USENIX Security '23 | Are Consumers Willing to Pay for Security and Privacy of IoT Devices? | Pardis Emami-Naeini, Janarth Dheenadhayalan, Yuvraj Agarwal, Lorrie Faith Cranor |
USENIX Security '23 | PhyAuth: Physical-Layer Message Authentication for ZigBee Networks | Ang Li, Jiawei Li, Dianqi Han, Yan Zhang, Tao Li, Ting Zhu, Yanchao Zhang |
USENIX Security '23 | Fairness Properties of Face Recognition and Obfuscation Systems | Harrison Rosenberg, Brian Tang, Kassem Fawaz, Somesh Jha |
USENIX Security '23 | Beyond The Gates: An Empirical Analysis of HTTP-Managed Password Stealers and Operators | Athanasios Avgetidis, Omar Alrawi, Kevin Valakuzhy, Charles Lever, Paul Burbage, Angelos D. Keromytis, Fabian Monrose, Manos Antonakakis |
USENIX Security '23 | Decompiling x86 Deep Neural Network Executables | Zhibo Liu, Yuanyuan Yuan, Shuai Wang, Xiaofei Xie, Lei Ma |
USENIX Security '23 | PolyFuzz: Holistic Greybox Fuzzing of Multi-Language Systems | Wen Li, Jinyang Ruan, Guangbei Yi, Long Cheng, Xiapu Luo, Haipeng Cai |
USENIX Security '23 | Linear Private Set Union from Multi-Query Reverse Private Membership Test | Cong Zhang, Yu Chen, Weiran Liu, Min Zhang, Dongdai Lin |
USENIX Security '23 | An Efficient Design of Intelligent Network Data Plane | Guangmeng Zhou, Zhuotao Liu, Chuanpu Fu, Qi Li, Ke Xu |
USENIX Security '23 | AIFORE: Smart Fuzzing Based on Automatic Input Format Reverse Engineering | Ji Shi, Zhun Wang, Zhiyao Feng, Yang Lan, Shisong Qin, Wei You, Wei Zou, Mathias Payer, Chao Zhang |
USENIX Security '23 | Inducing Authentication Failures to Bypass Credit Card PINs | David Basin, Patrick Schaller, Jorge Toro-Pozo |
USENIX Security '23 | Silent Spring: Prototype Pollution Leads to Remote Code Execution in Node.js | Mikhail Shcherbakov, Musard Balliu, Cristian-Alexandru Staicu |
USENIX Security '23 | Reassembly is Hard: A Reflection on Challenges and Strategies | Hyungseok Kim, Soomin Kim, Junoh Lee, Kangkook Jee, Sang Kil Cha |
USENIX Security '23 | PCAT: Functionality and Data Stealing from Split Learning by Pseudo-Client Attack | Xinben Gao, Lan Zhang |
USENIX Security '23 | VulChecker: Graph-based Vulnerability Localization in Source Code | Yisroel Mirsky, George Macon, Michael Brown, Carter Yagemann, Matthew Pruett, Evan Downing, Sukarno Mertoguno, Wenke Lee |
USENIX Security '23 | Examining Consumer Reviews to Understand Security and Privacy Issues in the Market of Smart Home Devices | Swaathi Vetrivel, Veerle van Harten, Carlos H. Gañán, Michel van Eeten, Simon Parkin |
USENIX Security '23 | Isolated and Exhausted: Attacking Operating Systems via Site Isolation in the Browser | Matthias Gierlings, Marcus Brinkmann, Jörg Schwenk |
USENIX Security '23 | Internet Service Providers' and Individuals' Attitudes, Barriers, and Incentives to Secure IoT | Nissy Sombatruang, Tristan Caulfield, Ingolf Becker, Akira Fujita, Takahiro Kasama, Koji Nakao, Daisuke Inoue |
USENIX Security '23 | Framing Frames: Bypassing Wi-Fi Encryption by Manipulating Transmit Queues | Domien Schepers, Aanjhan Ranganathan, Mathy Vanhoef |
USENIX Security '23 | Improving Logging to Reduce Permission Over-Granting Mistakes | Bingyu Shen, Tianyi Shan, Yuanyuan Zhou |
USENIX Security '23 | V-Cloak: Intelligibility-, Naturalness- & Timbre-Preserving Real-Time Voice Anonymization | Jiangyi Deng, Fei Teng, Yanjiao Chen, Xiaofu Chen, Zhaohui Wang, Wenyuan Xu |
USENIX Security '23 | PatchVerif: Discovering Faulty Patches in Robotic Vehicles | Hyungsub Kim, Muslum Ozgur Ozmen, Z. Berkay Celik, Antonio Bianchi, Dongyan Xu |
USENIX Security '23 | DISTDET: A Cost-Effective Distributed Cyber Threat Detection System | Feng Dong, Liu Wang, Xu Nie, Fei Shao, Haoyu Wang, Ding Li, Xiapu Luo, Xusheng Xiao |
USENIX Security '23 | The Impostor Among US(B): Off-Path Injection Attacks on USB Communications | Robert Dumitru, Daniel Genkin, Andrew Wabnitz, Yuval Yarom |
USENIX Security '23 | Fuzztruction: Using Fault Injection-based Fuzzing to Leverage Implicit Domain Knowledge | Nils Bars, Moritz Schloegel, Tobias Scharnowski, Nico Schiller, Thorsten Holz |
USENIX Security '23 | NVLeak: Off-Chip Side-Channel Attacks via Non-Volatile Memory Systems | Zixuan Wang, Mohammadkazem Taram, Daniel Moghimi, Steven Swanson, Dean Tullsen, Jishen Zhao |