| 2023 | "Act natural!": Exchanging Private Messages on Public Blockchains. Thore Tiemann, Sebastian Berndt, Thomas Eisenbarth, Maciej Liskiewicz |
| 2023 | 8th IEEE European Symposium on Security and Privacy, EuroS&P 2023, Delft, Netherlands, July 3-7, 2023 |
| 2023 | A Certified Radius-Guided Attack Framework to Image Segmentation Models. Wenjie Qu, Youqi Li, Binghui Wang |
| 2023 | A Generic Obfuscation Framework for Preventing ML-Attacks on Strong-PUFs through Exploitation of DRAM-PUFs. Owen Millwood, Meltem Kurt Pehlivanoglu, Aryan Mohammadi Pasikhani, Jack Miskelly, Prosanta Gope, Elif Bilge Kavun |
| 2023 | Active Countermeasures for Email Fraud. Wentao Chen, Fuzhou Wang, Matthew Edwards |
| 2023 | An Unbiased Transformer Source Code Learning with Semantic Vulnerability Graph. Nafis Tanveer Islam, Gonzalo De La Torre Parra, Dylan Manuel, Elias Bou-Harb, Peyman Najafirad |
| 2023 | Android, Notify Me When It Is Time To Go Phishing. Antonio Ruggia, Andrea Possemato, Alessio Merlo, Dario Nisi, Simone Aonzo |
| 2023 | Anomaly-based Filtering of Application-Layer DDoS Against DNS Authoritatives. Jonas Bushart, Christian Rossow |
| 2023 | AoT - Attack on Things: A security analysis of IoT firmware updates. Muhammad Ibrahim, Andrea Continella, Antonio Bianchi |
| 2023 | Asynchronous Remote Key Generation for Post-Quantum Cryptosystems from Lattices. Nick Frymann, Daniel Gardham, Mark Manulis |
| 2023 | Automatic verification of transparency protocols. Vincent Cheval, José Moreira, Mark Ryan |
| 2023 | Been Here Already? Detecting Synchronized Browsers in the Wild. Pantelina Ioannou, Elias Athanasopoulos |
| 2023 | CHERI-TrEE: Flexible enclaves on capability machines. Thomas Van Strydonck, Job Noorman, Jennifer Jackson, Leonardo Alves Dias, Robin Vanderstraeten, David F. Oswald, Frank Piessens, Dominique Devriese |
| 2023 | Careful with MAc-then-SIGn: A Computational Analysis of the EDHOC Lightweight Authenticated Key Exchange Protocol. Felix Günther, Marc Ilunga Tshibumbu Mukendi |
| 2023 | Certifiably Vulnerable: Using Certificate Transparency Logs for Target Reconnaissance. Stijn Pletinckx, Thanh-Dat Nguyen, Tobias Fiebig, Christopher Kruegel, Giovanni Vigna |
| 2023 | Chex-Mix: Combining Homomorphic Encryption with Trusted Execution Environments for Oblivious Inference in the Cloud. Deepika Natarajan, Andrew D. Loveless, Wei Dai, Ronald G. Dreslinski |
| 2023 | Chrowned by an Extension: Abusing the Chrome DevTools Protocol through the Debugger API. José Miguel Moreno, Narseo Vallina-Rodriguez, Juan Tapiador |
| 2023 | Code Vulnerability Detection via Signal-Aware Learning. Sahil Suneja, Yufan Zhuang, Yunhui Zheng, Jim Laredo, Alessandro Morari, Udayan Khurana |
| 2023 | CommiTEE : An Efficient and Secure Commit-Chain Protocol using TEEs. Andreas Erwig, Sebastian Faust, Siavash Riahi, Tobias Stöckert |
| 2023 | Comprehensively Analyzing the Impact of Cyberattacks on Power Grids. Lennart Bader, Martin Serror, Olav Lamberts, Ömer Sen, Dennis van der Velde, Immanuel Hacker, Julian Filter, Elmar Padilla, Martin Henze |
| 2023 | Conjunctive Searchable Symmetric Encryption from Hard Lattices. Debadrita Talapatra, Sikhar Patranabis, Debdeep Mukhopadhyay |
| 2023 | Coverage and Secure Use Analysis of Content Security Policies via Clustering. Mengxia Ren, Chuan Yue |
| 2023 | DarkDialogs: Automated detection of 10 dark patterns on cookie dialogs. Daniel Kirkman, Kami Vaniea, Daniel W. Woods |
| 2023 | EF↯CF: High Performance Smart Contract Fuzzing for Exploit Generation. Michael Rodler, David Paaßen, Wenting Li, Lukas Bernhard, Thorsten Holz, Ghassan Karame, Lucas Davi |
| 2023 | Exploring Smart Commercial Building Occupants' Perceptions and Notification Preferences of Internet of Things Data Collection in the United States. Tu Le, Alan Wang, Yaxing Yao, Yuanyuan Feng, Arsalan Heydarian, Norman M. Sadeh, Yuan Tian |
| 2023 | Finding Fixed Vulnerabilities with Off-the-Shelf Static Analysis. Trevor Dunlap, Seaver Thorn, William Enck, Bradley Reaves |
| 2023 | Forward Pass: On the Security Implications of Email Forwarding Mechanism and Policy. Enze Liu, Gautam Akiwate, Mattijs Jonker, Ariana Mirian, Grant Ho, Geoffrey M. Voelker, Stefan Savage |
| 2023 | From Dragondoom to Dragonstar: Side-channel Attacks and Formally Verified Implementation of WPA3 Dragonfly Handshake. Daniel De Almeida Braga, Natalia Kulatova, Mohamed Sabt, Pierre-Alain Fouque, Karthikeyan Bhargavan |
| 2023 | Fuzzing SGX Enclaves via Host Program Mutations. Arslan Khan, Muqi Zou, Kyungtae Kim, Dongyan Xu, Antonio Bianchi, Dave Jing Tian |
| 2023 | GNN4IFA: Interest Flooding Attack Detection With Graph Neural Networks. Andrea Agiollo, Enkeleda Bardhi, Mauro Conti, Riccardo Lazzeretti, Eleonora Losiouk, Andrea Omicini |
| 2023 | Hunting for Truth: Analyzing Explanation Methods in Learning-based Vulnerability Discovery. Tom Ganz, Philipp Rall, Martin Härterich, Konrad Rieck |
| 2023 | MISO: Legacy-compatible Privacy-preserving Single Sign-on using Trusted Execution Environments. Rongwu Xu, Sen Yang, Fan Zhang, Zhixuan Fang |
| 2023 | Masterkey attacks against free-text keystroke dynamics and security implications of demographic factors. Tim Van hamme, Giuseppe Garofalo, Davy Preuveneers, Wouter Joosen |
| 2023 | MicroProfiler: Principled Side-Channel Mitigation through Microarchitectural Profiling. Marton Bognar, Hans Winderix, Jo Van Bulck, Frank Piessens |
| 2023 | Multi-Factor Credential Hashing for Asymmetric Brute-Force Attack Resistance. Vivek Nair, Dawn Song |
| 2023 | NodeMedic: End-to-End Analysis of Node.js Vulnerabilities with Provenance Graphs. Darion Cassel, Wai Tuck Wong, Limin Jia |
| 2023 | Privately Evaluating Region Overlaps with Applications to Collaborative Sensor Output Validation. Anrin Chakraborti, Michael K. Reiter |
| 2023 | Privformer: Privacy-preserving Transformer with MPC. Yoshimasa Akimoto, Kazuto Fukuchi, Youhei Akimoto, Jun Sakuma |
| 2023 | Proof-of-Learning is Currently More Broken Than You Think. Congyu Fang, Hengrui Jia, Anvith Thudi, Mohammad Yaghini, Christopher A. Choquette-Choo, Natalie Dullerud, Varun Chandrasekaran, Nicolas Papernot |
| 2023 | Protecting Voice-Controllable Devices Against Self-Issued Voice Commands. Sergio Esposito, Daniele Sgandurra, Giampaolo Bella |
| 2023 | Provable Adversarial Safety in Cyber-Physical Systems. John Henry Castellanos, Mohamed Maghenem, Alvaro A. Cárdenas, Ricardo G. Sanfelice, Jianying Zhou |
| 2023 | Reconstructing Individual Data Points in Federated Learning Hardened with Differential Privacy and Secure Aggregation. Franziska Boenisch, Adam Dziedzic, Roei Schuster, Ali Shahin Shamsabadi, Ilia Shumailov, Nicolas Papernot |
| 2023 | Recurring Contingent Service Payment. Aydin Abadi, Steven J. Murdoch, Thomas Zacharias |
| 2023 | Revelio: A Network-Level Privacy Attack in the Lightning Network. Theo von Arx, Muoi Tran, Laurent Vanbever |
| 2023 | SIM: Secure Interval Membership Testing and Applications to Secure Comparison. Albert Yu, Donghang Lu, Aniket Kate, Hemanta K. Maji |
| 2023 | SMART Credentials in the Multi-queue of Slackness (or Secure Management of Anonymous Reputation Traits without Global Halting). Jack P. K. Ma, Sherman S. M. Chow |
| 2023 | SOK: Side Channel Monitoring for Additive Manufacturing - Bridging Cybersecurity and Quality Assurance Communities. Muhammad Ahsan, Muhammad Haris Rais, Irfan Ahmed |
| 2023 | SoK: A Data-driven View on Methods to Detect Reflective Amplification DDoS Attacks Using Honeypots. Marcin Nawrocki, John Kristoff, Raphael Hiesgen, Chris Kanich, Thomas C. Schmidt, Matthias Wählisch |
| 2023 | SoK: Analysis of Root Causes and Defense Strategies for Attacks on Microarchitectural Optimizations. Nadja Ramhöj Holtryd, Madhavan Manivannan, Per Stenström |
| 2023 | SoK: Content Moderation in Social Media, from Guidelines to Enforcement, and Research to Practice. Mohit Singhal, Chen Ling, Pujan Paudel, Poojitha Thota, Nihal Kumarswamy, Gianluca Stringhini, Shirin Nilizadeh |
| 2023 | SoK: Data Sovereignty. Jens Ernstberger, Jan Lauinger, Fatima Elsheimy, Liyi Zhou, Sebastian Steinhorst, Ran Canetti, Andrew Miller, Arthur Gervais, Dawn Song |
| 2023 | SoK: Explainable Machine Learning for Computer Security Applications. Azqa Nadeem, Daniël Vos, Clinton Cao, Luca Pajola, Simon Dieck, Robert Baumgartner, Sicco Verwer |
| 2023 | SoK: Pragmatic Assessment of Machine Learning for Network Intrusion Detection. Giovanni Apruzzese, Pavel Laskov, Johannes Schneider |
| 2023 | SoK: Rethinking Sensor Spoofing Attacks against Robotic Vehicles from a Systematic View. Yuan Xu, Xingshuo Han, Gelei Deng, Jiwei Li, Yang Liu, Tianwei Zhang |
| 2023 | Systematic Improvement of Access-Stratum Security in Mobile Networks. Rhys Miller, Ioana Boureanu, Stephan Wesemeyer, Zhili Sun, Hemant Zope |
| 2023 | Towards Automated Detection of Single-Trace Side-Channel Vulnerabilities in Constant-Time Cryptographic Code. Ferhat Erata, Ruzica Piskac, Víctor Mateu, Jakub Szefer |
| 2023 | Towards Fine-Grained Localization of Privacy Behaviors. Vijayanta Jain, Sepideh Ghanavati, Sai Teja Peddinti, Collin McMillan |
| 2023 | Understanding the Security Risks of Decentralized Exchanges by Uncovering Unfair Trades in the Wild. Jiaqi Chen, Yibo Wang, Yuxuan Zhou, Wanning Ding, Yuzhe Tang, Xiaofeng Wang, Kai Li |
| 2023 | Understanding, Measuring, and Detecting Modern Technical Support Scams. Jienan Liu, Pooja Pun, Phani Vadrevu, Roberto Perdisci |
| 2023 | Watermarking Graph Neural Networks based on Backdoor Attacks. Jing Xu, Stefanos Koffas, Oguzhan Ersoy, Stjepan Picek |
| 2023 | When the Curious Abandon Honesty: Federated Learning Is Not Private. Franziska Boenisch, Adam Dziedzic, Roei Schuster, Ali Shahin Shamsabadi, Ilia Shumailov, Nicolas Papernot |
| 2023 | You Cannot Always Win the Race: Analyzing mitigations for branch target prediction attacks. Alyssa Milburn, Ke Sun, Henrique Kawakami |
| 2023 | faulTPM: Exposing AMD fTPMs' Deepest Secrets. Hans Niklas Jacob, Christian Werling, Robert Buhren, Jean-Pierre Seifert |
| 2023 | smartFHE: Privacy-Preserving Smart Contracts from Fully Homomorphic Encryption. Ravital Solomon, Rick Weber, Ghada Almashaqbeh |