| HashTag: Hash-based Integrity Protection for Tagged Architectures | USENIX Security '23 | Lukas Lamster, Martin Unterguggenberger, David Schrammel, Stefan Mangard |
| Inductive Graph Unlearning | USENIX Security '23 | Cheng-Long Wang, Mengdi Huai, Di Wang |
| Systematic Assessment of Fuzzers using Mutation Analysis | USENIX Security '23 | Philipp Görz, Björn Mathis, Keno Hassler, Emre Güler, Thorsten Holz, Andreas Zeller, Rahul Gopinath |
| Auditing Frameworks Need Resource Isolation: A Systematic Study on the Super Producer Threat to System Auditing and Its Mitigation | USENIX Security '23 | Peng Jiang, Ruizhe Huang, Ding Li, Yao Guo, Xiangqun Chen, Jianhai Luan, Yuxin Ren, Xinwei Hu |
| SCARF – A Low-Latency Block Cipher for Secure Cache-Randomization | USENIX Security '23 | Federico Canale, Tim Güneysu, Gregor Leander, Jan Philipp Thoma, Yosuke Todo, Rei Ueno |
| WHIP: Improving Static Vulnerability Detection in Web Application by Forcing tools to Collaborate | USENIX Security '23 | Feras Al-Kassar, Luca Compagna, Davide Balzarotti |
| PORE: Provably Robust Recommender Systems against Data Poisoning Attacks | USENIX Security '23 | Jinyuan Jia, Yupei Liu, Yuepeng Hu, Neil Zhenqiang Gong |
| AnimateDead: Debloating Web Applications Using Concolic Execution | USENIX Security '23 | Babak Amin Azad, Rasoul Jahanshahi, Chris Tsoukaladelis, Manuel Egele, Nick Nikiforakis |
| Cheesecloth: Zero-Knowledge Proofs of Real World Vulnerabilities | USENIX Security '23 | Santiago Cuéllar, Bill Harris, James Parker, Stuart Pernsteiner, Eran Tromer |
| Towards Targeted Obfuscation of Adversarial Unsafe Images using Reconstruction and Counterfactual Super Region Attribution Explainability | USENIX Security '23 | Mazal Bethany, Andrew Seong, Samuel Henrique Silva, Nicole Beebe, Nishant Vishwamitra, Peyman Najafirad |
| Sneaky Spy Devices and Defective Detectors: The Ecosystem of Intimate Partner Surveillance with Covert Devices | USENIX Security '23 | Rose Ceccio, Sophie Stephenson, Varun Chadha, Danny Yuxing Huang, Rahul Chatterjee |
| Hoedur: Embedded Firmware Fuzzing using Multi-Stream Inputs | USENIX Security '23 | |
| Tubes Among Us: Analog Attack on Automatic Speaker Identification | USENIX Security '23 | Shimaa Ahmed, Yash Wani, Ali Shahin Shamsabadi, Mohammad Yaghini, Ilia Shumailov, Nicolas Papernot, Kassem Fawaz |
| Practical Asynchronous High-threshold Distributed Key Generation and Distributed Polynomial Sampling | USENIX Security '23 | Sourav Das, Zhuolun Xiang, Lefteris Kokoris-Kogias, Ling Ren |
| Every Vote Counts: Ranking-Based Training of Federated Learning to Resist Poisoning Attacks | USENIX Security '23 | Hamid Mozaffari, Virat Shejwalkar, Amir Houmansadr |
| Hidden Reality: Caution, Your Hand Gesture Inputs in the Immersive Virtual World are Visible to All! | USENIX Security '23 | Sindhu Reddy Kalathur Gopal, Diksha Shukla, James David Wheelock, Nitesh Saxena |
| ARI: Attestation of Real-time Mission Execution Integrity | USENIX Security '23 | Jinwen Wang, Yujie Wang, Ao Li, Yang Xiao, Ruide Zhang, Wenjing Lou, Y. Thomas Hou, Ning Zhang |
| XCheck: Verifying Integrity of 3D Printed Patient-Specific Devices via Computing Tomography | USENIX Security '23 | Zhiyuan Yu, Yuanhaur Chang, Shixuan Zhai, Nicholas Deily, Tao Ju, XiaoFeng Wang, Uday Jammalamadaka, Ning Zhang |
| Eos: Efficient Private Delegation of zkSNARK Provers | USENIX Security '23 | Alessandro Chiesa, Ryan Lehmkuhl, Pratyush Mishra, Yinuo Zhang |
| PELICAN: Exploiting Backdoors of Naturally Trained Deep Learning Models In Binary Code Analysis | USENIX Security '23 | Zhuo Zhang, Guanhong Tao, Guangyu Shen, Shengwei An, Qiuling Xu, Yingqi Liu, Yapeng Ye, Yaoxuan Wu, Xiangyu Zhang |
| The Gates of Time: Improving Cache Attacks with Transient Execution | USENIX Security '23 | Daniel Katzman, William Kosasih, Chitchanok Chuengsatiansup, Eyal Ronen, Yuval Yarom |
| TRust: A Compilation Framework for In-process Isolation to Protect Safe Rust against Untrusted Code | USENIX Security '23 | Inyoung Bang, Martin Kayondo, Hyungon Moon, Yunheung Paek |
| The Most Dangerous Codec in the World: Finding and Exploiting Vulnerabilities in H.264 Decoders | USENIX Security '23 | Willy R. Vasquez, Stephen Checkoway, Hovav Shacham |
| Temporal CDN-Convex Lens: A CDN-Assisted Practical Pulsing DDoS Attack | USENIX Security '23 | Run Guo, Jianjun Chen, Yihang Wang, Keran Mu, Baojun Liu, Xiang Li, Chao Zhang, Haixin Duan, Jianping Wu |
| A Large Scale Study of the Ethereum Arbitrage Ecosystem | USENIX Security '23 | Robert McLaughlin, Christopher Kruegel, Giovanni Vigna |