| An Empirical Study & Evaluation of Modern CAPTCHAs | USENIX Security '23 | Andrew Searles, Yoshimichi Nakatsuka, Ercan Ozturk, Andrew Paverd, Gene Tsudik, Ai Enkoji |
| Checking Passwords on Leaky Computers: A Side Channel Analysis of Chrome's Password Leak Detect Protocol | USENIX Security '23 | Andrew Kwong, Walter Wang, Jason Kim, Jonathan Berger, Daniel Genkin, Eyal Ronen, Hovav Shacham, Riad Wahby, Yuval Yarom |
| AIRTAG: Towards Automated Attack Investigation by Unsupervised Learning with Log Texts | USENIX Security '23 | Hailun Ding, Juan Zhai, Yuhong Nan, Shiqing Ma |
| Wink: Deniable Secure Messaging | USENIX Security '23 | Anrin Chakraborti, Darius Suciu, Radu Sion |
| PATROL: Provable Defense against Adversarial Policy in Two-player Games | USENIX Security '23 | Wenbo Guo, Xian Wu, Lun Wang, Xinyu Xing, Dawn Song |
| Cryptographic Administration for Secure Group Messaging | USENIX Security '23 | David Balbás, Daniel Collins, Serge Vaudenay |
| RIDAS: Real-time identification of attack sources on controller area networks | USENIX Security '23 | Jiwoo Shin, Hyunghoon Kim, Seyoung Lee, Wonsuk Choi, Dong Hoon Lee, Hyo Jin Jo |
| No Linux, No Problem: Fast and Correct Windows Binary Fuzzing via Target-embedded Snapshotting | USENIX Security '23 | Leo Stone, Rishi Ranjan, Stefan Nagy, Matthew Hicks |
| Not All Data are Created Equal: Data and Pointer Prioritization for Scalable Protection Against Data-Oriented Attacks | USENIX Security '23 | Salman Ahmed, Hans Liljestrand, Hani Jamjoom, Matthew Hicks, N. Asokan, Danfeng (Daphne) Yao |
| Freaky Leaky SMS: Extracting User Locations by Analyzing SMS Timings | USENIX Security '23 | Evangelos Bitsikas, Theodor Schnitzler, Christina Pöpper, Aanjhan Ranganathan |
| EnigMap: External-Memory Oblivious Map for Secure Enclaves | USENIX Security '23 | Afonso Tinoco, Sixiang Gao, Elaine Shi |
| Spying through Your Voice Assistants: Realistic Voice Command Fingerprinting | USENIX Security '23 | Dilawer Ahmed, Aafaq Sabir, Anupam Das |
| Efficient 3PC for Binary Circuits with Application to Maliciously-Secure DNN Inference | USENIX Security '23 | Yun Li, Yufei Duan, Zhicong Huang, Cheng Hong, Chao Zhang, Yifan Song |
| "Un-Equal Online Safety?" A Gender Analysis of Security and Privacy Protection Advice and Behaviour Patterns | USENIX Security '23 | Kovila P.L. Coopamootoo, Magdalene Ng |
| Extracting Protocol Format as State Machine via Controlled Static Loop Analysis | USENIX Security '23 | Qingkai Shi, Xiangzhe Xu, Xiangyu Zhang |
| Network Detection of Interactive SSH Impostors Using Deep Learning | USENIX Security '23 | Julien Piet, Aashish Sharma, Vern Paxson, David Wagner |
| Calpric: Inclusive and Fine-grain Labeling of Privacy Policies with Crowdsourcing and Active Learning | USENIX Security '23 | Wenjun Qiu, David Lie, Lisa Austin |
| One Size Does Not Fit All: Uncovering and Exploiting Cross Platform Discrepant APIs in WeChat | USENIX Security '23 | Chao Wang, Yue Zhang, Zhiqiang Lin |
| KENKU: Towards Efficient and Stealthy Black-box Adversarial Attacks against ASR Systems | USENIX Security '23 | Xinghui Wu, Shiqing Ma, Chao Shen, Chenhao Lin, Qian Wang, Qi Li, Yuan Rao |
| “I wouldn't want my unsafe code to run my pacemaker”: An Interview Study on the Use, Comprehension, and Perceived Risks of Unsafe Rust | USENIX Security '23 | Sandra Höltervennhoff, Philip Klostermeyer, Noah Wöhler, Yasemin Acar, Sascha Fahl |
| Detecting Union Type Confusion in Component Object Model | USENIX Security '23 | Yuxing Zhang, Xiaogang Zhu, Daojing He, Minhui Xue, Shouling Ji, Mohammad Sayad Haghighi, Sheng Wen, Zhiniang Peng |
| AlphaEXP: An Expert System for Identifying Security-Sensitive Kernel Objects | USENIX Security '23 | Ruipeng Wang, Kaixiang Chen, Chao Zhang, Zulie Pan, Qianyu Li, Siliang Qin, Shenglin Xu, Min Zhang, Yang Li |
| Knowledge Expansion and Counterfactual Interaction for Reference-Based Phishing Detection | USENIX Security '23 | Ruofan Liu, Yun Lin, Yifan Zhang, Penn Han Lee, Jin Song Dong |
| Discovering Adversarial Driving Maneuvers against Autonomous Vehicles | USENIX Security '23 | Ruoyu Song, Muslum Ozgur Ozmen, Hyungsub Kim, Raymond Muller, Z. Berkay Celik, Antonio Bianchi |
| Demystifying Pointer Authentication on Apple M1 | USENIX Security '23 | Zechao Cai, Jiaxun Zhu, Wenbo Shen, Yutian Yang, Rui Chang, Yu Wang, Jinku Li, Kui Ren |