Accepted Posters
The following posters will be presented at the USENIX Security ’23 Poster Session and Happy Hour on Thursday, August 10, from 6:00 pm–7:30 pm.
Pixelated Protection: Identifying Security Challenges in Game Development Processes
Philip Klostermeyer, Sabrina Amft, Alexander Krause, Niklas Busch, and Sascha Fahl, CISPA Helmholtz Center for Information Security
Towards A Quantitative Risk Assessment of Physical Adversarial Attacks in the AV Perception Domain
Trishna Chakraborty, University of California, Irvine; S Hrushikesh Bhupathiraju, University of Florida; Dipkamal Bhusal, Rochester Institute of Technology; Michael Clifford, Toyota InfoTech Labs; Sara Rampazzi, University of Florida; Nidhi Rastogi, Rochester Institute of Technology; Qi Alfred Chen, University of California, Irvine
Proteus: An Extensible RISC-V Core for Hardware Extensions
Marton Bognar, Job Noorman, and Frank Piessens, imec-DistriNet, KU Leuven
Toward Facilitating Root Cause Localization in Fuzzing
Katsunori Aoki and Takahiro Shinagawa, The University of Tokyo
Virtual Adventures, Real Challenges: Analyzing Harassment Controls in VR
Abhinaya S B, Aafaq Sabir, and Anupam Das, North Carolina State University
Towards Quantifying Software Supply Chain Security Risks in Open-source 3D Printer Repositories
Jessy Ayala, University of California, Irvine
WhatsUpp with Sender Keys? Analysis, Improvements and Security Proofs
David Balbás, IMDEA Software Institute & Universidad Politécnica de Madrid; Daniel Collins, EPFL; Phillip Gajland, Max Planck Institute for Security and Privacy & Ruhr University Bochum
Performance Gains in Secure Machine Learning via TDA-Preprocessing
Dominic Gold, Florida Atlantic University; Koray Karabina, National Research Council Canada; Francis C. Motta, Florida Atlantic University
AI/ML-enabled Connected Healthcare Systems: New Remedies or New Risks?
Gargi Mitra, Mohammadreza Hallajiyan, and Mohammad Elnawawy, University of British Columbia; Shahrear Iqbal, National Research Council Canada; Karthik Pattabiraman, University of British Columbia
Security and Privacy Analysis of Employee Monitoring Applications
Adam Campbell, Adam Molnar, and Urs Hengartner, University of Waterloo
One Instruction to Rule Them All: Efficient (2+1)-PC for the SUBLEQ single-instruction architecture
Christopher Jiang and Ryan Henry, University of Calgary
Per-User Histogram In the Shuffle Model
Aashish Kolluri, National University of Singapore; Jacob Imola and Amrita Roy Chowdhury, University of California, San Diego
Towards A Security Analysis of Commercial Indoor Delivery Robot Systems
Fayzah Alshammari, Yunpeng Luo, and Qi Alfred Chen, University of California, Irvine
Automated Interaction With Smart Virtual Assistants Voice Apps Using Large Language Models
Aafaq Sabir and Anupam Das, North Carolina State University
FISHFUZZ: Catch Deeper Bugs by Throwing Larger Nets
Han Zheng, National Computer Network Intrusion Protection Center, University of Chinese Academy of Sciences, China; EPFL; Zhongguancun Lab; Jiayuan Zhang, School of Computer and Communication, Lanzhou University of Technology, China; National Computer Network Intrusion Protection Center, University of Chinese Academy of Sciences, China; Yuhang Huang and Zezhong Ren, National Computer Network Intrusion Protection Center, University of Chinese Academy of Sciences, China; He Wang, School of Cyber Engineering, Xidian University, China; National Computer Network Intrusion Protection Center, University of Chinese Academy of Sciences ,China; Chunjie Cao, School of Cyberspace Security, Hainan University, China; Yuqing Zhang, National Computer Network Intrusion Protection Center, University of Chinese Academy of Sciences; Flavio Toffalini and Mathias Payer, EPFL
Step-by-Step Vulnerability Detection using Large Language Models
Saad Ullah, Gianluca Stringhini, and Ayse K. Coskun, Boston University; Alessandro Morari and Saurabh Pujar, IBM Research
The Achilles Heel of Extended Reality Apps: Probing Availability Vulnerabilities in Artificial Intelligence Components
Yuhao Wu, Zihan Li, and Han Liu, Washington University in St. Louis; Ruimin Sun, Florida International University; Ning Zhang, Washington University in St. Louis
Permission Voucher: Enabling Seamless Interaction Between ID Card and Smart-City Infrastructure
Khan Reaz and Gerhard Wunder, Freie Universität Berlin
Privacy Authority-Aware Compiler for Homomorphic Encryption on Edge-Cloud
Dongkwan Kim and Hanjun Kim, Yonsei University
A Method for Detecting Various Forms of Re-Entrancy Vulnerabilities in Ethereum Blockchain Smart Contracts with Multi-Contract Interactions
Wenhui Jin, Yuguang Jin, Youngwoong Kim, and Heekuck Oh, Hanyang University
Bridging the Gap in PLC Binary Analysis: An Inclusive Dataset and PLCodeConflux Framework
Yonatan Gizachew Achamyeleh, Shih-Yuan Yu, and Mohammad Al Faruque, UC Irvine
ARMORE: Pushing Love Back Into Binaries
Luca Di Bartolomeo, Hossein Moghaddas, and Mathias Payer, EPFL
Silent Bugs Matter: A Study of Compiler-Introduced Security Bugs
Jianhao Xu, Nanjing University; Kangjie Lu, University of Minnesota; Zhengjie Du, Zhu Ding, and Linke Li, Nanjing University; Qiushi Wu, University of Minnesota; Mathias Payer, EPFL; Bing Mao, Nanjing University