USENIX Security '23 | Forming Faster Firmware Fuzzers | |
USENIX Security '23 | AURC: Detecting Errors in Program Code and Documentation | Peiwei Hu, Ruigang Liang, Ying Cao, Kai Chen, Runze Zhang |
USENIX Security '23 | Rethinking White-Box Watermarks on Deep Learning Models under Neural Structural Obfuscation | Yifan Yan, Xudong Pan, Mi Zhang, Min Yang |
USENIX Security '23 | Remote Code Execution from SSTI in the Sandbox: Automatically Detecting and Exploiting Template Escape Bugs | Yudi Zhao, Yuan Zhang, Min Yang |
USENIX Security '23 | Prime Match: A Privacy-Preserving Inventory Matching System | Antigoni Polychroniadou, Gilad Asharov, Benjamin Diamond, Tucker Balch, Hans Buehler, Richard Hua, Suwen Gu, Greg Gimler, Manuela Veloso |
USENIX Security '23 | Token Spammers, Rug Pulls, and Sniper Bots: An Analysis of the Ecosystem of Tokens in Ethereum and in the Binance Smart Chain (BNB) | Federico Cernera, Massimo La Morgia, Alessandro Mei, Francesco Sassi |
USENIX Security '23 | CarpetFuzz: Automatic Program Option Constraint Extraction from Documentation for Fuzzing | Dawei Wang, Ying Li, Zhiyu Zhang, Kai Chen |
USENIX Security '23 | Black-box Adversarial Example Attack towards FCG Based Android Malware Detection under Incomplete Feature Information | Heng Li, Zhang Cheng, Bang Wu, Liheng Yuan, Cuiying Gao, Wei Yuan, Xiapu Luo |
USENIX Security '23 | MorFuzz: Fuzzing Processor via Runtime Instruction Morphing enhanced Synchronizable Co-simulation | Jinyan Xu, Yiyuan Liu, Sirui He, Haoran Lin, Yajin Zhou, Cong Wang |
USENIX Security '23 | AutoFR: Automated Filter Rule Generation for Adblocking | Hieu Le, Salma Elmalaki, Athina Markopoulou, Zubair Shafiq |
USENIX Security '23 | InfinityGauntlet: Expose Smartphone Fingerprint Authentication to Brute-force Attack | Yu Chen, Yang Yu, Lidong Zhai |
USENIX Security '23 | Multiview: Finding Blind Spots in Access-Deny Issues Diagnosis | Bingyu Shen, Tianyi Shan, Yuanyuan Zhou |
USENIX Security '23 | A Plot is Worth a Thousand Words: Model Information Stealing Attacks via Scientific Plots | Boyang Zhang, Xinlei He, Yun Shen, Tianhao Wang, Yang Zhang |
USENIX Security '23 | X-Adv: Physical Adversarial Object Attacks against X-ray Prohibited Item Detection | Aishan Liu, Jun Guo, Jiakai Wang, Siyuan Liang, Renshuai Tao, Wenbo Zhou, Cong Liu, Xianglong Liu, Dacheng Tao |
USENIX Security '23 | Extending a Hand to Attackers: Browser Privilege Escalation Attacks via Extensions | Young Min Kim, Byoungyoung Lee |
USENIX Security '23 | Hey Kimya, Is My Smart Speaker Spying on Me? Taking Control of Sensor Privacy Through Isolation and Amnesia | Piet De Vaere, Adrian Perrig |
USENIX Security '23 | Capstone: A Capability-based Foundation for Trustless Secure Memory Access | Jason Zhijingcheng Yu, Conrad Watt, Aditya Badole, Trevor E. Carlson, Prateek Saxena |
USENIX Security '23 | Watch your Watch: Inferring Personality Traits from Wearable Activity Trackers | Noé Zufferey, Mathias Humbert, Romain Tavenard, Kévin Huguenin |
USENIX Security '23 | Squirrel: A Scalable Secure Two-Party Computation Framework for Training Gradient Boosting Decision Tree | Wen-jie Lu, Zhicong Huang, Qizhi Zhang, Yuchen Wang, Cheng Hong |
USENIX Security '23 | Authenticated private information retrieval | Simone Colombo, Kirill Nikitin, Henry Corrigan-Gibbs, David J. Wu, Bryan Ford |
USENIX Security '23 | Bug Hunters’ Perspectives on the Challenges and Benefits of the Bug Bounty Ecosystem | Omer Akgul, Taha Eghtesad, Amit Elazari, Omprakash Gnawali, Jens Grossklags, Michelle L. Mazurek, Daniel Votipka, Aron Laszka |
USENIX Security '23 | Defining "Broken": User Experiences and Remediation Tactics When Ad-Blocking or Tracking-Protection Tools Break a Website’s User Experience | Alexandra Nisenoff, Arthur Borem, Madison Pickering, Grant Nakanishi, Maya Thumpasery, Blase Ur |
USENIX Security '23 | Log: It’s Big, It’s Heavy, It’s Filled with Personal Data! Measuring the Logging of Sensitive Information in the Android Ecosystem | Allan Lyons, Julien Gamba, Austin Shawaga, Joel Reardon, Juan Tapiador, Serge Egelman, Narseo Vallina-Rodriguez |
USENIX Security '23 | Fact-Saboteurs: A Taxonomy of Evidence Manipulation Attacks against Fact-Verification Systems | Sahar Abdelnabi, Mario Fritz |
USENIX Security '23 | Meta-Sift: How to Sift Out a Clean Subset in the Presence of Data Poisoning? | Yi Zeng, Minzhou Pan, Himanshu Jahagirdar, Ming Jin, Lingjuan Lyu, Ruoxi Jia |