USENIX Security '23 | DDRace: Finding Concurrency UAF Vulnerabilities in Linux Drivers with Directed Fuzzing | |
USENIX Security '23 | Secure Floating-Point Training | Deevashwer Rathee, Anwesh Bhattacharya, Divya Gupta, Rahul Sharma, Dawn Song |
USENIX Security '23 | The OK Is Not Enough: A Large Scale Study of Consent Dialogs in Smartphone Applications | Simon Koch, Benjamin Altpeter, Martin Johns |
USENIX Security '23 | Timeless Timing Attacks and Preload Defenses in Tor's DNS Cache | Rasmus Dahlberg, Tobias Pulls |
USENIX Security '23 | CacheQL: Quantifying and Localizing Cache Side-Channel Vulnerabilities in Production Software | Yuanyuan Yuan, Zhibo Liu, Shuai Wang |
USENIX Security '23 | “If sighted people know, I should be able to know:” Privacy Perceptions of Bystanders with Visual Impairments around Camera-based Technology | Yuhang Zhao, Yaxing Yao, Jiaru Fu, Nihan Zhou |
USENIX Security '23 | Access Denied: Assessing Physical Risks to Internet Access Networks | Alexander Marder, Zesen Zhang, Ricky Mok, Ramakrishna Padmanabhan, Bradley Huffaker, Matthew Luckie, Alberto Dainotti, kc claffy, Alex C. Snoeren, Aaron Schulman |
USENIX Security '23 | Security and Privacy Failures in Popular 2FA Apps | Conor Gilsenan, Fuzail Shakir, Noura Alomar, Serge Egelman |
USENIX Security '23 | Hash Gone Bad: Automated discovery of protocol attacks that exploit hash function weaknesses | Vincent Cheval, Cas Cremers, Alexander Dax, Lucca Hirschi, Charlie Jacomme, Steve Kremer |
USENIX Security '23 | Content-Type: multipart/oracle - Tapping into Format Oracles in Email End-to-End Encryption | Fabian Ising, Damian Poddebniak, Tobias Kappert, Christoph Saatjohann, Sebastian Schinzel |
USENIX Security '23 | Glowing in the Dark: Uncovering IPv6 Address Discovery and Scanning Strategies in the Wild | Hammas Bin Tanveer, Rachee Singh, Paul Pearce, Rishab Nithyanand |
USENIX Security '23 | Every Signature is Broken: On the Insecurity of Microsoft Office’s OOXML Signatures | Simon Rohlmann, Vladislav Mladenov, Christian Mainka, Daniel Hirschberger, Jörg Schwenk |
USENIX Security '23 | Humans vs. Machines in Malware Classification | Simone Aonzo, Yufei Han, Alessandro Mantovani, Davide Balzarotti |
USENIX Security '23 | How fast do you heal? A taxonomy for post-compromise security in secure-channel establishment | Olivier Blazy, Ioana Boureanu, Pascal Lafourcade, Cristina Onete, Léo Robert |
USENIX Security '23 | Assessing Anonymity Techniques Employed in German Court Decisions: A De-Anonymization Experiment | Dominic Deuber, Michael Keuchen, Nicolas Christin |
USENIX Security '23 | GLeeFuzz: Fuzzing WebGL Through Error Message Guided Mutation | Hui Peng, Zhihao Yao, Ardalan Amiri Sani, Dave (Jing) Tian, Mathias Payer |
USENIX Security '23 | Are You Spying on Me? Large-Scale Analysis on IoT Data Exposure through Companion Apps | Yuhong Nan, Xueqiang Wang, Luyi Xing, Xiaojing Liao, Ruoyu Wu, Jianliang Wu, Yifan Zhang, XiaoFeng Wang |
USENIX Security '23 | The Space of Adversarial Strategies | Ryan Sheatsley, Blaine Hoak, Eric Pauley, Patrick McDaniel |
USENIX Security '23 | Credit Karma: Understanding Security Implications of Exposed Cloud Services through Automated Capability Inference | Xueqiang Wang, Yuqiong Sun, Susanta Nanda, XiaoFeng Wang |
USENIX Security '23 | That Person Moves Like A Car: Misclassification Attack Detection for Autonomous Systems Using Spatiotemporal Consistency | Yanmao Man, Raymond Muller, Ming Li, Z. Berkay Celik, Ryan Gerdes |
USENIX Security '23 | CipherH: Automated Detection of Ciphertext Side-channel Vulnerabilities in Cryptographic Implementations | Sen Deng, Mengyuan Li, Yining Tang, Shuai Wang, Shoumeng Yan, Yinqian Zhang |
USENIX Security '23 | "My Privacy for their Security": Employees' Privacy Perspectives and Expectations when using Enterprise Security Software | Jonah Stegman, Patrick J. Trottier, Caroline Hillier, Hassan Khan, Mohammad Mannan |
USENIX Security '23 | Combating Robocalls with Phone Virtual Assistant Mediated Interaction | Sharbani Pandit, Krishanu Sarker, Roberto Perdisci, Mustaque Ahamad, Diyi Yang |
USENIX Security '23 | Distance-Aware Private Set Intersection | Anrin Chakraborti, Giulia Fanti, Michael K. Reiter |
USENIX Security '23 | NeuroPots: Realtime Proactive Defense against Bit-Flip Attacks in Neural Networks | Qi Liu, Jieming Yin, Wujie Wen, Chengmo Yang, Shi Sha |