USENIX Security '23 | High Recovery with Fewer Injections: Practical Binary Volumetric Injection Attacks against Dynamic Searchable Encryption | Xianglong Zhang, Wei Wang, Peng Xu, Laurence T. Yang, Kaitai Liang |
USENIX Security '23 | Prime Match: A Privacy-Preserving Inventory Matching System | Antigoni Polychroniadou, Gilad Asharov, Benjamin Diamond, Tucker Balch, Hans Buehler, Richard Hua, Suwen Gu, Greg Gimler, Manuela Veloso |
USENIX Security '23 | Squirrel: A Scalable Secure Two-Party Computation Framework for Training Gradient Boosting Decision Tree | Wen-jie Lu, Zhicong Huang, Qizhi Zhang, Yuchen Wang, Cheng Hong |
USENIX Security '23 | TAP: Transparent and Privacy-Preserving Data Services | Daniel Reijsbergen, Aung Maw, Zheng Yang, Tien Tuan Anh Dinh, Jianying Zhou |
USENIX Security '23 | TRust: A Compilation Framework for In-process Isolation to Protect Safe Rust against Untrusted Code | Inyoung Bang, Martin Kayondo, Hyungon Moon, Yunheung Paek |
USENIX Security '23 | Every Signature is Broken: On the Insecurity of Microsoft Office’s OOXML Signatures | Simon Rohlmann, Vladislav Mladenov, Christian Mainka, Daniel Hirschberger, Jörg Schwenk |
USENIX Security '23 | Detecting Multi-Step IAM Attacks in AWS Environments via Model Checking | Ilia Shevrin, Oded Margalit |
USENIX Security '23 | V1SCAN: Discovering 1-day Vulnerabilities in Reused C/C++ Open-source Software Components Using Code Classification Techniques | Seunghoon Woo, Eunjin Choi, Heejo Lee, Hakjoo Oh |
USENIX Security '23 | Isolated and Exhausted: Attacking Operating Systems via Site Isolation in the Browser | Matthias Gierlings, Marcus Brinkmann, Jörg Schwenk |
USENIX Security '23 | AutoFR: Automated Filter Rule Generation for Adblocking | Hieu Le, Salma Elmalaki, Athina Markopoulou, Zubair Shafiq |
USENIX Security '23 | Cipherfix: Mitigating Ciphertext Side-Channel Attacks in Software | Jan Wichelmann, Anna Pätschke, Luca Wilke, Thomas Eisenbarth |
USENIX Security '23 | PELICAN: Exploiting Backdoors of Naturally Trained Deep Learning Models In Binary Code Analysis | Zhuo Zhang, Guanhong Tao, Guangyu Shen, Shengwei An, Qiuling Xu, Yingqi Liu, Yapeng Ye, Yaoxuan Wu, Xiangyu Zhang |
USENIX Security '23 | The Most Dangerous Codec in the World: Finding and Exploiting Vulnerabilities in H.264 Decoders | Willy R. Vasquez, Stephen Checkoway, Hovav Shacham |
USENIX Security '23 | Extending a Hand to Attackers: Browser Privilege Escalation Attacks via Extensions | Young Min Kim, Byoungyoung Lee |
USENIX Security '23 | Eos: Efficient Private Delegation of zkSNARK Provers | Alessandro Chiesa, Ryan Lehmkuhl, Pratyush Mishra, Yinuo Zhang |
USENIX Security '23 | Improving Real-world Password Guessing Attacks via Bi-directional Transformers | Ming Xu, Jitao Yu, Xinyi Zhang, Chuanwang Wang, Shenghao Zhang, Haoqi Wu, Weili Han |
USENIX Security '23 | Glowing in the Dark: Uncovering IPv6 Address Discovery and Scanning Strategies in the Wild | Hammas Bin Tanveer, Rachee Singh, Paul Pearce, Rishab Nithyanand |
USENIX Security '23 | One Server for the Price of Two: Simple and Fast Single-Server Private Information Retrieval | Alexandra Henzinger, Matthew M. Hong, Henry Corrigan-Gibbs, Sarah Meiklejohn, Vinod Vaikuntanathan |
USENIX Security '23 | POLICYCOMP: Counterpart Comparison of Privacy Policies Uncovers Overbroad Personal Data Collection Practices | Lu Zhou, Chengyongxiao Wei, Tong Zhu, Guoxing Chen, Xiaokuan Zhang, Suguo Du, Hui Cao, Haojin Zhu |
USENIX Security '23 | Oops..! I Glitched It Again! How to Multi-Glitch the Glitching-Protections on ARM TrustZone-M | Xhani Marvin Saß, Richard Mitev, Ahmad-Reza Sadeghi |
USENIX Security '23 | ICSPatch: Automated Vulnerability Localization and Non-Intrusive Hotpatching in Industrial Control Systems using Data Dependence Graphs | Prashant Hari Narayan Rajput, Constantine Doumanidis, Michail Maniatakos |
USENIX Security '23 | Beyond The Gates: An Empirical Analysis of HTTP-Managed Password Stealers and Operators | Athanasios Avgetidis, Omar Alrawi, Kevin Valakuzhy, Charles Lever, Paul Burbage, Angelos D. Keromytis, Fabian Monrose, Manos Antonakakis |
USENIX Security '23 | Trojan Source: Invisible Vulnerabilities | Nicholas Boucher, Ross Anderson |
USENIX Security '23 | FirmSolo: Enabling dynamic analysis of binary Linux-based IoT kernel modules | Ioannis Angelakopoulos, Gianluca Stringhini, Manuel Egele |
USENIX Security '23 | Hash Gone Bad: Automated discovery of protocol attacks that exploit hash function weaknesses | Vincent Cheval, Cas Cremers, Alexander Dax, Lucca Hirschi, Charlie Jacomme, Steve Kremer |