USENIX Security '23 | Automated Cookie Notice Analysis and Enforcement | Rishabh Khandelwal, Asmit Nayak, Hamza Harkous, Kassem Fawaz |
USENIX Security '23 | Lalaine: Measuring and Characterizing Non-Compliance of Apple Privacy Labels | Yue Xiao, Zhengyi Li, Yue Qin, Xiaolong Bai, Jiale Guan, Xiaojing Liao, Luyi Xing |
USENIX Security '23 | High Recovery with Fewer Injections: Practical Binary Volumetric Injection Attacks against Dynamic Searchable Encryption | Xianglong Zhang, Wei Wang, Peng Xu, Laurence T. Yang, Kaitai Liang |
USENIX Security '23 | Improving Real-world Password Guessing Attacks via Bi-directional Transformers | Ming Xu, Jitao Yu, Xinyi Zhang, Chuanwang Wang, Shenghao Zhang, Haoqi Wu, Weili Han |
USENIX Security '23 | KextFuzz: Fuzzing macOS Kernel EXTensions on Apple Silicon via Exploiting Mitigations | Tingting Yin, Zicong Gao, Zhenghang Xiao, Zheyu Ma, Min Zheng, Chao Zhang |
USENIX Security '23 | Forming Faster Firmware Fuzzers | |
USENIX Security '23 | AURC: Detecting Errors in Program Code and Documentation | Peiwei Hu, Ruigang Liang, Ying Cao, Kai Chen, Runze Zhang |
USENIX Security '23 | Rethinking White-Box Watermarks on Deep Learning Models under Neural Structural Obfuscation | Yifan Yan, Xudong Pan, Mi Zhang, Min Yang |
USENIX Security '23 | Remote Code Execution from SSTI in the Sandbox: Automatically Detecting and Exploiting Template Escape Bugs | Yudi Zhao, Yuan Zhang, Min Yang |
USENIX Security '23 | Prime Match: A Privacy-Preserving Inventory Matching System | Antigoni Polychroniadou, Gilad Asharov, Benjamin Diamond, Tucker Balch, Hans Buehler, Richard Hua, Suwen Gu, Greg Gimler, Manuela Veloso |
USENIX Security '23 | Token Spammers, Rug Pulls, and Sniper Bots: An Analysis of the Ecosystem of Tokens in Ethereum and in the Binance Smart Chain (BNB) | Federico Cernera, Massimo La Morgia, Alessandro Mei, Francesco Sassi |
USENIX Security '23 | CarpetFuzz: Automatic Program Option Constraint Extraction from Documentation for Fuzzing | Dawei Wang, Ying Li, Zhiyu Zhang, Kai Chen |
USENIX Security '23 | Black-box Adversarial Example Attack towards FCG Based Android Malware Detection under Incomplete Feature Information | Heng Li, Zhang Cheng, Bang Wu, Liheng Yuan, Cuiying Gao, Wei Yuan, Xiapu Luo |
USENIX Security '23 | MorFuzz: Fuzzing Processor via Runtime Instruction Morphing enhanced Synchronizable Co-simulation | Jinyan Xu, Yiyuan Liu, Sirui He, Haoran Lin, Yajin Zhou, Cong Wang |
USENIX Security '23 | AutoFR: Automated Filter Rule Generation for Adblocking | Hieu Le, Salma Elmalaki, Athina Markopoulou, Zubair Shafiq |
USENIX Security '23 | InfinityGauntlet: Expose Smartphone Fingerprint Authentication to Brute-force Attack | Yu Chen, Yang Yu, Lidong Zhai |
USENIX Security '23 | Multiview: Finding Blind Spots in Access-Deny Issues Diagnosis | Bingyu Shen, Tianyi Shan, Yuanyuan Zhou |
USENIX Security '23 | A Plot is Worth a Thousand Words: Model Information Stealing Attacks via Scientific Plots | Boyang Zhang, Xinlei He, Yun Shen, Tianhao Wang, Yang Zhang |
USENIX Security '23 | X-Adv: Physical Adversarial Object Attacks against X-ray Prohibited Item Detection | Aishan Liu, Jun Guo, Jiakai Wang, Siyuan Liang, Renshuai Tao, Wenbo Zhou, Cong Liu, Xianglong Liu, Dacheng Tao |
USENIX Security '23 | Extending a Hand to Attackers: Browser Privilege Escalation Attacks via Extensions | Young Min Kim, Byoungyoung Lee |
USENIX Security '23 | Hey Kimya, Is My Smart Speaker Spying on Me? Taking Control of Sensor Privacy Through Isolation and Amnesia | Piet De Vaere, Adrian Perrig |
USENIX Security '23 | Capstone: A Capability-based Foundation for Trustless Secure Memory Access | Jason Zhijingcheng Yu, Conrad Watt, Aditya Badole, Trevor E. Carlson, Prateek Saxena |
USENIX Security '23 | Watch your Watch: Inferring Personality Traits from Wearable Activity Trackers | Noé Zufferey, Mathias Humbert, Romain Tavenard, Kévin Huguenin |
USENIX Security '23 | Squirrel: A Scalable Secure Two-Party Computation Framework for Training Gradient Boosting Decision Tree | Wen-jie Lu, Zhicong Huang, Qizhi Zhang, Yuchen Wang, Cheng Hong |
USENIX Security '23 | Authenticated private information retrieval | Simone Colombo, Kirill Nikitin, Henry Corrigan-Gibbs, David J. Wu, Bryan Ford |