USENIX Security '23 | PELICAN: Exploiting Backdoors of Naturally Trained Deep Learning Models In Binary Code Analysis | Zhuo Zhang, Guanhong Tao, Guangyu Shen, Shengwei An, Qiuling Xu, Yingqi Liu, Yapeng Ye, Yaoxuan Wu, Xiangyu Zhang |
USENIX Security '23 | The Gates of Time: Improving Cache Attacks with Transient Execution | Daniel Katzman, William Kosasih, Chitchanok Chuengsatiansup, Eyal Ronen, Yuval Yarom |
USENIX Security '23 | TRust: A Compilation Framework for In-process Isolation to Protect Safe Rust against Untrusted Code | Inyoung Bang, Martin Kayondo, Hyungon Moon, Yunheung Paek |
USENIX Security '23 | The Most Dangerous Codec in the World: Finding and Exploiting Vulnerabilities in H.264 Decoders | Willy R. Vasquez, Stephen Checkoway, Hovav Shacham |
USENIX Security '23 | A Large Scale Study of the Ethereum Arbitrage Ecosystem | Robert McLaughlin, Christopher Kruegel, Giovanni Vigna |
USENIX Security '23 | Sherlock on Specs: Building LTE Conformance Tests through Automated Reasoning | Yi Chen, Di Tang, Yepeng Yao, Mingming Zha, XiaoFeng Wang, Xiaozhong Liu, Haixu Tang, Baoxu Liu |
USENIX Security '23 | Did the Shark Eat the Watchdog in the NTP Pool? Deceiving the NTP Pool’s Monitoring System | Jonghoon Kwon, Jeonggyu Song, Junbeom Hur, Adrian Perrig |
USENIX Security '23 | Formal Analysis of SPDM: Security Protocol and Data Model version 1.2 | Cas Cremers, Alexander Dax, Aurora Naska |
USENIX Security '23 | V1SCAN: Discovering 1-day Vulnerabilities in Reused C/C++ Open-source Software Components Using Code Classification Techniques | Seunghoon Woo, Eunjin Choi, Heejo Lee, Hakjoo Oh |
USENIX Security '23 | BunnyHop: Exploiting the Instruction Prefetcher | Zhiyuan Zhang, Mingtian Tao, Sioli O'Connell, Chitchanok Chuengsatiansup, Daniel Genkin, Yuval Yarom |
USENIX Security '23 | DiffSmooth: Certifiably Robust Learning via Diffusion Models and Local Smoothing | Jiawei Zhang, Zhongzhu Chen, Huan Zhang, Chaowei Xiao, Bo Li |
USENIX Security '23 | ACon^2: Adaptive Conformal Consensus for Provable Blockchain Oracles | Sangdon Park, Osbert Bastani, Taesoo Kim |
USENIX Security '23 | Measuring Up to (Reasonable) Consumer Expectations: Providing an Empirical Basis for Holding IoT Manufacturers Legally Responsible | Lorenz Kustosch, Carlos Gañán, Mattis van 't Schip, Michel van Eeten, Simon Parkin |
USENIX Security '23 | A Data-free Backdoor Injection Approach in Neural Networks | Peizhuo Lv, Chang Yue, Ruigang Liang, Yunfei Yang, Shengzhi Zhang, Hualong Ma, Kai Chen |
USENIX Security '23 | HECO: Fully Homomorphic Encryption Compiler | Alexander Viand, Patrick Jattke, Miro Haller, Anwar Hithnawi |
USENIX Security '23 | Automated Exploitable Heap Layout Generation for Heap Overflows Through Manipulation Distance-Guided Fuzzing | Bin Zhang, Jiongyi Chen, Runhao Li, Chao Feng, Ruilin Li, Chaojing Tang |
USENIX Security '23 | Attacks are Forwarded: Breaking the Isolation of MicroVM-based Containers Through Operation Forwarding | Jietao Xiao, Nanzi Yang, Wenbo Shen, Jinku Li, Xin Guo, Zhiqiang Dong, Fei Xie, Jianfeng Ma |
USENIX Security '23 | NAUTILUS: Automated RESTful API Vulnerability Detection | Gelei Deng, Zhiyi Zhang, Yuekang Li, Yi Liu, Tianwei Zhang, Yang Liu, Guo Yu, Dongjin Wang |
USENIX Security '23 | An Input-Agnostic Hierarchical Deep Learning Framework for Traffic Fingerprinting | Jian Qu, Xiaobo Ma, Jianfeng Li, Xiapu Luo, Lei Xue, Junjie Zhang, Zhenhua Li, Li Feng, Xiaohong Guan |
USENIX Security '23 | Pass2Edit: A Multi-Step Generative Model for Guessing Edited Passwords | Ding Wang, Yunkai Zou, Yuan-An Xiao, Siqi Ma, Xiaofeng Chen |
USENIX Security '23 | PROVIDENCE: a Flexible Round-by-Round Risk-Limiting Audit | Oliver Broadrick, Poorvi Vora, Filip Zagórski |
USENIX Security '23 | Cipherfix: Mitigating Ciphertext Side-Channel Attacks in Software | Jan Wichelmann, Anna Pätschke, Luca Wilke, Thomas Eisenbarth |
USENIX Security '23 | Subverting Website Fingerprinting Defenses with Robust Traffic Representation | Meng Shen, Kexin Ji, Zhenbo Gao, Qi Li, Liehuang Zhu, Ke Xu |
USENIX Security '23 | User Awareness and Behaviors Concerning Encrypted DNS Settings in Web Browsers | Alexandra Nisenoff, Ranya Sharma, Nick Feamster |
USENIX Security '23 | It's all in your head(set): Side-channel attacks on AR/VR systems | Yicheng Zhang, Carter Slocum, Jiasi Chen, Nael Abu-Ghazaleh |