USENIX Security '23 | Educators’ Perspectives of Using (or Not Using) Online Exam Proctoring | |
USENIX Security '23 | Detecting and Handling IoT Interaction Threats in Multi-Platform Multi-Control-Channel Smart Homes | |
USENIX Security '23 | Design of Access Control Mechanisms in Systems-on-Chip with Formal Integrity Guarantees | |
USENIX Security '23 | Duoram: A Bandwidth-Efficient Distributed ORAM for 2- and 3-Party Computation | |
USENIX Security '23 | Diving into Robocall Content with SnorCall | |
USENIX Security '23 | Detecting Multi-Step IAM Attacks in AWS Environments via Model Checking | |
USENIX Security '23 | Don’t be Dense: Efficient Keyword PIR for Sparse Databases | |
USENIX Security '23 | PrivateFL: Accurate, Differentially Private Federated Learning via Personalized Data Transformation | |
USENIX Security '23 | Did the Shark Eat the Watchdog in the NTP Pool? Deceiving the NTP Pool’s Monitoring System | |
USENIX Security '23 | DiffSmooth: Certifiably Robust Learning via Diffusion Models and Local Smoothing | |
USENIX Security '23 | DDRace: Finding Concurrency UAF Vulnerabilities in Linux Drivers with Directed Fuzzing | |
USENIX Security '23 | Prime Match: A Privacy Preserving Inventory Matching System | |
USENIX Security '23 | Defining "Broken": User Experiences and Remediation Tactics When Ad-Blocking or Tracking-Protection Tools Break a Website’s User Experience | |
USENIX Security '23 | Catch You and I Can: Revealing Source Voiceprint Against Voice Conversion | |
USENIX Security '23 | Pool-Party: Exploiting Browser Resource Pools for Web Tracking | |
USENIX Security '23 | Place Your Locks Well: Understanding and Detecting Lock Misuse Bugs | |
USENIX Security '23 | Practical Asynchronous High-threshold Distributed Key Generation and Distributed Polynomial Sampling | |
USENIX Security '23 | PELICAN: Exploiting Backdoors of Naturally Trained Deep Learning Models In Binary Code Analysis | |
USENIX Security '23 | Cipherfix: Mitigating Ciphertext Side-Channel Attacks in Software | |
USENIX Security '23 | Bleem: Packet Sequence Oriented Fuzzing for Protocol Implementations | |
USENIX Security '23 | Password Guessing Using Random Forest | |
USENIX Security '23 | NRDelegationAttack: Complexity DDoS attack on DNS Recursive Resolvers | |
USENIX Security '23 | CarpetFuzz: Automatic Program Option Constraint Extraction from Documentation for Fuzzing | |
USENIX Security '23 | Bug Hunters’ Perspectives on the Challenges and Benefits of the Bug Bounty Ecosystem | |
USENIX Security '23 | BoKASAN: Binary-only Kernel Address Sanitizer for Effective Kernel Fuzzing | |