| Bad Metrics and Very Bad Decisions | PEPR '23 | Lea Kissner |
| Designing the Pilot Release of Israel's National Registry of Live Births: Reconciling Privacy with Accuracy and Usability | PEPR '23 | Shlomi Hod |
| Per-Record Privacy and Its Application to Heavy-Tailed Economic Data | PEPR '23 | William Sexton |
| Communicating Differential Privacy Guarantees to Data Subjects | PEPR '23 | Priyanka Nanayakkara |
| Plume: Differential Privacy at Scale | PEPR '23 | Alex Kulesza |
| How to Break, Then Fix, Differential Privacy on Finite Computers | PEPR '23 | Damien Desfontaines, Samuel Haney |
| Demystifying Access Control in the Modern Data Warehouse | PEPR '23 | Viraj Thakur |
| Algorithmic Transparency in Personalized Advertising: Learnings from Building "Why Am I Seeing This Ad?" | PEPR '23 | Xuanting Cai, Rajesh Shenoy, Anuj Gupta |
| WhatsApp Key Transparency | PEPR '23 | Kevin Lewi |
| Counting with STAR: Shipping a Privacy-Preserving Telemetry System to Millions of Users | PEPR '23 | Shivan Kaul Sahib |
| Designing a Private Logging Pipeline | PEPR '23 | Mekhola Mukherjee, Thomas Vannet |
| Automated Analysis of Protocols that use Authenticated Encryption: How Subtle AEAD Differences can impact Protocol Security | USENIX Security '23 | Cas Cremers, Alexander Dax, Charlie Jacomme, Mang Zhao |
| A Two-Decade Retrospective Analysis of a University's Vulnerability to Attacks Exploiting Reused Passwords | USENIX Security '23 | Alexandra Nisenoff, Maximilian Golla, Miranda Wei, Juliette Hainline, Hayley Szymanek, Annika Braun, Annika Hildebrandt, Blair Christensen, David Langenberg, Blase Ur |
| All cops are broadcasting: TETRA under scrutiny | USENIX Security '23 | Carlo Meijer, Wouter Bokslag, Jos Wetzels |
| Anatomy of a High-Profile Data Breach: Dissecting the Aftermath of a Crypto-Wallet Case | USENIX Security '23 | Svetlana Abramova, Rainer Böhme |
| Near-Optimal Oblivious Key-Value Stores for Efficient PSI, PSU and Volume-Hiding Multi-Maps | USENIX Security '23 | Alexander Bienstock, Sarvar Patel, Joon Young Seo, Kevin Yeo |
| Lost in Conversion: Exploit Data Structure Conversion with Attribute Loss to Break Android Systems | USENIX Security '23 | Rui Li, Wenrui Diao, Shishuai Yang, Xiangyu Liu, Shanqing Guo, Kehuan Zhang |
| Tight Auditing of Differentially Private Machine Learning | USENIX Security '23 | Milad Nasr, Jamie Hayes, Thomas Steinke, Borja Balle, Florian Tramèr, Matthew Jagielski, Nicholas Carlini, Andreas Terzis |
| SQIRL: Grey-Box Detection of SQL Injection Vulnerabilities Using Reinforcement Learning | USENIX Security '23 | Salim Al Wahaibi, Myles Foley, Sergio Maffeis |
| FedVal: Different good or different bad in federated learning | USENIX Security '23 | Viktor Valadi, Xinchi Qiu, Pedro Porto Buarque de Gusmão, Nicholas D. Lane, Mina Alibeigi |
| Remote Direct Memory Introspection | USENIX Security '23 | Hongyi Liu, Jiarong Xing, Yibo Huang, Danyang Zhuo, Srinivas Devadas, Ang Chen |
| Continuous Learning for Android Malware Detection | USENIX Security '23 | Yizheng Chen, Zhoujie Ding, David Wagner |
| Inception: Exposing New Attack Surfaces with Training in Transient Execution | USENIX Security '23 | Daniël Trujillo, Johannes Wikner, Kaveh Razavi |
| A Hybrid Alias Analysis and Its Application to Global Variable Protection in the Linux Kernel | USENIX Security '23 | Guoren Li, Hang Zhang, Jinmeng Zhou, Wenbo Shen, Yulei Sui, Zhiyun Qian |
| Unique Identification of 50,000+ Virtual Reality Users from Head & Hand Motion Data | USENIX Security '23 | Vivek Nair, Wenbo Guo, Justus Mattern, Rui Wang, James F. O'Brien, Louis Rosenberg, Dawn Song |