USENIX Security '23 | A Research Framework and Initial Study of Browser Security for the Visually Impaired | Elaine Lau, Zachary Peterson |
USENIX Security '23 | PUMM: Preventing Use-After-Free Using Execution Unit Partitioning | Carter Yagemann, Simon P. Chung, Brendan Saltaformaggio, Wenke Lee |
USENIX Security '23 | POLICYCOMP: Counterpart Comparison of Privacy Policies Uncovers Overbroad Personal Data Collection Practices | Lu Zhou, Chengyongxiao Wei, Tong Zhu, Guoxing Chen, Xiaokuan Zhang, Suguo Du, Hui Cao, Haojin Zhu |
USENIX Security '23 | One Server for the Price of Two: Simple and Fast Single-Server Private Information Retrieval | Alexandra Henzinger, Matthew M. Hong, Henry Corrigan-Gibbs, Sarah Meiklejohn, Vinod Vaikuntanathan |
USENIX Security '23 | Exploring User Reactions and Mental Models Towards Perceptual Manipulation Attacks in Mixed Reality | Kaiming Cheng, Jeffery F. Tian, Tadayoshi Kohno, Franziska Roesner |
USENIX Security '23 | Eavesdropping Mobile App Activity via Radio-Frequency Energy Harvesting | Tao Ni, Guohao Lan, Jia Wang, Qingchuan Zhao, Weitao Xu |
USENIX Security '23 | Side-Channel Attacks on Optane Persistent Memory | Sihang Liu, Suraaj Kanniwadi, Martin Schwarzl, Andreas Kogler, Daniel Gruss, Samira Khan |
USENIX Security '23 | A Study of Multi-Factor and Risk-Based Authentication Availability | Anthony Gavazzi, Ryan Williams, Engin Kirda, Long Lu, Andre King, Andy Davis, Tim Leek |
USENIX Security '23 | Person Re-identification in 3D Space: A WiFi Vision-based Approach | Yili Ren, Yichao Wang, Sheng Tan, Yingying Chen, Jie Yang |
USENIX Security '23 | Fourteen Years in the Life: A Root Server’s Perspective on DNS Resolver Security | Alden Hilton, Casey Deccio, Jacob Davis |
USENIX Security '23 | ClepsydraCache -- Preventing Cache Attacks with Time-Based Evictions | Jan Philipp Thoma, Christian Niesler, Dominic Funke, Gregor Leander, Pierre Mayr, Nils Pohl, Lucas Davi, Tim Güneysu |
USENIX Security '23 | Guarding Serverless Applications with Kalium | Deepak Sirone Jegan, Liang Wang, Siddhant Bhagat, Michael Swift |
USENIX Security '23 | DynSQL: Stateful Fuzzing for Database Management Systems with Complex and Valid SQL Query Generation | Zu-Ming Jiang, Jia-Ju Bai, Zhendong Su |
USENIX Security '23 | Automated Security Analysis of Exposure Notification Systems | Kevin Morio, Ilkan Esiyok, Dennis Jackson, Robert Künnemann |
USENIX Security '23 | xNIDS: Explaining Deep Learning-based Network Intrusion Detection Systems for Active Intrusion Responses | Feng Wei, Hongda Li, Ziming Zhao, Hongxin Hu |
USENIX Security '23 | Pspray: Timing Side-Channel based Linux Kernel Heap Exploitation Technique | Yoochan Lee, Jinhan Kwak, Junesoo Kang, Yuseok Jeon, Byoungyoung Lee |
USENIX Security '23 | Strategies and Vulnerabilities of Participants in Venezuelan Influence Operations | Ruben Recabarren, Bogdan Carbunar, Nestor Hernandez, Ashfaq Ali Shafin |
USENIX Security '23 | Investigating Verification Behavior and Perceptions of Visual Digital Certificates | Dañiel Gerhardt, Alexander Ponticello, Adrian Dabrowski, Katharina Krombholz |
USENIX Security '23 | Remote Attacks on Speech Recognition Systems Using Sound from Power Supply | Lanqing Yang, Xinqi Chen, Xiangyong Jian, Leping Yang, Yijie Li, Qianfei Ren, Yi-Chao Chen, Guangtao Xue, Xiaoyu Ji |
USENIX Security '23 | HOMESPY: The Invisible Sniffer of Infrared Remote Control of Smart TVs | Kong Huang, YuTong Zhou, Ke Zhang, Jiacen Xu, Jiongyi Chen, Di Tang, Kehuan Zhang |
USENIX Security '23 | FuzzJIT: Oracle-Enhanced Fuzzing for JavaScript Engine JIT Compiler | Junjie Wang, Zhiyi Zhang, Shuang Liu, Xiaoning Du, Junjie Chen |
USENIX Security '23 | TPatch: A Triggered Physical Adversarial Patch | Wenjun Zhu, Xiaoyu Ji, Yushi Cheng, Shibo Zhang, Wenyuan Xu |
USENIX Security '23 | TAP: Transparent and Privacy-Preserving Data Services | Daniel Reijsbergen, Aung Maw, Zheng Yang, Tien Tuan Anh Dinh, Jianying Zhou |
USENIX Security '23 | UnGANable: Defending Against GAN-based Face Manipulation | Zheng Li, Ning Yu, Ahmed Salem, Michael Backes, Mario Fritz, Yang Zhang |
USENIX Security '23 | Squint Hard Enough: Attacking Perceptual Hashing with Adversarial Machine Learning | Jonathan Prokos, Neil Fendley, Matthew Green, Roei Schuster, Eran Tromer, Tushar Jois, Yinzhi Cao |