichao Wang, Sheng Tan, Yingying Chen, Jie Yang |
USENIX Security '23 | "All of them claim to be the best": Multi-perspective study of VPN users and VPN providers | Reethika Ramesh, Anjali Vyas, Roya Ensafi |
USENIX Security '23 | FirmSolo: Enabling dynamic analysis of binary Linux-based IoT kernel modules | Ioannis Angelakopoulos, Gianluca Stringhini, Manuel Egele |
USENIX Security '23 | Assessing Anonymity Techniques Employed in German Court Decisions: A De-Anonymization Experiment | Dominic Deuber, Michael Keuchen, Nicolas Christin |
USENIX Security '23 | Beyond The Gates: An Empirical Analysis of HTTP-Managed Password Stealers and Operators | Athanasios Avgetidis, Omar Alrawi, Kevin Valakuzhy, Charles Lever, Paul Burbage, Angelos D. Keromytis, Fabian Monrose, Manos Antonakakis |
USENIX Security '23 | Silent Spring: Prototype Pollution Leads to Remote Code Execution in Node.js | Mikhail Shcherbakov, Musard Balliu, Cristian-Alexandru Staicu |
USENIX Security '23 | PCAT: Functionality and Data Stealing from Split Learning by Pseudo-Client Attack | Xinben Gao, Lan Zhang |
USENIX Security '23 | Minimalist: Semi-automated Debloating of PHP Web Applications through Static Analysis | Rasoul Jahanshahi, Babak Amin Azad, Nick Nikiforakis, Manuel Egele |
USENIX Security '23 | FABRID: Flexible Attestation-Based Routing for Inter-Domain Networks | Cyrill Krähenbühl, Marc Wyss, David Basin, Vincent Lenders, Adrian Perrig, Martin Strohmeier |
USENIX Security '23 | Educators’ Perspectives of Using (or Not Using) Online Exam Proctoring | David G. Balash, Elena Korkes, Miles Grant, Adam J. Aviv, Rahel A. Fainchtein, Micah Sherr |
USENIX Security '23 | No more Reviewer #2: Subverting Automatic Paper-Reviewer Assignment using Adversarial Learning | Thorsten Eisenhofer, Erwin Quiring, Jonas Möller, Doreen Riepel, Thorsten Holz, Konrad Rieck |
USENIX Security '23 | The OK Is Not Enough: A Large Scale Study of Consent Dialogs in Smartphone Applications | Simon Koch, Benjamin Altpeter, Martin Johns |
USENIX Security '23 | Long Live The Honey Badger: Robust Asynchronous DPSS and its Applications | Thomas Yurek, Zhuolun Xiang, Yu Xia, Andrew Miller |
USENIX Security '23 | KextFuzz: Fuzzing macOS Kernel EXTensions on Apple Silicon via Exploiting Mitigations | Tingting Yin, Zicong Gao, Zhenghang Xiao, Zheyu Ma, Min Zheng, Chao Zhang |
USENIX Security '23 | A Plot is Worth a Thousand Words: Model Information Stealing Attacks via Scientific Plots | Boyang Zhang, Xinlei He, Yun Shen, Tianhao Wang, Yang Zhang |
USENIX Security '23 | How Library IT Staff Navigate Privacy and Security Challenges and Responsibilities | Alan F. Luo, Noel Warford, Samuel Dooley, Rachel Greenstadt, Michelle L. Mazurek, Nora McDonald |
USENIX Security '23 | Catch You and I Can: Revealing Source Voiceprint Against Voice Conversion | Jiangyi Deng, Yanjiao Chen, Yinan Zhong, Qianhao Miao, Xueluan Gong, Wenyuan Xu |
USENIX Security '23 | BoKASAN: Binary-only Kernel Address Sanitizer for Effective Kernel Fuzzing | Mingi Cho, Dohyeon An, Hoyong Jin, Taekyoung Kwon |
USENIX Security '23 | Practical Asynchronous High-threshold Distributed Key Generation and Distributed Polynomial Sampling | Sourav Das, Zhuolun Xiang, Lefteris Kokoris-Kogias, Ling Ren |
USENIX Security '23 | NAUTILUS: Automated RESTful API Vulnerability Detection | Gelei Deng, Zhiyi Zhang, Yuekang Li, Yi Liu, Tianwei Zhang, Yang Liu, Guo Yu, Dongjin Wang |
USENIX Security '23 | DISTDET: A Cost-Effective Distributed Cyber Threat Detection System | Feng Dong, Liu Wang, Xu Nie, Fei Shao, Haoyu Wang, Ding Li, Xiapu Luo, Xusheng Xiao |
USENIX Security '23 | Automated Security Analysis of Exposure Notification Systems | Kevin Morio, Ilkan Esiyok, Dennis Jackson, Robert Künnemann |
USENIX Security '23 | Strategies and Vulnerabilities of Participants in Venezuelan Influence Operations | Ruben Recabarren, Bogdan Carbunar, Nestor Hernandez, Ashfaq Ali Shafin |
USENIX Security '23 | TAP: Transparent and Privacy-Preserving Data Services | Daniel Reijsbergen, Aung Maw, Zheng Yang, Tien Tuan Anh Dinh, Jianying Zhou |
USENIX Security '23 | Device Tracking via Linux’s New TCP Source Port Selection Algorithm | Moshe Kol, Amit Klein, Yossi Gilad |