USENIX Security '23 | An Input-Agnostic Hierarchical Deep Learning Framework for Traffic Fingerprinting | Jian Qu, Xiaobo Ma, Jianfeng Li, Xiapu Luo, Lei Xue, Junjie Zhang, Zhenhua Li, Li Feng, Xiaohong Guan |
USENIX Security '23 | Pass2Edit: A Multi-Step Generative Model for Guessing Edited Passwords | Ding Wang, Yunkai Zou, Yuan-An Xiao, Siqi Ma, Xiaofeng Chen |
USENIX Security '23 | PROVIDENCE: a Flexible Round-by-Round Risk-Limiting Audit | Oliver Broadrick, Poorvi Vora, Filip Zagórski |
USENIX Security '23 | Cipherfix: Mitigating Ciphertext Side-Channel Attacks in Software | Jan Wichelmann, Anna Pätschke, Luca Wilke, Thomas Eisenbarth |
USENIX Security '23 | Subverting Website Fingerprinting Defenses with Robust Traffic Representation | Meng Shen, Kexin Ji, Zhenbo Gao, Qi Li, Liehuang Zhu, Ke Xu |
USENIX Security '23 | User Awareness and Behaviors Concerning Encrypted DNS Settings in Web Browsers | Alexandra Nisenoff, Ranya Sharma, Nick Feamster |
USENIX Security '23 | It's all in your head(set): Side-channel attacks on AR/VR systems | Yicheng Zhang, Carter Slocum, Jiasi Chen, Nael Abu-Ghazaleh |
USENIX Security '23 | Work-From-Home and COVID-19: Trajectories of Endpoint Security Management in a Security Operations Center | Kailani R. Jones, Dalton A. Brucker-Hahn, Bradley Fidler, Alexandru G. Bardas |
USENIX Security '23 | Adversarial Training for Raw-Binary Malware Classifiers | Keane Lucas, Samruddhi Pai, Weiran Lin, Lujo Bauer, Michael K. Reiter, Mahmood Sharif |
USENIX Security '23 | ELASM: Error-Latency-Aware Scale Management for Fully Homomorphic Encryption | Yongwoo Lee, Seonyoung Cheon, Dongkwan Kim, Dongyoon Lee, Hanjun Kim |
USENIX Security '23 | Abuse Vectors: A Framework for Conceptualizing IoT-Enabled Interpersonal Abuse | Sophie Stephenson, Majed Almansoori, Pardis Emami-Naeini, Danny Yuxing Huang, Rahul Chatterjee |
USENIX Security '23 | Trojan Source: Invisible Vulnerabilities | Nicholas Boucher, Ross Anderson |
USENIX Security '23 | ARMore: Pushing Love Back Into Binaries | Luca Di Bartolomeo, Hossein Moghaddas, Mathias Payer |
USENIX Security '23 | ProSpeCT: Provably Secure Speculation for the Constant-Time Policy | Lesly-Ann Daniel, Marton Bognar, Job Noorman, Sébastien Bardin, Tamara Rezk, Frank Piessens |
USENIX Security '23 | Exorcising "Wraith": Protecting LiDAR-based Object Detector in Automated Driving System from Appearing Attacks | Qifan Xiao, Xudong Pan, Yifan Lu, Mi Zhang, Jiarun Dai, Min Yang |
USENIX Security '23 | GAP: Differentially Private Graph Neural Networks with Aggregation Perturbation | Sina Sajadmanesh, Ali Shahin Shamsabadi, Aurélien Bellet, Daniel Gatica-Perez |
USENIX Security '23 | SandDriller: A Fully-Automated Approach for Testing Language-Based JavaScript Sandboxes | Abdullah AlHamdan, Cristian-Alexandru Staicu |
USENIX Security '23 | Catch You and I Can: Revealing Source Voiceprint Against Voice Conversion | Jiangyi Deng, Yanjiao Chen, Yinan Zhong, Qianhao Miao, Xueluan Gong, Wenyuan Xu |
USENIX Security '23 | How the Great Firewall of China Detects and Blocks Fully Encrypted Traffic | Mingshi Wu, Jackson Sippe, Danesh Sivakumar, Jack Burg, Peter Anderson, Xiaokang Wang, Kevin Bock, Amir Houmansadr, Dave Levin, Eric Wustrow |
USENIX Security '23 | Pool-Party: Exploiting Browser Resource Pools for Web Tracking | Peter Snyder, Soroush Karami, Arthur Edelstein, Benjamin Livshits, Hamed Haddadi |
USENIX Security '23 | The Role of Professional Product Reviewers in Evaluating Security and Privacy | Wentao Guo, Jason Walter, Michelle L. Mazurek |
USENIX Security '23 | Near-Ultrasound Inaudible Trojan (Nuit): Exploiting Your Speaker to Attack Your Microphone | Qi Xia, Qian Chen, Shouhuai Xu |
USENIX Security '23 | Bilingual Problems: Studying the Security Risks Incurred by Native Extensions in Scripting Languages | Cristian-Alexandru Staicu, Sazzadur Rahaman, Ágnes Kiss, Michael Backes |
USENIX Security '23 | Ultimate SLH: Taking Speculative Load Hardening to the Next Level | Zhiyuan Zhang, Gilles Barthe, Chitchanok Chuengsatiansup, Peter Schwabe, Yuval Yarom |
USENIX Security '23 | Intender: Fuzzing Intent-Based Networking with Intent-State Transition Guidance | Jiwon Kim, Benjamin E. Ujcich, Dave (Jing) Tian |