USENIX Security '23 | Pass2Edit: A Multi-Step Generative Model for Guessing Edited Passwords | |
USENIX Security '23 | MorFuzz: Fuzzing Processor via Runtime Instruction Morphing enhanced Synchronizable Co-simulation | |
USENIX Security '23 | Multiview: Finding Blind Spots in Access-Deny Issues Diagnosis | |
USENIX Security '23 | Near-Ultrasound Inaudible Trojan (Nuit): Exploiting Your Speaker to Attack Your Microphone | |
USENIX Security '23 | Oops..! I Glitched It Again! How to Multi-Glitch the Glitching-Protections on ARM TrustZone-M | |
USENIX Security '23 | No Single Silver Bullet: Measuring the Accuracy of Password Strength Meters | |
USENIX Security '23 | One Size Does not Fit All: Quantifying the Risk of Malicious App Encounters for Different Android User Profiles | |
USENIX Security '23 | Network Responses to Russia's Invasion of Ukraine in 2022: A Cautionary Tale for Internet Freedom | |
USENIX Security '23 | Multi-Factor Key Derivation Function (MFKDF) for Fast, Flexible, Secure, & Practical Key Management | |
USENIX Security '23 | NAUTILUS: Automated RESTful API Vulnerability Detection | |
USENIX Security '23 | Minimalist: Semi-automated Debloating of PHP Web Applications through Static Analysis | |
USENIX Security '23 | Machine-checking Multi-Round Proofs of Shuffle: Terelius-Wikstrom and Bayer-Groth | |
USENIX Security '23 | MINER: A Hybrid Data-Driven Approach for REST API Fuzzing | |
USENIX Security '23 | MTSan: A Feasible and Practical Memory Sanitizer for Fuzzing COTS Binaries | |
USENIX Security '23 | Lessons Lost: Incident Response in the Age of Cyber Insurance and Breach Attorneys | |
USENIX Security '23 | Long Live The Honey Badger: Robust Asynchronous DPSS and its Applications | |
USENIX Security '23 | Black-box Adversarial Example Attack towards FCG Based Android Malware Detection under Incomplete Feature Information | |
USENIX Security '23 | Meta-Sift: How to Sift Out a Clean Subset in the Presence of Data Poisoning? | |
USENIX Security '23 | Bilingual Problems: Studying the Security Risks Incurred by Native Extensions in Scripting Languages | |
USENIX Security '23 | Measuring Up to (Reasonable) Consumer Expectations: Providing an Empirical Basis for Holding IoT Manufacturers Legally Responsible | |
USENIX Security '23 | Jinn: Hijacking Safe Programs with Trojans | |
USENIX Security '23 | Lalaine: Measuring and Characterizing Non-Compliance of Apple Privacy Labels | |
USENIX Security '23 | KextFuzz: Fuzzing macOS Kernel EXTensions on Apple Silicon via Exploiting Mitigations | |
USENIX Security '23 | AutoFR: Automated Filter Rule Generation for Adblocking | |
USENIX Security '23 | Log: It’s Big, It’s Heavy, It’s Filled with Personal Data! Measuring the Logging of Sensitive Information in the Android Ecosystem | |