USENIX Security '23 | “If sighted people know, I should be able to know:” Privacy Perceptions of Bystanders with Visual Impairments around Camera-based Technology | Yuhang Zhao, Yaxing Yao, Jiaru Fu, Nihan Zhou |
USENIX Security '23 | Access Denied: Assessing Physical Risks to Internet Access Networks | Alexander Marder, Zesen Zhang, Ricky Mok, Ramakrishna Padmanabhan, Bradley Huffaker, Matthew Luckie, Alberto Dainotti, kc claffy, Alex C. Snoeren, Aaron Schulman |
USENIX Security '23 | Security and Privacy Failures in Popular 2FA Apps | Conor Gilsenan, Fuzail Shakir, Noura Alomar, Serge Egelman |
USENIX Security '23 | Hash Gone Bad: Automated discovery of protocol attacks that exploit hash function weaknesses | Vincent Cheval, Cas Cremers, Alexander Dax, Lucca Hirschi, Charlie Jacomme, Steve Kremer |
USENIX Security '23 | Content-Type: multipart/oracle - Tapping into Format Oracles in Email End-to-End Encryption | Fabian Ising, Damian Poddebniak, Tobias Kappert, Christoph Saatjohann, Sebastian Schinzel |
USENIX Security '23 | Glowing in the Dark: Uncovering IPv6 Address Discovery and Scanning Strategies in the Wild | Hammas Bin Tanveer, Rachee Singh, Paul Pearce, Rishab Nithyanand |
USENIX Security '23 | Every Signature is Broken: On the Insecurity of Microsoft Office’s OOXML Signatures | Simon Rohlmann, Vladislav Mladenov, Christian Mainka, Daniel Hirschberger, Jörg Schwenk |
USENIX Security '23 | Humans vs. Machines in Malware Classification | Simone Aonzo, Yufei Han, Alessandro Mantovani, Davide Balzarotti |
USENIX Security '23 | How fast do you heal? A taxonomy for post-compromise security in secure-channel establishment | Olivier Blazy, Ioana Boureanu, Pascal Lafourcade, Cristina Onete, Léo Robert |
USENIX Security '23 | Assessing Anonymity Techniques Employed in German Court Decisions: A De-Anonymization Experiment | Dominic Deuber, Michael Keuchen, Nicolas Christin |
USENIX Security '23 | GLeeFuzz: Fuzzing WebGL Through Error Message Guided Mutation | Hui Peng, Zhihao Yao, Ardalan Amiri Sani, Dave (Jing) Tian, Mathias Payer |
USENIX Security '23 | Are You Spying on Me? Large-Scale Analysis on IoT Data Exposure through Companion Apps | Yuhong Nan, Xueqiang Wang, Luyi Xing, Xiaojing Liao, Ruoyu Wu, Jianliang Wu, Yifan Zhang, XiaoFeng Wang |
USENIX Security '23 | The Space of Adversarial Strategies | Ryan Sheatsley, Blaine Hoak, Eric Pauley, Patrick McDaniel |
USENIX Security '23 | Credit Karma: Understanding Security Implications of Exposed Cloud Services through Automated Capability Inference | Xueqiang Wang, Yuqiong Sun, Susanta Nanda, XiaoFeng Wang |
USENIX Security '23 | That Person Moves Like A Car: Misclassification Attack Detection for Autonomous Systems Using Spatiotemporal Consistency | Yanmao Man, Raymond Muller, Ming Li, Z. Berkay Celik, Ryan Gerdes |
USENIX Security '23 | CipherH: Automated Detection of Ciphertext Side-channel Vulnerabilities in Cryptographic Implementations | Sen Deng, Mengyuan Li, Yining Tang, Shuai Wang, Shoumeng Yan, Yinqian Zhang |
USENIX Security '23 | "My Privacy for their Security": Employees' Privacy Perspectives and Expectations when using Enterprise Security Software | Jonah Stegman, Patrick J. Trottier, Caroline Hillier, Hassan Khan, Mohammad Mannan |
USENIX Security '23 | Combating Robocalls with Phone Virtual Assistant Mediated Interaction | Sharbani Pandit, Krishanu Sarker, Roberto Perdisci, Mustaque Ahamad, Diyi Yang |
USENIX Security '23 | Distance-Aware Private Set Intersection | Anrin Chakraborti, Giulia Fanti, Michael K. Reiter |
USENIX Security '23 | NeuroPots: Realtime Proactive Defense against Bit-Flip Attacks in Neural Networks | Qi Liu, Jieming Yin, Wujie Wen, Chengmo Yang, Shi Sha |
USENIX Security '23 | Towards a General Video-based Keystroke Inference Attack | Zhuolin Yang, Yuxin Chen, Zain Sarwar, Hadleigh Schwartz, Ben Y. Zhao, Haitao Zheng |
USENIX Security '23 | URET: Universal Robustness Evaluation Toolkit (for Evasion) | Kevin Eykholt, Taesung Lee, Douglas Schales, Jiyong Jang, Ian Molloy |
USENIX Security '23 | You Can't See Me: Physical Removal Attacks on LiDAR-based Autonomous Vehicles Driving Frameworks | Yulong Cao, S. Hrushikesh Bhupathiraju, Pirouz Naghavi, Takeshi Sugawara, Z. Morley Mao, Sara Rampazzi |
USENIX Security '23 | SMACK: Semantically Meaningful Adversarial Audio Attack | Zhiyuan Yu, Yuanhaur Chang, Ning Zhang, Chaowei Xiao |
USENIX Security '23 | Gradient Obfuscation Gives a False Sense of Security in Federated Learning | Kai Yue, Richeng Jin, Chau-Wai Wong, Dror Baron, Huaiyu Dai |