| Othered, Silenced and Scapegoated: Understanding the Situated Security of Marginalised Populations in Lebanon | USENIX Security '23 | Jessica McClearn, Rikke Bjerg Jensen, Reem Talhouk |
| Glimpse: On-Demand PoW Light Client with Constant-Size Storage for DeFi | USENIX Security '23 | Giulia Scaffino, Lukas Aumayr, Zeta Avarikioti, Matteo Maffei |
| VIPER: Spotting Syscall-Guard Variables for Data-Only Attacks | USENIX Security '23 | Hengkai Ye, Song Liu, Zhechang Zhang, Hong Hu |
| How to Bind Anonymous Credentials to Humans | USENIX Security '23 | Julia Hesse, Nitin Singh, Alessandro Sorniotti |
| zkSaaS: Zero-Knowledge SNARKs as a Service | USENIX Security '23 | Sanjam Garg, Aarushi Goel, Abhishek Jain, Guru-Vamsi Policharla, Sruthi Sekar |
| Auditing Framework APIs via Inferred App-side Security Specifications | USENIX Security '23 | Parjanya Vyas, Asim Waheed, Yousra Aafer, N. Asokan |
| Hot Pixels: Frequency, Power, and Temperature Attacks on GPUs and Arm SoCs | USENIX Security '23 | Hritvik Taneja, Jason Kim, Jie Jeff Xu, Stephan van Schaik, Daniel Genkin, Yuval Yarom |
| Notice the Imposter! A Study on User Tag Spoofing Attack in Mobile Apps | USENIX Security '23 | Shuai Li, Zhemin Yang, Guangliang Yang, Hange Zhang, Nan Hua, Yurui Huang, Min Yang |
| CodexLeaks: Privacy Leaks from Code Generation Language Models in GitHub Copilot | USENIX Security '23 | Liang Niu, Shujaat Mirza, Zayd Maradni, Christina Pöpper |
| Differential Testing of Cross Deep Learning Framework APIs: Revealing Inconsistencies and Vulnerabilities | USENIX Security '23 | Zizhuang Deng, Guozhu Meng, Kai Chen, Tong Liu, Lu Xiang, Chunyang Chen |
| HyPFuzz: Formal-Assisted Processor Fuzzing | USENIX Security '23 | Chen Chen, Rahul Kande, Nathan Nguyen, Flemming Andersen, Aakash Tyagi, Ahmad-Reza Sadeghi, Jeyavijayan Rajendran |
| Cross Container Attacks: The Bewildered eBPF on Clouds | USENIX Security '23 | Yi He, Roland Guo, Yunlong Xing, Xijia Che, Kun Sun, Zhuotao Liu, Ke Xu, Qi Li |
| Security Analysis of MongoDB Queryable Encryption | USENIX Security '23 | Zichen Gui, Kenneth G. Paterson, Tianxin Tang |
| LocIn: Inferring Semantic Location from Spatial Maps in Mixed Reality | USENIX Security '23 | Habiba Farrukh, Reham Mohamed, Aniket Nare, Antonio Bianchi, Z. Berkay Celik |
| FloatZone: Accelerating Memory Error Detection using the Floating Point Unit | USENIX Security '23 | Floris Gorter, Enrico Barberis, Raphael Isemann, Erik van der Kouwe, Cristiano Giuffrida, Herbert Bos |
| How Effective is Multiple-Vantage-Point Domain Control Validation? | USENIX Security '23 | Grace H. Cimaszewski, Henry Birge-Lee, Liang Wang, Jennifer Rexford, Prateek Mittal |
| Sparsity Brings Vulnerabilities: Exploring New Metrics in Backdoor Attacks | USENIX Security '23 | Jianwen Tian, Kefan Qiu, Debin Gao, Zhi Wang, Xiaohui Kuang, Gang Zhao |
| Examining Power Dynamics and User Privacy in Smart Technology Use Among Jordanian Households | USENIX Security '23 | Wael Albayaydh, Ivan Flechais |
| "I'm going to trust this until it burns me" Parents' Privacy Concerns and Delegation of Trust in K-8 Educational Technology | USENIX Security '23 | Victoria Zhong, Susan McGregor, Rachel Greenstadt |
| DAFL: Directed Grey-box Fuzzing guided by Data Dependency | USENIX Security '23 | Tae Eun Kim, Jaeseung Choi, Kihong Heo, Sang Kil Cha |
| Powering for Privacy: Improving User Trust in Smart Speaker Microphones with Intentional Powering and Perceptible Assurance | USENIX Security '23 | Youngwook Do, Nivedita Arora, Ali Mirzazadeh, Injoo Moon, Eryue Xu, Zhihan Zhang, Gregory D. Abowd, Sauvik Das |
| Pushed by Accident: A Mixed-Methods Study on Strategies of Handling Secret Information in Source Code Repositories | USENIX Security '23 | Alexander Krause, Jan H. Klemmer, Nicolas Huaman, Dominik Wermke, Yasemin Acar, Sascha Fahl |
| ACFA: Secure Runtime Auditing & Guaranteed Device Healing via Active Control Flow Attestation | USENIX Security '23 | Adam Caulfield, Norrathep Rattanavipanon, Ivan De Oliveira Nunes |
| Account Verification on Social Media: User Perceptions and Paid Enrollment | USENIX Security '23 | Madelyne Xiao, Mona Wang, Anunay Kulshrestha, Jonathan Mayer |
| In the Quest to Protect Users from Side-Channel Attacks – A User-Centred Design Space to Mitigate Thermal Attacks on Public Payment Terminals | USENIX Security '23 | Karola Marky, Shaun Macdonald, Yasmeen Abdrabou, Mohamed Khamis |