| Sherlock on Specs: Building LTE Conformance Tests through Automated Reasoning | USENIX Security '23 | Yi Chen, Di Tang, Yepeng Yao, Mingming Zha, XiaoFeng Wang, Xiaozhong Liu, Haixu Tang, Baoxu Liu |
| Did the Shark Eat the Watchdog in the NTP Pool? Deceiving the NTP Pool’s Monitoring System | USENIX Security '23 | Jonghoon Kwon, Jeonggyu Song, Junbeom Hur, Adrian Perrig |
| Downfall: Exploiting Speculative Data Gathering | USENIX Security '23 | Daniel Moghimi |
| Formal Analysis of SPDM: Security Protocol and Data Model version 1.2 | USENIX Security '23 | Cas Cremers, Alexander Dax, Aurora Naska |
| V1SCAN: Discovering 1-day Vulnerabilities in Reused C/C++ Open-source Software Components Using Code Classification Techniques | USENIX Security '23 | Seunghoon Woo, Eunjin Choi, Heejo Lee, Hakjoo Oh |
| BunnyHop: Exploiting the Instruction Prefetcher | USENIX Security '23 | Zhiyuan Zhang, Mingtian Tao, Sioli O'Connell, Chitchanok Chuengsatiansup, Daniel Genkin, Yuval Yarom |
| DiffSmooth: Certifiably Robust Learning via Diffusion Models and Local Smoothing | USENIX Security '23 | Jiawei Zhang, Zhongzhu Chen, Huan Zhang, Chaowei Xiao, Bo Li |
| ACon^2: Adaptive Conformal Consensus for Provable Blockchain Oracles | USENIX Security '23 | Sangdon Park, Osbert Bastani, Taesoo Kim |
| Measuring Up to (Reasonable) Consumer Expectations: Providing an Empirical Basis for Holding IoT Manufacturers Legally Responsible | USENIX Security '23 | Lorenz Kustosch, Carlos Gañán, Mattis van 't Schip, Michel van Eeten, Simon Parkin |
| A Data-free Backdoor Injection Approach in Neural Networks | USENIX Security '23 | Peizhuo Lv, Chang Yue, Ruigang Liang, Yunfei Yang, Shengzhi Zhang, Hualong Ma, Kai Chen |
| HECO: Fully Homomorphic Encryption Compiler | USENIX Security '23 | Alexander Viand, Patrick Jattke, Miro Haller, Anwar Hithnawi |
| Automated Exploitable Heap Layout Generation for Heap Overflows Through Manipulation Distance-Guided Fuzzing | USENIX Security '23 | Bin Zhang, Jiongyi Chen, Runhao Li, Chao Feng, Ruilin Li, Chaojing Tang |
| Attacks are Forwarded: Breaking the Isolation of MicroVM-based Containers Through Operation Forwarding | USENIX Security '23 | Jietao Xiao, Nanzi Yang, Wenbo Shen, Jinku Li, Xin Guo, Zhiqiang Dong, Fei Xie, Jianfeng Ma |
| NAUTILUS: Automated RESTful API Vulnerability Detection | USENIX Security '23 | Gelei Deng, Zhiyi Zhang, Yuekang Li, Yi Liu, Tianwei Zhang, Yang Liu, Guo Yu, Dongjin Wang |
| An Input-Agnostic Hierarchical Deep Learning Framework for Traffic Fingerprinting | USENIX Security '23 | Jian Qu, Xiaobo Ma, Jianfeng Li, Xiapu Luo, Lei Xue, Junjie Zhang, Zhenhua Li, Li Feng, Xiaohong Guan |
| Pass2Edit: A Multi-Step Generative Model for Guessing Edited Passwords | USENIX Security '23 | Ding Wang, Yunkai Zou, Yuan-An Xiao, Siqi Ma, Xiaofeng Chen |
| PROVIDENCE: a Flexible Round-by-Round Risk-Limiting Audit | USENIX Security '23 | Oliver Broadrick, Poorvi Vora, Filip Zagórski |
| Cipherfix: Mitigating Ciphertext Side-Channel Attacks in Software | USENIX Security '23 | Jan Wichelmann, Anna Pätschke, Luca Wilke, Thomas Eisenbarth |
| Subverting Website Fingerprinting Defenses with Robust Traffic Representation | USENIX Security '23 | Meng Shen, Kexin Ji, Zhenbo Gao, Qi Li, Liehuang Zhu, Ke Xu |
| User Awareness and Behaviors Concerning Encrypted DNS Settings in Web Browsers | USENIX Security '23 | Alexandra Nisenoff, Ranya Sharma, Nick Feamster |
| It's all in your head(set): Side-channel attacks on AR/VR systems | USENIX Security '23 | Yicheng Zhang, Carter Slocum, Jiasi Chen, Nael Abu-Ghazaleh |
| Work-From-Home and COVID-19: Trajectories of Endpoint Security Management in a Security Operations Center | USENIX Security '23 | Kailani R. Jones, Dalton A. Brucker-Hahn, Bradley Fidler, Alexandru G. Bardas |
| Adversarial Training for Raw-Binary Malware Classifiers | USENIX Security '23 | Keane Lucas, Samruddhi Pai, Weiran Lin, Lujo Bauer, Michael K. Reiter, Mahmood Sharif |
| ELASM: Error-Latency-Aware Scale Management for Fully Homomorphic Encryption | USENIX Security '23 | Yongwoo Lee, Seonyoung Cheon, Dongkwan Kim, Dongyoon Lee, Hanjun Kim |
| Abuse Vectors: A Framework for Conceptualizing IoT-Enabled Interpersonal Abuse | USENIX Security '23 | Sophie Stephenson, Majed Almansoori, Pardis Emami-Naeini, Danny Yuxing Huang, Rahul Chatterjee |