| DeResistor: Toward Detection-Resistant Probing for Evasion of Internet Censorship | USENIX Security '23 | Abderrahmen Amich, Birhanu Eshete, Vinod Yegneswaran, Nguyen Phong Hoang |
| Can a Deep Learning Model for One Architecture Be Used for Others? Retargeted-Architecture Binary Code Analysis | USENIX Security '23 | Junzhe Wang, Matthew Sharp, Chuxiong Wu, Qiang Zeng, Lannan Luo |
| A Bug's Life: Analyzing the Lifecycle and Mitigation Process of Content Security Policy Bugs | USENIX Security '23 | Gertjan Franken, Tom Van Goethem, Lieven Desmet, Wouter Joosen |
| To Cloud or not to Cloud: A Qualitative Study on Self-Hosters' Motivation, Operation, and Security Mindset | USENIX Security '23 | Lea Gröber, Rafael Mrowczynski, Nimisha Vijay, Daphne A. Muller, Adrian Dabrowski, Katharina Krombholz |
| Extended Hell(o): A Comprehensive Large-Scale Study on Email Confidentiality and Integrity Mechanisms in the Wild | USENIX Security '23 | Birk Blechschmidt, Ben Stock |
| Bypassing Tunnels: Leaking VPN Client Traffic by Abusing Routing Tables | USENIX Security '23 | Nian Xue, Yashaswi Malla, Zihang Xia, Christina Pöpper, Mathy Vanhoef |
| Speculation at Fault: Modeling and Testing Microarchitectural Leakage of CPU Exceptions | USENIX Security '23 | Jana Hofmann, Emanuele Vannacci, Cédric Fournet, Boris Köpf, Oleksii Oleksenko |
| You've Got Report: Measurement and Security Implications of DMARC Reporting | USENIX Security '23 | Md. Ishtiaq Ashiq, Weitong Li, Tobias Fiebig, Taejoong Chung |
| Cryptographic Deniability: A Multi-perspective Study of User Perceptions and Expectations | USENIX Security '23 | Tarun Kumar Yadav, Devashish Gosain, Kent Seamons |
| TVA: A multi-party computation system for secure and expressive time series analytics | USENIX Security '23 | Muhammad Faisal, Jerry Zhang, John Liagouris, Vasiliki Kalavri, Mayank Varia |
| Greenhouse: Single-Service Rehosting of Linux-Based Firmware Binaries in User-Space Emulation | USENIX Security '23 | Hui Jun Tay, Kyle Zeng, Jayakrishna Menon Vadayath, Arvind S Raj, Audrey Dutcher, Tejesh Reddy, Wil Gibbs, Zion Leonahenahe Basque, Fangzhou Dong, Zack Smith, Adam Doupé, Tiffany Bao, Yan Shoshitaishvili, Ruoyu Wang |
| On the Security Risks of Knowledge Graph Reasoning | USENIX Security '23 | Zhaohan Xi, Tianyu Du, Changjiang Li, Ren Pang, Shouling Ji, Xiapu Luo, Xusheng Xiao, Fenglong Ma, Ting Wang |
| Private Proof-of-Stake Blockchains using Differentially-Private Stake Distortion | USENIX Security '23 | Chenghong Wang, David Pujol, Kartik Nayak, Ashwin Machanavajjhala |
| Union under Duress: Understanding Hazards of Duplicate Resource Mismediation in Android Software Supply Chain | USENIX Security '23 | Xueqiang Wang, Yifan Zhang, XiaoFeng Wang, Yan Jia, Luyi Xing |
| Medusa Attack: Exploring Security Hazards of In-App QR Code Scanning | USENIX Security '23 | Xing Han, Yuheng Zhang, Xue Zhang, Zeyuan Chen, Mingzhe Wang, Yiwei Zhang, Siqi Ma, Yu Yu, Elisa Bertino, Juanru Li |
| LibScan: Towards More Precise Third-Party Library Identification for Android Applications | USENIX Security '23 | Yafei Wu, Cong Sun, Dongrui Zeng, Gang Tan, Siqi Ma, Peicheng Wang |
| Beyond Typosquatting: An In-depth Look at Package Confusion | USENIX Security '23 | Shradha Neupane, Grant Holmes, Elizabeth Wyss, Drew Davidson, Lorenzo De Carli |
| PrivGraph: Differentially Private Graph Data Publication by Exploiting Community Information | USENIX Security '23 | Quan Yuan, Zhikun Zhang, Linkang Du, Min Chen, Peng Cheng, Mingyang Sun |
| WaterBear: Practical Asynchronous BFT Matching Security Guarantees of Partially Synchronous BFT | USENIX Security '23 | Haibin Zhang, Sisi Duan, Boxin Zhao, Liehuang Zhu |
| FACE-AUDITOR: Data Auditing in Facial Recognition Systems | USENIX Security '23 | Min Chen, Zhikun Zhang, Tianhao Wang, Michael Backes, Yang Zhang |
| Rods with Laser Beams: Understanding Browser Fingerprinting on Phishing Pages | USENIX Security '23 | Iskander Sanchez-Rola, Leyla Bilge, Davide Balzarotti, Armin Buescher, Petros Efstathopoulos |
| Dubhe: Succinct Zero-Knowledge Proofs for Standard AES and related Applications | USENIX Security '23 | Changchang Ding, Yan Huang |
| Two-in-One: A Model Hijacking Attack Against Text Generation Models | USENIX Security '23 | Wai Man Si, Michael Backes, Yang Zhang, Ahmed Salem |
| Evading Provenance-Based ML Detectors with Adversarial System Actions | USENIX Security '23 | Kunal Mukherjee, Joshua Wiedemeier, Tianhao Wang, James Wei, Feng Chen, Muhyun Kim, Murat Kantarcioglu, Kangkook Jee |
| Curve Trees: Practical and Transparent Zero-Knowledge Accumulators | USENIX Security '23 | Matteo Campanelli, Mathias Hall-Andersen, Simon Holmgaard Kamp |