USENIX Security '23 | Tubes Among Us: Analog Attack on Automatic Speaker Identification | Shimaa Ahmed, Yash Wani, Ali Shahin Shamsabadi, Mohammad Yaghini, Ilia Shumailov, Nicolas Papernot, Kassem Fawaz |
USENIX Security '23 | Practical Asynchronous High-threshold Distributed Key Generation and Distributed Polynomial Sampling | Sourav Das, Zhuolun Xiang, Lefteris Kokoris-Kogias, Ling Ren |
USENIX Security '23 | Every Vote Counts: Ranking-Based Training of Federated Learning to Resist Poisoning Attacks | Hamid Mozaffari, Virat Shejwalkar, Amir Houmansadr |
USENIX Security '23 | Hidden Reality: Caution, Your Hand Gesture Inputs in the Immersive Virtual World are Visible to All! | Sindhu Reddy Kalathur Gopal, Diksha Shukla, James David Wheelock, Nitesh Saxena |
USENIX Security '23 | ARI: Attestation of Real-time Mission Execution Integrity | Jinwen Wang, Yujie Wang, Ao Li, Yang Xiao, Ruide Zhang, Wenjing Lou, Y. Thomas Hou, Ning Zhang |
USENIX Security '23 | XCheck: Verifying Integrity of 3D Printed Patient-Specific Devices via Computing Tomography | Zhiyuan Yu, Yuanhaur Chang, Shixuan Zhai, Nicholas Deily, Tao Ju, XiaoFeng Wang, Uday Jammalamadaka, Ning Zhang |
USENIX Security '23 | Eos: Efficient Private Delegation of zkSNARK Provers | Alessandro Chiesa, Ryan Lehmkuhl, Pratyush Mishra, Yinuo Zhang |
USENIX Security '23 | PELICAN: Exploiting Backdoors of Naturally Trained Deep Learning Models In Binary Code Analysis | Zhuo Zhang, Guanhong Tao, Guangyu Shen, Shengwei An, Qiuling Xu, Yingqi Liu, Yapeng Ye, Yaoxuan Wu, Xiangyu Zhang |
USENIX Security '23 | The Gates of Time: Improving Cache Attacks with Transient Execution | Daniel Katzman, William Kosasih, Chitchanok Chuengsatiansup, Eyal Ronen, Yuval Yarom |
USENIX Security '23 | TRust: A Compilation Framework for In-process Isolation to Protect Safe Rust against Untrusted Code | Inyoung Bang, Martin Kayondo, Hyungon Moon, Yunheung Paek |
USENIX Security '23 | The Most Dangerous Codec in the World: Finding and Exploiting Vulnerabilities in H.264 Decoders | Willy R. Vasquez, Stephen Checkoway, Hovav Shacham |
USENIX Security '23 | A Large Scale Study of the Ethereum Arbitrage Ecosystem | Robert McLaughlin, Christopher Kruegel, Giovanni Vigna |
USENIX Security '23 | Sherlock on Specs: Building LTE Conformance Tests through Automated Reasoning | Yi Chen, Di Tang, Yepeng Yao, Mingming Zha, XiaoFeng Wang, Xiaozhong Liu, Haixu Tang, Baoxu Liu |
USENIX Security '23 | Did the Shark Eat the Watchdog in the NTP Pool? Deceiving the NTP Pool’s Monitoring System | Jonghoon Kwon, Jeonggyu Song, Junbeom Hur, Adrian Perrig |
USENIX Security '23 | Formal Analysis of SPDM: Security Protocol and Data Model version 1.2 | Cas Cremers, Alexander Dax, Aurora Naska |
USENIX Security '23 | V1SCAN: Discovering 1-day Vulnerabilities in Reused C/C++ Open-source Software Components Using Code Classification Techniques | Seunghoon Woo, Eunjin Choi, Heejo Lee, Hakjoo Oh |
USENIX Security '23 | BunnyHop: Exploiting the Instruction Prefetcher | Zhiyuan Zhang, Mingtian Tao, Sioli O'Connell, Chitchanok Chuengsatiansup, Daniel Genkin, Yuval Yarom |
USENIX Security '23 | DiffSmooth: Certifiably Robust Learning via Diffusion Models and Local Smoothing | Jiawei Zhang, Zhongzhu Chen, Huan Zhang, Chaowei Xiao, Bo Li |
USENIX Security '23 | ACon^2: Adaptive Conformal Consensus for Provable Blockchain Oracles | Sangdon Park, Osbert Bastani, Taesoo Kim |
USENIX Security '23 | Measuring Up to (Reasonable) Consumer Expectations: Providing an Empirical Basis for Holding IoT Manufacturers Legally Responsible | Lorenz Kustosch, Carlos Gañán, Mattis van 't Schip, Michel van Eeten, Simon Parkin |
USENIX Security '23 | A Data-free Backdoor Injection Approach in Neural Networks | Peizhuo Lv, Chang Yue, Ruigang Liang, Yunfei Yang, Shengzhi Zhang, Hualong Ma, Kai Chen |
USENIX Security '23 | HECO: Fully Homomorphic Encryption Compiler | Alexander Viand, Patrick Jattke, Miro Haller, Anwar Hithnawi |
USENIX Security '23 | Automated Exploitable Heap Layout Generation for Heap Overflows Through Manipulation Distance-Guided Fuzzing | Bin Zhang, Jiongyi Chen, Runhao Li, Chao Feng, Ruilin Li, Chaojing Tang |
USENIX Security '23 | Attacks are Forwarded: Breaking the Isolation of MicroVM-based Containers Through Operation Forwarding | Jietao Xiao, Nanzi Yang, Wenbo Shen, Jinku Li, Xin Guo, Zhiqiang Dong, Fei Xie, Jianfeng Ma |
USENIX Security '23 | NAUTILUS: Automated RESTful API Vulnerability Detection | Gelei Deng, Zhiyi Zhang, Yuekang Li, Yi Liu, Tianwei Zhang, Yang Liu, Guo Yu, Dongjin Wang |