USENIX Security '23 | “Employees Who Don’t Accept the Time Security Takes Are Not Aware Enough”: The CISO View of Human-Centred Security | Jonas Hielscher, Uta Menges, Simon Parkin, Annette Kluge, M. Angela Sasse |
USENIX Security '23 | How Library IT Staff Navigate Privacy and Security Challenges and Responsibilities | Alan F. Luo, Noel Warford, Samuel Dooley, Rachel Greenstadt, Michelle L. Mazurek, Nora McDonald |
USENIX Security '23 | Silent Bugs Matter: A Study of Compiler-Introduced Security Bugs | Jianhao Xu, Kangjie Lu, Zhengjie Du, Zhu Ding, Linke Li, Qiushi Wu, Mathias Payer, Bing Mao |
USENIX Security '23 | IvySyn: Automated Vulnerability Discovery in Deep Learning Frameworks | Neophytos Christou, Di Jin, Vaggelis Atlidakis, Baishakhi Ray, Vasileios P. Kemerlis |
USENIX Security '23 | Bleem: Packet Sequence Oriented Fuzzing for Protocol Implementations | Zhengxiong Luo, Junze Yu, Feilong Zuo, Jianzhong Liu, Yu Jiang, Ting Chen, Abhik Roychoudhury, Jiaguang Sun |
USENIX Security '23 | Araña: Discovering and Characterizing Password Guessing Attacks in Practice | Mazharul Islam, Marina Sanusi Bohuk, Paul Chung, Thomas Ristenpart, Rahul Chatterjee |
USENIX Security '23 | AIRS: Explanation for Deep Reinforcement Learning based Security Applications | Jiahao Yu, Wenbo Guo, Qi Qin, Gang Wang, Ting Wang, Xinyu Xing |
USENIX Security '23 | Minimalist: Semi-automated Debloating of PHP Web Applications through Static Analysis | Rasoul Jahanshahi, Babak Amin Azad, Nick Nikiforakis, Manuel Egele |
USENIX Security '23 | Machine-checking Multi-Round Proofs of Shuffle: Terelius-Wikstrom and Bayer-Groth | Thomas Haines, Rajeev Gore, Mukesh Tiwari |
USENIX Security '23 | FreeEagle: Detecting Complex Neural Trojans in Data-Free Cases | Chong Fu, Xuhong Zhang, Shouling Ji, Ting Wang, Peng Lin, Yanghe Feng, Jianwei Yin |
USENIX Security '23 | Formal Analysis and Patching of BLE-SC Pairing | Min Shi, Jing Chen, Kun He, Haoran Zhao, Meng Jia, Ruiying Du |
USENIX Security '23 | CAPatch: Physical Adversarial Patch against Image Captioning Systems | Shibo Zhang, Yushi Cheng, Wenjun Zhu, Xiaoyu Ji, Wenyuan Xu |
USENIX Security '23 | MINER: A Hybrid Data-Driven Approach for REST API Fuzzing | Chenyang Lyu, Jiacheng Xu, Shouling Ji, Xuhong Zhang, Qinying Wang, Binbin Zhao, Gaoning Pan, Wei Cao, Peng Chen, Raheem Beyah |
USENIX Security '23 | FABRID: Flexible Attestation-Based Routing for Inter-Domain Networks | Cyrill Krähenbühl, Marc Wyss, David Basin, Vincent Lenders, Adrian Perrig, Martin Strohmeier |
USENIX Security '23 | Educators’ Perspectives of Using (or Not Using) Online Exam Proctoring | David G. Balash, Elena Korkes, Miles Grant, Adam J. Aviv, Rahel A. Fainchtein, Micah Sherr |
USENIX Security '23 | Going through the motions: AR/VR keylogging from user head motions | Carter Slocum, Yicheng Zhang, Nael Abu-Ghazaleh, Jiasi Chen |
USENIX Security '23 | No more Reviewer #2: Subverting Automatic Paper-Reviewer Assignment using Adversarial Learning | Thorsten Eisenhofer, Erwin Quiring, Jonas Möller, Doreen Riepel, Thorsten Holz, Konrad Rieck |
USENIX Security '23 | Password Guessing Using Random Forest | Ding Wang, Yunkai Zou, Zijian Zhang, Kedong Xiu |
USENIX Security '23 | Detecting and Handling IoT Interaction Threats in Multi-Platform Multi-Control-Channel Smart Homes | Haotian Chi, Qiang Zeng, Xiaojiang Du |
USENIX Security '23 | TRIDENT: Towards Detecting and Mitigating Web-based Social Engineering Attacks | Zheng Yang, Joey Allen, Matthew Landen, Roberto Perdisci, Wenke Lee |
USENIX Security '23 | DDRace: Finding Concurrency UAF Vulnerabilities in Linux Drivers with Directed Fuzzing | |
USENIX Security '23 | Secure Floating-Point Training | Deevashwer Rathee, Anwesh Bhattacharya, Divya Gupta, Rahul Sharma, Dawn Song |
USENIX Security '23 | The OK Is Not Enough: A Large Scale Study of Consent Dialogs in Smartphone Applications | Simon Koch, Benjamin Altpeter, Martin Johns |
USENIX Security '23 | Timeless Timing Attacks and Preload Defenses in Tor's DNS Cache | Rasmus Dahlberg, Tobias Pulls |
USENIX Security '23 | CacheQL: Quantifying and Localizing Cache Side-Channel Vulnerabilities in Production Software | Yuanyuan Yuan, Zhibo Liu, Shuai Wang |