USENIX Security '23 | Hash Gone Bad: Automated discovery of protocol attacks that exploit hash function weaknesses | Vincent Cheval, Cas Cremers, Alexander Dax, Lucca Hirschi, Charlie Jacomme, Steve Kremer |
USENIX Security '23 | Glowing in the Dark: Uncovering IPv6 Address Discovery and Scanning Strategies in the Wild | Hammas Bin Tanveer, Rachee Singh, Paul Pearce, Rishab Nithyanand |
USENIX Security '23 | How fast do you heal? A taxonomy for post-compromise security in secure-channel establishment | Olivier Blazy, Ioana Boureanu, Pascal Lafourcade, Cristina Onete, Léo Robert |
USENIX Security '23 | Are You Spying on Me? Large-Scale Analysis on IoT Data Exposure through Companion Apps | Yuhong Nan, Xueqiang Wang, Luyi Xing, Xiaojing Liao, Ruoyu Wu, Jianliang Wu, Yifan Zhang, XiaoFeng Wang |
USENIX Security '23 | Credit Karma: Understanding Security Implications of Exposed Cloud Services through Automated Capability Inference | Xueqiang Wang, Yuqiong Sun, Susanta Nanda, XiaoFeng Wang |
USENIX Security '23 | NeuroPots: Realtime Proactive Defense against Bit-Flip Attacks in Neural Networks | Qi Liu, Jieming Yin, Wujie Wen, Chengmo Yang, Shi Sha |
USENIX Security '23 | Gradient Obfuscation Gives a False Sense of Security in Federated Learning | Kai Yue, Richeng Jin, Chau-Wai Wong, Dror Baron, Huaiyu Dai |
USENIX Security '23 | An Efficient Design of Intelligent Network Data Plane | Guangmeng Zhou, Zhuotao Liu, Chuanpu Fu, Qi Li, Ke Xu |
USENIX Security '23 | VulChecker: Graph-based Vulnerability Localization in Source Code | Yisroel Mirsky, George Macon, Michael Brown, Carter Yagemann, Matthew Pruett, Evan Downing, Sukarno Mertoguno, Wenke Lee |
USENIX Security '23 | Machine-checking Multi-Round Proofs of Shuffle: Terelius-Wikstrom and Bayer-Groth | Thomas Haines, Rajeev Gore, Mukesh Tiwari |
USENIX Security '23 | FreeEagle: Detecting Complex Neural Trojans in Data-Free Cases | Chong Fu, Xuhong Zhang, Shouling Ji, Ting Wang, Peng Lin, Yanghe Feng, Jianwei Yin |
USENIX Security '23 | TRIDENT: Towards Detecting and Mitigating Web-based Social Engineering Attacks | Zheng Yang, Joey Allen, Matthew Landen, Roberto Perdisci, Wenke Lee |
USENIX Security '23 | Secure Floating-Point Training | Deevashwer Rathee, Anwesh Bhattacharya, Divya Gupta, Rahul Sharma, Dawn Song |
USENIX Security '23 | Hiding in Plain Sight: An Empirical Study of Web Application Abuse in Malware | Mingxuan Yao, Jonathan Fuller, Ranjita Pai Kasturi, Saumya Agarwal, Amit Kumar Sikder, Brendan Saltaformaggio |
USENIX Security '23 | High Recovery with Fewer Injections: Practical Binary Volumetric Injection Attacks against Dynamic Searchable Encryption | Xianglong Zhang, Wei Wang, Peng Xu, Laurence T. Yang, Kaitai Liang |
USENIX Security '23 | Prime Match: A Privacy-Preserving Inventory Matching System | Antigoni Polychroniadou, Gilad Asharov, Benjamin Diamond, Tucker Balch, Hans Buehler, Richard Hua, Suwen Gu, Greg Gimler, Manuela Veloso |
USENIX Security '23 | Squirrel: A Scalable Secure Two-Party Computation Framework for Training Gradient Boosting Decision Tree | Wen-jie Lu, Zhicong Huang, Qizhi Zhang, Yuchen Wang, Cheng Hong |
USENIX Security '23 | Fact-Saboteurs: A Taxonomy of Evidence Manipulation Attacks against Fact-Verification Systems | Sahar Abdelnabi, Mario Fritz |
USENIX Security '23 | Trojan Source: Invisible Vulnerabilities | Nicholas Boucher, Ross Anderson |
USENIX Security '23 | Bilingual Problems: Studying the Security Risks Incurred by Native Extensions in Scripting Languages | Cristian-Alexandru Staicu, Sazzadur Rahaman, Ágnes Kiss, Michael Backes |
USENIX Security '23 | Oops..! I Glitched It Again! How to Multi-Glitch the Glitching-Protections on ARM TrustZone-M | Xhani Marvin Saß, Richard Mitev, Ahmad-Reza Sadeghi |
USENIX Security '23 | Detecting Multi-Step IAM Attacks in AWS Environments via Model Checking | Ilia Shevrin, Oded Margalit |
USENIX Security '23 | Eos: Efficient Private Delegation of zkSNARK Provers | Alessandro Chiesa, Ryan Lehmkuhl, Pratyush Mishra, Yinuo Zhang |
USENIX Security '23 | The Most Dangerous Codec in the World: Finding and Exploiting Vulnerabilities in H.264 Decoders | Willy R. Vasquez, Stephen Checkoway, Hovav Shacham |
USENIX Security '23 | Did the Shark Eat the Watchdog in the NTP Pool? Deceiving the NTP Pool’s Monitoring System | Jonghoon Kwon, Jeonggyu Song, Junbeom Hur, Adrian Perrig |