| ACORN: Input Validation for Secure Aggregation | USENIX Security '23 | James Bell, Adrià Gascón, Tancrède Lepoint, Baiyu Li, Sarah Meiklejohn, Mariana Raykova, Cathie Yun |
| Two Sides of the Shield: Understanding Protective DNS adoption factors | USENIX Security '23 | Elsa Rodríguez, Radu Anghel, Simon Parkin, Michel van Eeten, Carlos Gañán |
| Aliasing Backdoor Attacks on Pre-trained Models | USENIX Security '23 | Cheng'an Wei, Yeonjoon Lee, Kai Chen, Guozhu Meng, Peizhuo Lv |
| QFA2SR: Query-Free Adversarial Transfer Attacks to Speaker Recognition Systems | USENIX Security '23 | Guangke Chen, Yedi Zhang, Zhe Zhao, Fu Song |
| BotScreen: Trust Everybody, but Cut the Aimbots Yourself | USENIX Security '23 | Minyeop Choi, Gihyuk Ko, Sang Kil Cha |
| Detecting API Post-Handling Bugs Using Code and Description in Patches | USENIX Security '23 | Miaoqian Lin, Kai Chen, Yang Xiao |
| Fast IDentity Online with Anonymous Credentials (FIDO-AC) | USENIX Security '23 | Wei-Zhu Yeoh, Michal Kepkowski, Gunnar Heide, Dali Kaafar, Lucjan Hanzlik |
| Time for Change: How Clocks Break UWB Secure Ranging | USENIX Security '23 | Claudio Anliker, Giovanni Camurati, Srdjan Čapkun |
| Efficient Unbalanced Private Set Intersection Cardinality and User-friendly Privacy-preserving Contact Tracing | USENIX Security '23 | Mingli Wu, Tsz Hon Yuen |
| FuncTeller: How Well Does eFPGA Hide Functionality? | USENIX Security '23 | Zhaokun Han, Mohammed Shayan, Aneesh Dixit, Mustafa Shihab, Yiorgos Makris, Jeyavijayan (JV) Rajendran |
| Keep Your Friends Close, but Your Routeservers Closer: Insights into RPKI Validation in the Internet | USENIX Security '23 | Tomas Hlavacek, Haya Shulman, Niklas Vogel, Michael Waidner |
| McFIL: Model Counting Functionality-Inherent Leakage | USENIX Security '23 | Maximilian Zinkus, Yinzhi Cao, Matthew D. Green |
| UVSCAN: Detecting Third-Party Component Usage Violations in IoT Firmware | USENIX Security '23 | Binbin Zhao, Shouling Ji, Xuhong Zhang, Yuan Tian, Qinying Wang, Yuwen Pu, Chenyang Lyu, Raheem Beyah |
| LightThief: Your Optical Communication Information is Stolen behind the Wall | USENIX Security '23 | Xin Liu, Wei Wang, Guanqun Song, Ting Zhu |
| Fuzz The Power: Dual-role State Guided Black-box Fuzzing for USB Power Delivery | USENIX Security '23 | Kyungtae Kim, Sungwoo Kim, Kevin R. B. Butler, Antonio Bianchi, Rick Kennell, Dave (Jing) Tian |
| HorusEye: A Realtime IoT Malicious Traffic Detection Framework using Programmable Switches | USENIX Security '23 | Yutao Dong, Qing Li, Kaidong Wu, Ruoyu Li, Dan Zhao, Gareth Tyson, Junkun Peng, Yong Jiang, Shutao Xia, Mingwei Xu |
| Exploring Tenants' Preferences of Privacy Negotiation in Airbnb | USENIX Security '23 | Zixin Wang, Danny Yuxing Huang, Yaxing Yao |
| PoliGraph: Automated Privacy Policy Analysis using Knowledge Graphs | USENIX Security '23 | Hao Cui, Rahmadi Trimananda, Athina Markopoulou, Scott Jordan |
| Automated Inference on Financial Security of Ethereum Smart Contracts | USENIX Security '23 | Wansen Wang, Wenchao Huang, Zhaoyi Meng, Yan Xiong, Fuyou Miao, Xianjin Fang, Caichang Tu, Renjie Ji |
| SpectrEM: Exploiting Electromagnetic Emanations During Transient Execution | USENIX Security '23 | Jesse De Meulemeester, Antoon Purnal, Lennert Wouters, Arthur Beckers, Ingrid Verbauwhede |
| µFUZZ: Redesign of Parallel Fuzzing using Microservice Architecture | USENIX Security '23 | Yongheng Chen, Rui Zhong, Yupeng Yang, Hong Hu, Dinghao Wu, Wenke Lee |
| Powering Privacy: On the Energy Demand and Feasibility of Anonymity Networks on Smartphones | USENIX Security '23 | Daniel Hugenroth, Alastair R. Beresford |
| ReUSB: Replay-Guided USB Driver Fuzzing | USENIX Security '23 | |
| FISHFUZZ: Catch Deeper Bugs by Throwing Larger Nets | USENIX Security '23 | Han Zheng, Jiayuan Zhang, Yuhang Huang, Zezhong Ren, He Wang, Chunjie Cao, Yuqing Zhang, Flavio Toffalini, Mathias Payer |
| Reusable Enclaves for Confidential Serverless Computing | USENIX Security '23 | Shixuan Zhao, Pinshen Xu, Guoxing Chen, Mengya Zhang, Yinqian Zhang, Zhiqiang Lin |