| What Are the Chances? Explaining the Epsilon Parameter in Differential Privacy | USENIX Security '23 | Priyanka Nanayakkara, Mary Anne Smart, Rachel Cummings, Gabriel Kaptchuk, Elissa M. Redmiles |
| Glaze: Protecting Artists from Style Mimicry by Text-to-Image Models | USENIX Security '23 | Shawn Shan, Jenna Cryan, Emily Wenger, Haitao Zheng, Rana Hanocka, Ben Y. Zhao |
| “To Do This Properly, You Need More Resources”: The Hidden Costs of Introducing Simulated Phishing Campaigns | USENIX Security '23 | Lina Brunken, Annalina Buckmann, Jonas Hielscher, M. Angela Sasse |
| Uncontained: Uncovering Container Confusion in the Linux Kernel | USENIX Security '23 | Jakob Koschel, Pietro Borrello, Daniele Cono D'Elia, Herbert Bos, Cristiano Giuffrida |
| DScope: A Cloud-Native Internet Telescope | USENIX Security '23 | Eric Pauley, Paul Barford, Patrick McDaniel |
| Exploring the Unknown DTLS Universe: Analysis of the DTLS Server Ecosystem on the Internet | USENIX Security '23 | Nurullah Erinola, Marcel Maehren, Robert Merget, Juraj Somorovsky, Jörg Schwenk |
| A Study of China's Censorship and Its Evasion Through the Lens of Online Gaming | USENIX Security '23 | Yuzhou Feng, Ruyu Zhai, Radu Sion, Bogdan Carbunar |
| A Mixed-Methods Study of Security Practices of Smart Contract Developers | USENIX Security '23 | Tanusree Sharma, Zhixuan Zhou, Andrew Miller, Yang Wang |
| Snapping Snap Sync: Practical Attacks on Go Ethereum Synchronising Nodes | USENIX Security '23 | Massimiliano Taverna, Kenneth G. Paterson |
| The Digital-Safety Risks of Financial Technologies for Survivors of Intimate Partner Violence | USENIX Security '23 | Rosanna Bellini, Kevin Lee, Megan A. Brown, Jeremy Shaffer, Rasika Bhalerao, Thomas Ristenpart |
| Synchronization Storage Channels (S2C): Timer-less Cache Side-Channel Attacks on the Apple M1 via Hardware Synchronization Instructions | USENIX Security '23 | Jiyong Yu, Aishani Dutta, Trent Jaeger, David Kohlbrenner, Christopher W. Fletcher |
| PTW: Pivotal Tuning Watermarking for Pre-Trained Image Generators | USENIX Security '23 | Nils Lukas, Florian Kerschbaum |
| Mixed Signals: Analyzing Ground-Truth Data on the Users and Economics of a Bitcoin Mixing Service | USENIX Security '23 | Fieke Miedema, Kelvin Lubbertsen, Verena Schrama, Rolf van Wegberg |
| Problematic Advertising and its Disparate Exposure on Facebook | USENIX Security '23 | Muhammad Ali, Angelica Goetzen, Alan Mislove, Elissa M. Redmiles, Piotr Sapiezynski |
| Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations | USENIX Security '23 | Tadayoshi Kohno, Yasemin Acar, Wulf Loh |
| A Peek into the Metaverse: Detecting 3D Model Clones in Mobile Games | USENIX Security '23 | Chaoshun Zuo, Chao Wang, Zhiqiang Lin |
| Exploring Privacy and Incentives Considerations in Adoption of COVID-19 Contact Tracing Apps | USENIX Security '23 | Oshrat Ayalon, Dana Turjeman, Elissa M. Redmiles |
| Towards A Proactive ML Approach for Detecting Backdoor Poison Samples | USENIX Security '23 | Xiangyu Qi, Tinghao Xie, Jiachen T. Wang, Tong Wu, Saeed Mahloujifar, Prateek Mittal |
| Extracting Training Data from Diffusion Models | USENIX Security '23 | Nicolas Carlini, Jamie Hayes, Milad Nasr, Matthew Jagielski, Vikash Sehwag, Florian Tramèr, Borja Balle, Daphne Ippolito, Eric Wallace |
| BASECOMP: A Comparative Analysis for Integrity Protection in Cellular Baseband Software | USENIX Security '23 | Eunsoo Kim, Min Woo Baek, CheolJun Park, Dongkwan Kim, Yongdae Kim, Insu Yun |
| Instructions Unclear: Undefined Behaviour in Cellular Network Specifications | USENIX Security '23 | Daniel Klischies, Moritz Schloegel, Tobias Scharnowski, Mikhail Bogodukhov, David Rupprecht, Veelasha Moonsamy |
| RøB: Ransomware over Modern Web Browsers | USENIX Security '23 | Harun Oz, Ahmet Aris, Abbas Acar, Güliz Seray Tuncay, Leonardo Babun, Selcuk Uluagac |
| Precise and Generalized Robustness Certification for Neural Networks | USENIX Security '23 | Yuanyuan Yuan, Shuai Wang, Zhendong Su |
| Account Security Interfaces: Important, Unintuitive, and Untrustworthy | USENIX Security '23 | Alaa Daffalla, Marina Bohuk, Nicola Dell, Rosanna Bellini, Thomas Ristenpart |
| "It's the Equivalent of Feeling Like You're in Jail”: Lessons from Firsthand and Secondhand Accounts of IoT-Enabled Intimate Partner Abuse | USENIX Security '23 | Sophie Stephenson, Majed Almansoori, Pardis Emami-Naeini, Rahul Chatterjee |