USENIX Security '23 | Oops..! I Glitched It Again! How to Multi-Glitch the Glitching-Protections on ARM TrustZone-M | Xhani Marvin Saß, Richard Mitev, Ahmad-Reza Sadeghi |
USENIX Security '23 | No Single Silver Bullet: Measuring the Accuracy of Password Strength Meters | Ding Wang, Xuan Shan, Qiying Dong, Yaosheng Shen, Chunfu Jia |
USENIX Security '23 | Place Your Locks Well: Understanding and Detecting Lock Misuse Bugs | Yuandao Cai, Peisen Yao, Chengfeng Ye, Charles Zhang |
USENIX Security '23 | Three Lessons From Threema: Analysis of a Secure Messenger | Kenneth G. Paterson, Matteo Scarlata, Kien Tuong Truong |
USENIX Security '23 | One Size Does not Fit All: Quantifying the Risk of Malicious App Encounters for Different Android User Profiles | Savino Dambra, Leyla Bilge, Platon Kotzias, Yun Shen, Juan Caballero |
USENIX Security '23 | “Security is not my field, I’m a stats guy”: A Qualitative Root Cause Analysis of Barriers to Adversarial Machine Learning Defenses in Industry | Jaron Mink, Harjot Kaur, Juliane Schmüser, Sascha Fahl, Yasemin Acar |
USENIX Security '23 | BoKASAN: Binary-only Kernel Address Sanitizer for Effective Kernel Fuzzing | Mingi Cho, Dohyeon An, Hoyong Jin, Taekyoung Kwon |
USENIX Security '23 | The Blockchain Imitation Game | Kaihua Qin, Stefanos Chaliasos, Liyi Zhou, Benjamin Livshits, Dawn Song, Arthur Gervais |
USENIX Security '23 | We Really Need to Talk About Session Tickets: A Large-Scale Analysis of Cryptographic Dangers with TLS Session Tickets | Sven Hebrok, Simon Nachtigall, Marcel Maehren, Nurullah Erinola, Robert Merget, Juraj Somorovsky, Jörg Schwenk |
USENIX Security '23 | Duoram: A Bandwidth-Efficient Distributed ORAM for 2- and 3-Party Computation | Adithya Vadapalli, Ryan Henry, Ian Goldberg |
USENIX Security '23 | Diving into Robocall Content with SnorCall | Sathvik Prasad, Trevor Dunlap, Alexander Ross, Bradley Reaves |
USENIX Security '23 | Detecting Multi-Step IAM Attacks in AWS Environments via Model Checking | Ilia Shevrin, Oded Margalit |
USENIX Security '23 | Lost at C: A User Study on the Security Implications of Large Language Model Code Assistants | Gustavo Sandoval, Hammond Pearce, Teo Nys, Ramesh Karri, Siddharth Garg, Brendan Dolan-Gavitt |
USENIX Security '23 | ARGUS: Context-Based Detection of Stealthy IoT Infiltration Attacks | Phillip Rieger, Marco Chilese, Reham Mohamed, Markus Miettinen, Hossein Fereidooni, Ahmad-Reza Sadeghi |
USENIX Security '23 | How to Cover up Anomalous Accesses to Electronic Health Records | Xiaojun Xu, Qingying Hao, Zhuolin Yang, Bo Li, David Liebovitz, Gang Wang, Carl A. Gunter |
USENIX Security '23 | TreeSync: Authenticated Group Management for Messaging Layer Security | Théophile Wallez, Jonathan Protzenko, Benjamin Beurdouche, Karthikeyan Bhargavan |
USENIX Security '23 | Network Responses to Russia's Invasion of Ukraine in 2022: A Cautionary Tale for Internet Freedom | Reethika Ramesh, Ram Sundara Raman, Apurva Virkud, Alexandra Dirksen, Armin Huremagic, David Fifield, Dirk Rodenburg, Rod Hynes, Doug Madory, Roya Ensafi |
USENIX Security '23 | ZBCAN: A Zero-Byte CAN Defense System | Khaled Serag, Rohit Bhatia, Akram Faqih, Muslum Ozgur Ozmen, Vireshwar Kumar, Z. Berkay Celik, Dongyan Xu |
USENIX Security '23 | Know Your Cybercriminal: Evaluating Attacker Preferences by Measuring Profile Sales on an Active, Leading Criminal Market for User Impersonation at Scale | Michele Campobasso, Luca Allodi |
USENIX Security '23 | Formal Analysis of Session-Handling in Secure Messaging: Lifting Security from Sessions to Conversations | Cas Cremers, Charlie Jacomme, Aurora Naska |
USENIX Security '23 | HOLMES: Efficient Distribution Testing for Secure Collaborative Learning | Ian Chang, Katerina Sotiraki, Weikeng Chen, Murat Kantarcioglu, Raluca Popa |
USENIX Security '23 | MobileAtlas: Geographically Decoupled Measurements in Cellular Networks for Security and Privacy Research | Gabriel K. Gegenhuber, Wilfried Mayer, Edgar Weippl, Adrian Dabrowski |
USENIX Security '23 | Don’t be Dense: Efficient Keyword PIR for Sparse Databases | Sarvar Patel, Joon Young Seo, Kevin Yeo |
USENIX Security '23 | Proxy Hunting: Understanding and Characterizing Proxy-based Upgradeable Smart Contracts in Blockchains | William E Bodell III, Sajad Meisami, Yue Duan |
USENIX Security '23 | Fine-grained Poisoning Attack to Local Differential Privacy Protocols for Mean and Variance Estimation | Xiaoguang Li, Ninghui Li, Wenhai Sun, Neil Zhenqiang Gong, Hui Li |