USENIX Security '23 | Bug Hunters’ Perspectives on the Challenges and Benefits of the Bug Bounty Ecosystem | Omer Akgul, Taha Eghtesad, Amit Elazari, Omprakash Gnawali, Jens Grossklags, Michelle L. Mazurek, Daniel Votipka, Aron Laszka |
USENIX Security '23 | Defining "Broken": User Experiences and Remediation Tactics When Ad-Blocking or Tracking-Protection Tools Break a Website’s User Experience | Alexandra Nisenoff, Arthur Borem, Madison Pickering, Grant Nakanishi, Maya Thumpasery, Blase Ur |
USENIX Security '23 | Log: It’s Big, It’s Heavy, It’s Filled with Personal Data! Measuring the Logging of Sensitive Information in the Android Ecosystem | Allan Lyons, Julien Gamba, Austin Shawaga, Joel Reardon, Juan Tapiador, Serge Egelman, Narseo Vallina-Rodriguez |
USENIX Security '23 | Fact-Saboteurs: A Taxonomy of Evidence Manipulation Attacks against Fact-Verification Systems | Sahar Abdelnabi, Mario Fritz |
USENIX Security '23 | Meta-Sift: How to Sift Out a Clean Subset in the Presence of Data Poisoning? | Yi Zeng, Minzhou Pan, Himanshu Jahagirdar, Ming Jin, Lingjuan Lyu, Ruoxi Jia |
USENIX Security '23 | “Employees Who Don’t Accept the Time Security Takes Are Not Aware Enough”: The CISO View of Human-Centred Security | Jonas Hielscher, Uta Menges, Simon Parkin, Annette Kluge, M. Angela Sasse |
USENIX Security '23 | How Library IT Staff Navigate Privacy and Security Challenges and Responsibilities | Alan F. Luo, Noel Warford, Samuel Dooley, Rachel Greenstadt, Michelle L. Mazurek, Nora McDonald |
USENIX Security '23 | Silent Bugs Matter: A Study of Compiler-Introduced Security Bugs | Jianhao Xu, Kangjie Lu, Zhengjie Du, Zhu Ding, Linke Li, Qiushi Wu, Mathias Payer, Bing Mao |
USENIX Security '23 | IvySyn: Automated Vulnerability Discovery in Deep Learning Frameworks | Neophytos Christou, Di Jin, Vaggelis Atlidakis, Baishakhi Ray, Vasileios P. Kemerlis |
USENIX Security '23 | Bleem: Packet Sequence Oriented Fuzzing for Protocol Implementations | Zhengxiong Luo, Junze Yu, Feilong Zuo, Jianzhong Liu, Yu Jiang, Ting Chen, Abhik Roychoudhury, Jiaguang Sun |
USENIX Security '23 | Araña: Discovering and Characterizing Password Guessing Attacks in Practice | Mazharul Islam, Marina Sanusi Bohuk, Paul Chung, Thomas Ristenpart, Rahul Chatterjee |
USENIX Security '23 | AIRS: Explanation for Deep Reinforcement Learning based Security Applications | Jiahao Yu, Wenbo Guo, Qi Qin, Gang Wang, Ting Wang, Xinyu Xing |
USENIX Security '23 | Minimalist: Semi-automated Debloating of PHP Web Applications through Static Analysis | Rasoul Jahanshahi, Babak Amin Azad, Nick Nikiforakis, Manuel Egele |
USENIX Security '23 | Machine-checking Multi-Round Proofs of Shuffle: Terelius-Wikstrom and Bayer-Groth | Thomas Haines, Rajeev Gore, Mukesh Tiwari |
USENIX Security '23 | FreeEagle: Detecting Complex Neural Trojans in Data-Free Cases | Chong Fu, Xuhong Zhang, Shouling Ji, Ting Wang, Peng Lin, Yanghe Feng, Jianwei Yin |
USENIX Security '23 | Formal Analysis and Patching of BLE-SC Pairing | Min Shi, Jing Chen, Kun He, Haoran Zhao, Meng Jia, Ruiying Du |
USENIX Security '23 | CAPatch: Physical Adversarial Patch against Image Captioning Systems | Shibo Zhang, Yushi Cheng, Wenjun Zhu, Xiaoyu Ji, Wenyuan Xu |
USENIX Security '23 | MINER: A Hybrid Data-Driven Approach for REST API Fuzzing | Chenyang Lyu, Jiacheng Xu, Shouling Ji, Xuhong Zhang, Qinying Wang, Binbin Zhao, Gaoning Pan, Wei Cao, Peng Chen, Raheem Beyah |
USENIX Security '23 | FABRID: Flexible Attestation-Based Routing for Inter-Domain Networks | Cyrill Krähenbühl, Marc Wyss, David Basin, Vincent Lenders, Adrian Perrig, Martin Strohmeier |
USENIX Security '23 | Educators’ Perspectives of Using (or Not Using) Online Exam Proctoring | David G. Balash, Elena Korkes, Miles Grant, Adam J. Aviv, Rahel A. Fainchtein, Micah Sherr |
USENIX Security '23 | Going through the motions: AR/VR keylogging from user head motions | Carter Slocum, Yicheng Zhang, Nael Abu-Ghazaleh, Jiasi Chen |
USENIX Security '23 | No more Reviewer #2: Subverting Automatic Paper-Reviewer Assignment using Adversarial Learning | Thorsten Eisenhofer, Erwin Quiring, Jonas Möller, Doreen Riepel, Thorsten Holz, Konrad Rieck |
USENIX Security '23 | Password Guessing Using Random Forest | Ding Wang, Yunkai Zou, Zijian Zhang, Kedong Xiu |
USENIX Security '23 | Detecting and Handling IoT Interaction Threats in Multi-Platform Multi-Control-Channel Smart Homes | Haotian Chi, Qiang Zeng, Xiaojiang Du |
USENIX Security '23 | TRIDENT: Towards Detecting and Mitigating Web-based Social Engineering Attacks | Zheng Yang, Joey Allen, Matthew Landen, Roberto Perdisci, Wenke Lee |