| 2023 | "All of them claim to be the best": Multi-perspective study of VPN users and VPN providers. Reethika Ramesh, Anjali Vyas, Roya Ensafi |
| 2023 | "Employees Who Don't Accept the Time Security Takes Are Not Aware Enough": The CISO View of Human-Centred Security. Jonas Hielscher, Uta Menges, Simon Parkin, Annette Kluge, M. Angela Sasse |
| 2023 | "I wouldn't want my unsafe code to run my pacemaker": An Interview Study on the Use, Comprehension, and Perceived Risks of Unsafe Rust. Sandra Höltervennhoff, Philip Klostermeyer, Noah Wöhler, Yasemin Acar, Sascha Fahl |
| 2023 | "I'm going to trust this until it burns me" Parents' Privacy Concerns and Delegation of Trust in K-8 Educational Technology. Victoria Zhong, Susan E. McGregor, Rachel Greenstadt |
| 2023 | "If I could do this, I feel anyone could: " The Design and Evaluation of a Secondary Authentication Factor Manager. Garrett Smith, Tarun Kumar Yadav, Jonathan Dutson, Scott Ruoti, Kent E. Seamons |
| 2023 | "If sighted people know, I should be able to know: " Privacy Perceptions of Bystanders with Visual Impairments around Camera-based Technology. Yuhang Zhao, Yaxing Yao, Jiaru Fu, Nihan Zhou |
| 2023 | "It's the Equivalent of Feeling Like You're in Jail": Lessons from Firsthand and Secondhand Accounts of IoT-Enabled Intimate Partner Abuse. Sophie Stephenson, Majed Almansoori, Pardis Emami Naeini, Rahul Chatterjee |
| 2023 | "Millions of people are watching you": Understanding the Digital-Safety Needs and Practices of Creators. Patrawat Samermit, Anna Turner, Patrick Gage Kelley, Tara Matthews, Vanessia Wu, Sunny Consolvo, Kurt Thomas |
| 2023 | "My Privacy for their Security": Employees' Privacy Perspectives and Expectations when using Enterprise Security Software. Jonah Stegman, Patrick J. Trottier, Caroline Hillier, Hassan Khan, Mohammad Mannan |
| 2023 | "Security is not my field, I'm a stats guy": A Qualitative Root Cause Analysis of Barriers to Adversarial Machine Learning Defenses in Industry. Jaron Mink, Harjot Kaur, Juliane Schmüser, Sascha Fahl, Yasemin Acar |
| 2023 | "To Do This Properly, You Need More Resources": The Hidden Costs of Introducing Simulated Phishing Campaigns. Lina Brunken, Annalina Buckmann, Jonas Hielscher, M. Angela Sasse |
| 2023 | "Un-Equal Online Safety?" A Gender Analysis of Security and Privacy Protection Advice and Behaviour Patterns. Kovila P. L. Coopamootoo, Magdalene Ng |
| 2023 | (M)WAIT for It: Bridging the Gap between Microarchitectural and Architectural Side Channels. Ruiyi Zhang, Taehyun Kim, Daniel Weber, Michael Schwarz |
| 2023 | 32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023 Joseph A. Calandrino, Carmela Troncoso |
| 2023 | A Bug's Life: Analyzing the Lifecycle and Mitigation Process of Content Security Policy Bugs. Gertjan Franken, Tom van Goethem, Lieven Desmet, Wouter Joosen |
| 2023 | A Data-free Backdoor Injection Approach in Neural Networks. Peizhuo Lv, Chang Yue, Ruigang Liang, Yunfei Yang, Shengzhi Zhang, Hualong Ma, Kai Chen |
| 2023 | A Hybrid Alias Analysis and Its Application to Global Variable Protection in the Linux Kernel. Guoren Li, Hang Zhang, Jinmeng Zhou, Wenbo Shen, Yulei Sui, Zhiyun Qian |
| 2023 | A Large Scale Study of the Ethereum Arbitrage Ecosystem. Robert McLaughlin, Christopher Kruegel, Giovanni Vigna |
| 2023 | A Large-Scale Measurement of Website Login Policies. Suood Abdulaziz Al-Roomi, Frank Li |
| 2023 | A Mixed-Methods Study of Security Practices of Smart Contract Developers. Tanusree Sharma, Kyrie Zhixuan Zhou, Andrew Miller, Yang Wang |
| 2023 | A Peek into the Metaverse: Detecting 3D Model Clones in Mobile Games. Chaoshun Zuo, Chao Wang, Zhiqiang Lin |
| 2023 | A Plot is Worth a Thousand Words: Model Information Stealing Attacks via Scientific Plots. Boyang Zhang, Xinlei He, Yun Shen, Tianhao Wang, Yang Zhang |
| 2023 | A Research Framework and Initial Study of Browser Security for the Visually Impaired. Elaine Lau, Zachary Peterson |
| 2023 | A Study of China's Censorship and Its Evasion Through the Lens of Online Gaming. Yuzhou Feng, Ruyu Zhai, Radu Sion, Bogdan Carbunar |
| 2023 | A Study of Multi-Factor and Risk-Based Authentication Availability. Anthony Gavazzi, Ryan Williams, Engin Kirda, Long Lu, Andre King, Andy Davis, Tim Leek |
| 2023 | A Two-Decade Retrospective Analysis of a University's Vulnerability to Attacks Exploiting Reused Passwords. Alexandra Nisenoff, Maximilian Golla, Miranda Wei, Juliette Hainline, Hayley Szymanek, Annika Braun, Annika Hildebrandt, Blair Christensen, David Langenberg, Blase Ur |
| 2023 | A Verified Confidential Computing as a Service Framework for Privacy Preservation. Hongbo Chen, Haobin Hiroki Chen, Mingshen Sun, Kang Li, Zhaofeng Chen, Xiaofeng Wang |
| 2023 | A comprehensive, formal and automated analysis of the EDHOC protocol. Charlie Jacomme, Elise Klein, Steve Kremer, Maïwenn Racouchot |
| 2023 | ACFA: Secure Runtime Auditing & Guaranteed Device Healing via Active Control Flow Attestation. Adam Caulfield, Norrathep Rattanavipanon, Ivan De Oliveira Nunes |
| 2023 | ACORN: Input Validation for Secure Aggregation. James Bell, Adrià Gascón, Tancrède Lepoint, Baiyu Li, Sarah Meiklejohn, Mariana Raykova, Cathie Yun |
| 2023 | ACTOR: Action-Guided Kernel Fuzzing. Marius Fleischer, Dipanjan Das, Priyanka Bose, Weiheng Bai, Kangjie Lu, Mathias Payer, Christopher Kruegel, Giovanni Vigna |
| 2023 | ACon Sangdon Park, Osbert Bastani, Taesoo Kim |
| 2023 | AEX-Notify: Thwarting Precise Single-Stepping Attacks through Interrupt Awareness for Intel SGX Enclaves. Scott Constable, Jo Van Bulck, Xiang Cheng, Yuan Xiao, Cedric Xing, Ilya Alexandrovich, Taesoo Kim, Frank Piessens, Mona Vij, Mark Silberstein |
| 2023 | AIFORE: Smart Fuzzing Based on Automatic Input Format Reverse Engineering. Ji Shi, Zhun Wang, Zhiyao Feng, Yang Lan, Shisong Qin, Wei You, Wei Zou, Mathias Payer, Chao Zhang |
| 2023 | AIRS: Explanation for Deep Reinforcement Learning based Security Applications. Jiahao Yu, Wenbo Guo, Qi Qin, Gang Wang, Ting Wang, Xinyu Xing |
| 2023 | AIRTAG: Towards Automated Attack Investigation by Unsupervised Learning with Log Texts. Hailun Ding, Juan Zhai, Yuhong Nan, Shiqing Ma |
| 2023 | ARGUS: A Framework for Staged Static Taint Analysis of GitHub Workflows and Actions. Siddharth Muralee, Igibek Koishybayev, Aleksandr Nahapetyan, Greg Tystahl, Bradley Reaves, Antonio Bianchi, William Enck, Alexandros Kapravelos, Aravind Machiry |
| 2023 | ARGUS: Context-Based Detection of Stealthy IoT Infiltration Attacks. Phillip Rieger, Marco Chilese, Reham Mohamed, Markus Miettinen, Hossein Fereidooni, Ahmad-Reza Sadeghi |
| 2023 | ARI: Attestation of Real-time Mission Execution Integrity. Jinwen Wang, Yujie Wang, Ao Li, Yang Xiao, Ruide Zhang, Wenjing Lou, Y. Thomas Hou, Ning Zhang |
| 2023 | ARMore: Pushing Love Back Into Binaries. Luca Di Bartolomeo, Hossein Moghaddas, Mathias Payer |
| 2023 | ASSET: Robust Backdoor Data Detection Across a Multiplicity of Deep Learning Paradigms. Minzhou Pan, Yi Zeng, Lingjuan Lyu, Xue Lin, Ruoxi Jia |
| 2023 | AURC: Detecting Errors in Program Code and Documentation. Peiwei Hu, Ruigang Liang, Ying Cao, Kai Chen, Runze Zhang |
| 2023 | Abuse Vectors: A Framework for Conceptualizing IoT-Enabled Interpersonal Abuse. Sophie Stephenson, Majed Almansoori, Pardis Emami Naeini, Danny Yuxing Huang, Rahul Chatterjee |
| 2023 | Access Denied: Assessing Physical Risks to Internet Access Networks. Alexander Marder, Zesen Zhang, Ricky K. P. Mok, Ramakrishna Padmanabhan, Bradley Huffaker, Matthew Luckie, Alberto Dainotti, K. C. Claffy, Alex C. Snoeren, Aaron Schulman |
| 2023 | Account Security Interfaces: Important, Unintuitive, and Untrustworthy. Alaa Daffalla, Marina Sanusi Bohuk, Nicola Dell, Rosanna Bellini, Thomas Ristenpart |
| 2023 | Account Verification on Social Media: User Perceptions and Paid Enrollment. Madelyne Xiao, Mona Wang, Anunay Kulshrestha, Jonathan R. Mayer |
| 2023 | Adversarial Training for Raw-Binary Malware Classifiers. Keane Lucas, Samruddhi Pai, Weiran Lin, Lujo Bauer, Michael K. Reiter, Mahmood Sharif |
| 2023 | Aegis: Mitigating Targeted Bit-flip Attacks against Deep Neural Networks. Jialai Wang, Ziyuan Zhang, Meiqi Wang, Han Qiu, Tianwei Zhang, Qi Li, Zongpeng Li, Tao Wei, Chao Zhang |
| 2023 | Aliasing Backdoor Attacks on Pre-trained Models. Cheng'an Wei, Yeonjoon Lee, Kai Chen, Guozhu Meng, Peizhuo Lv |
| 2023 | All cops are broadcasting: TETRA under scrutiny. Carlo Meijer, Wouter Bokslag, Jos Wetzels |
| 2023 | AlphaEXP: An Expert System for Identifying Security-Sensitive Kernel Objects. Ruipeng Wang, Kaixiang Chen, Chao Zhang, Zulie Pan, Qianyu Li, Siliang Qin, Shenglin Xu, Min Zhang, Yang Li |
| 2023 | An Efficient Design of Intelligent Network Data Plane. Guangmeng Zhou, Zhuotao Liu, Chuanpu Fu, Qi Li, Ke Xu |
| 2023 | An Empirical Study & Evaluation of Modern CAPTCHAs. Andrew Searles, Yoshimichi Nakatsuka, Ercan Ozturk, Andrew Paverd, Gene Tsudik, Ai Enkoji |
| 2023 | An Input-Agnostic Hierarchical Deep Learning Framework for Traffic Fingerprinting. Jian Qu, Xiaobo Ma, Jianfeng Li, Xiapu Luo, Lei Xue, Junjie Zhang, Zhenhua Li, Li Feng, Xiaohong Guan |
| 2023 | Anatomy of a High-Profile Data Breach: Dissecting the Aftermath of a Crypto-Wallet Case. Svetlana Abramova, Rainer Böhme |
| 2023 | AnimateDead: Debloating Web Applications Using Concolic Execution. Babak Amin Azad, Rasoul Jahanshahi, Chris Tsoukaladelis, Manuel Egele, Nick Nikiforakis |
| 2023 | Araña: Discovering and Characterizing Password Guessing Attacks in Practice. Mazharul Islam, Marina Sanusi Bohuk, Paul Chung, Thomas Ristenpart, Rahul Chatterjee |
| 2023 | Are Consumers Willing to Pay for Security and Privacy of IoT Devices? Pardis Emami Naeini, Janarth Dheenadhayalan, Yuvraj Agarwal, Lorrie Faith Cranor |
| 2023 | Are You Spying on Me? Large-Scale Analysis on IoT Data Exposure through Companion Apps. Yuhong Nan, Xueqiang Wang, Luyi Xing, Xiaojing Liao, Ruoyu Wu, Jianliang Wu, Yifan Zhang, Xiaofeng Wang |
| 2023 | Assessing Anonymity Techniques Employed in German Court Decisions: A De-Anonymization Experiment. Dominic Deuber, Michael Keuchen, Nicolas Christin |
| 2023 | Attacks are Forwarded: Breaking the Isolation of MicroVM-based Containers Through Operation Forwarding. Jietao Xiao, Nanzi Yang, Wenbo Shen, Jinku Li, Xin Guo, Zhiqiang Dong, Fei Xie, Jianfeng Ma |
| 2023 | Auditing Framework APIs via Inferred App-side Security Specifications. Parjanya Vyas, Asim Waheed, Yousra Aafer, N. Asokan |
| 2023 | Auditing Frameworks Need Resource Isolation: A Systematic Study on the Super Producer Threat to System Auditing and Its Mitigation. Peng Jiang, Ruizhe Huang, Ding Li, Yao Guo, Xiangqun Chen, Jianhai Luan, Yuxin Ren, Xinwei Hu |
| 2023 | Auditory Eyesight: Demystifying μs-Precision Keystroke Tracking Attacks on Unconstrained Keyboard Inputs. Yazhou Tu, Liqun Shan, Md. Imran Hossen, Sara Rampazzi, Kevin R. B. Butler, Xiali Hei |
| 2023 | Authenticated private information retrieval. Simone Colombo, Kirill Nikitin, Henry Corrigan-Gibbs, David J. Wu, Bryan Ford |
| 2023 | AutoFR: Automated Filter Rule Generation for Adblocking. Hieu Le, Salma Elmalaki, Athina Markopoulou, Zubair Shafiq |
| 2023 | Automata-Guided Control-Flow-Sensitive Fuzz Driver Generation. Cen Zhang, Yuekang Li, Hao Zhou, Xiaohan Zhang, Yaowen Zheng, Xian Zhan, Xiaofei Xie, Xiapu Luo, Xinghua Li, Yang Liu, Sheikh Mahbub Habib |
| 2023 | Automated Analysis of Protocols that use Authenticated Encryption: How Subtle AEAD Differences can impact Protocol Security. Cas Cremers, Alexander Dax, Charlie Jacomme, Mang Zhao |
| 2023 | Automated Cookie Notice Analysis and Enforcement. Rishabh Khandelwal, Asmit Nayak, Hamza Harkous, Kassem Fawaz |
| 2023 | Automated Exploitable Heap Layout Generation for Heap Overflows Through Manipulation Distance-Guided Fuzzing. Bin Zhang, Jiongyi Chen, Runhao Li, Chao Feng, Ruilin Li, Chaojing Tang |
| 2023 | Automated Inference on Financial Security of Ethereum Smart Contracts. Wansen Wang, Wenchao Huang, Zhaoyi Meng, Yan Xiong, Fuyou Miao, Xianjin Fang, Caichang Tu, Renjie Ji |
| 2023 | Automated Security Analysis of Exposure Notification Systems. Kevin Morio, Ilkan Esiyok, Dennis Jackson, Robert Künnemann |
| 2023 | BASECOMP: A Comparative Analysis for Integrity Protection in Cellular Baseband Software. Eunsoo Kim, Minwoo Baek, CheolJun Park, Dongkwan Kim, Yongdae Kim, Insu Yun |
| 2023 | Back to School: On the (In)Security of Academic VPNs. Ka Lok Wu, Man Hong Hue, Ngai Man Poon, Kin Man Leung, Wai Yin Po, Kin Ting Wong, Sze Ho Hui, Sze Yiu Chau |
| 2023 | BalanceProofs: Maintainable Vector Commitments with Fast Aggregation. Weijie Wang, Annie Ulichney, Charalampos Papamanthou |
| 2023 | Beyond The Gates: An Empirical Analysis of HTTP-Managed Password Stealers and Operators. Athanasios Avgetidis, Omar Alrawi, Kevin Valakuzhy, Charles Lever, Paul Burbage, Angelos D. Keromytis, Fabian Monrose, Manos Antonakakis |
| 2023 | Beyond Typosquatting: An In-depth Look at Package Confusion. Shradha Neupane, Grant Holmes, Elizabeth Wyss, Drew Davidson, Lorenzo De Carli |
| 2023 | Bilingual Problems: Studying the Security Risks Incurred by Native Extensions in Scripting Languages. Cristian-Alexandru Staicu, Sazzadur Rahaman, Ágnes Kiss, Michael Backes |
| 2023 | Black-box Adversarial Example Attack towards FCG Based Android Malware Detection under Incomplete Feature Information. Heng Li, Zhang Cheng, Bang Wu, Liheng Yuan, Cuiying Gao, Wei Yuan, Xiapu Luo |
| 2023 | Bleem: Packet Sequence Oriented Fuzzing for Protocol Implementations. Zhengxiong Luo, Junze Yu, Feilong Zuo, Jianzhong Liu, Yu Jiang, Ting Chen, Abhik Roychoudhury, Jiaguang Sun |
| 2023 | BoKASAN: Binary-only Kernel Address Sanitizer for Effective Kernel Fuzzing. Mingi Cho, Dohyeon An, Hoyong Jin, Taekyoung Kwon |
| 2023 | BotScreen: Trust Everybody, but Cut the Aimbots Yourself. Minyeop Choi, Gihyuk Ko, Sang Kil Cha |
| 2023 | Bug Hunters' Perspectives on the Challenges and Benefits of the Bug Bounty Ecosystem. Omer Akgul, Taha Eghtesad, Amit Elazari, Omprakash Gnawali, Jens Grossklags, Michelle L. Mazurek, Daniel Votipka, Aron Laszka |
| 2023 | BunnyHop: Exploiting the Instruction Prefetcher. Zhiyuan Zhang, Mingtian Tao, Sioli O'Connell, Chitchanok Chuengsatiansup, Daniel Genkin, Yuval Yarom |
| 2023 | Bypassing Tunnels: Leaking VPN Client Traffic by Abusing Routing Tables. Nian Xue, Yashaswi Malla, Zihang Xia, Christina Pöpper, Mathy Vanhoef |
| 2023 | CAPatch: Physical Adversarial Patch against Image Captioning Systems. Shibo Zhang, Yushi Cheng, Wenjun Zhu, Xiaoyu Ji, Wenyuan Xu |
| 2023 | CSHER: A System for Compact Storage with HE-Retrieval. Adi Akavia, Neta Oren, Boaz Sapir, Margarita Vald |
| 2023 | CacheQL: Quantifying and Localizing Cache Side-Channel Vulnerabilities in Production Software. Yuanyuan Yuan, Zhibo Liu, Shuai Wang |
| 2023 | Calpric: Inclusive and Fine-grain Labeling of Privacy Policies with Crowdsourcing and Active Learning. Wenjun Qiu, David Lie, Lisa M. Austin |
| 2023 | Can a Deep Learning Model for One Architecture Be Used for Others? Retargeted-Architecture Binary Code Analysis. Junzhe Wang, Matthew Sharp, Chuxiong Wu, Qiang Zeng, Lannan Luo |
| 2023 | Capstone: A Capability-based Foundation for Trustless Secure Memory Access. Jason Zhijingcheng Yu, Conrad Watt, Aditya Badole, Trevor E. Carlson, Prateek Saxena |
| 2023 | CarpetFuzz: Automatic Program Option Constraint Extraction from Documentation for Fuzzing. Dawei Wang, Ying Li, Zhiyu Zhang, Kai Chen |
| 2023 | Catch You and I Can: Revealing Source Voiceprint Against Voice Conversion. Jiangyi Deng, Yanjiao Chen, Yinan Zhong, Qianhao Miao, Xueluan Gong, Wenyuan Xu |
| 2023 | Checking Passwords on Leaky Computers: A Side Channel Analysis of Chrome's Password Leak Detect Protocol. Andrew Kwong, Walter Wang, Jason Kim, Jonathan Berger, Daniel Genkin, Eyal Ronen, Hovav Shacham, Riad S. Wahby, Yuval Yarom |
| 2023 | Cheesecloth: Zero-Knowledge Proofs of Real World Vulnerabilities. Santiago Cuéllar, Bill Harris, James Parker, Stuart Pernsteiner, Eran Tromer |
| 2023 | CipherH: Automated Detection of Ciphertext Side-channel Vulnerabilities in Cryptographic Implementations. Sen Deng, Mengyuan Li, Yining Tang, Shuai Wang, Shoumeng Yan, Yinqian Zhang |
| 2023 | Cipherfix: Mitigating Ciphertext Side-Channel Attacks in Software. Jan Wichelmann, Anna Pätschke, Luca Wilke, Thomas Eisenbarth |
| 2023 | ClepsydraCache - Preventing Cache Attacks with Time-Based Evictions. Jan Philipp Thoma, Christian Niesler, Dominic A. Funke, Gregor Leander, Pierre Mayr, Nils Pohl, Lucas Davi, Tim Güneysu |
| 2023 | CodexLeaks: Privacy Leaks from Code Generation Language Models in GitHub Copilot. Liang Niu, Muhammad Shujaat Mirza, Zayd Maradni, Christina Pöpper |
| 2023 | Collide+Power: Leaking Inaccessible Data with Software-based Power Side Channels. Andreas Kogler, Jonas Juffinger, Lukas Giner, Lukas Gerlach, Martin Schwarzl, Michael Schwarz, Daniel Gruss, Stefan Mangard |
| 2023 | Combating Robocalls with Phone Virtual Assistant Mediated Interaction. Sharbani Pandit, Krishanu Sarker, Roberto Perdisci, Mustaque Ahamad, Diyi Yang |
| 2023 | Confusum Contractum: Confused Deputy Vulnerabilities in Ethereum Smart Contracts. Fabio Gritti, Nicola Ruaro, Robert McLaughlin, Priyanka Bose, Dipanjan Das, Ilya Grishchenko, Christopher Kruegel, Giovanni Vigna |
| 2023 | Content-Type: multipart/oracle - Tapping into Format Oracles in Email End-to-End Encryption. Fabian Ising, Damian Poddebniak, Tobias Kappert, Christoph Saatjohann, Sebastian Schinzel |
| 2023 | Continuous Learning for Android Malware Detection. Yizheng Chen, Zhoujie Ding, David A. Wagner |
| 2023 | Controlled Data Races in Enclaves: Attacks and Detection. Sanchuan Chen, Zhiqiang Lin, Yinqian Zhang |
| 2023 | Cookie Crumbles: Breaking and Fixing Web Session Integrity. Marco Squarcina, Pedro Adão, Lorenzo Veronese, Matteo Maffei |
| 2023 | Credit Karma: Understanding Security Implications of Exposed Cloud Services through Automated Capability Inference. Xueqiang Wang, Yuqiong Sun, Susanta Nanda, Xiaofeng Wang |
| 2023 | Cross Container Attacks: The Bewildered eBPF on Clouds. Yi He, Roland Guo, Yunlong Xing, Xijia Che, Kun Sun, Zhuotao Liu, Ke Xu, Qi Li |
| 2023 | Cryptographic Administration for Secure Group Messaging. David Balbás, Daniel Collins, Serge Vaudenay |
| 2023 | Cryptographic Deniability: A Multi-perspective Study of User Perceptions and Expectations. Tarun Kumar Yadav, Devashish Gosain, Kent E. Seamons |
| 2023 | Curve Trees: Practical and Transparent Zero-Knowledge Accumulators. Matteo Campanelli, Mathias Hall-Andersen, Simon Holmgaard Kamp |
| 2023 | DAFL: Directed Grey-box Fuzzing guided by Data Dependency. Tae Eun Kim, Jaeseung Choi, Kihong Heo, Sang Kil Cha |
| 2023 | DDRace: Finding Concurrency UAF Vulnerabilities in Linux Drivers with Directed Fuzzing. Ming Yuan, Bodong Zhao, Penghui Li, Jiashuo Liang, Xinhui Han, Xiapu Luo, Chao Zhang |
| 2023 | DISTDET: A Cost-Effective Distributed Cyber Threat Detection System. Feng Dong, Liu Wang, Xu Nie, Fei Shao, Haoyu Wang, Ding Li, Xiapu Luo, Xusheng Xiao |
| 2023 | DScope: A Cloud-Native Internet Telescope. Eric Pauley, Paul Barford, Patrick D. McDaniel |
| 2023 | DeResistor: Toward Detection-Resistant Probing for Evasion of Internet Censorship. Abderrahmen Amich, Birhanu Eshete, Vinod Yegneswaran, Nguyen Phong Hoang |
| 2023 | Decompiling x86 Deep Neural Network Executables. Zhibo Liu, Yuanyuan Yuan, Shuai Wang, Xiaofei Xie, Lei Ma |
| 2023 | Defining "Broken": User Experiences and Remediation Tactics When Ad-Blocking or Tracking-Protection Tools Break a Website's User Experience. Alexandra Nisenoff, Arthur Borem, Madison Pickering, Grant Nakanishi, Maya Thumpasery, Blase Ur |
| 2023 | Demystifying Pointer Authentication on Apple M1. Zechao Cai, Jiaxun Zhu, Wenbo Shen, Yutian Yang, Rui Chang, Yu Wang, Jinku Li, Kui Ren |
| 2023 | Design of Access Control Mechanisms in Systems-on-Chip with Formal Integrity Guarantees. Dino Mehmedagic, Mohammad Rahmani Fadiheh, Johannes Müller, Anna Lena Duque Antón, Dominik Stoffel, Wolfgang Kunz |
| 2023 | Detecting API Post-Handling Bugs Using Code and Description in Patches. Miaoqian Lin, Kai Chen, Yang Xiao |
| 2023 | Detecting Multi-Step IAM Attacks in AWS Environments via Model Checking. Ilia Shevrin, Oded Margalit |
| 2023 | Detecting Union Type Confusion in Component Object Model. Yuxing Zhang, Xiaogang Zhu, Daojing He, Minhui Xue, Shouling Ji, Mohammad Sayad Haghighi, Sheng Wen, Zhiniang Peng |
| 2023 | Detecting and Handling IoT Interaction Threats in Multi-Platform Multi-Control-Channel Smart Homes. Haotian Chi, Qiang Zeng, Xiaojiang Du |
| 2023 | Device Tracking via Linux's New TCP Source Port Selection Algorithm. Moshe Kol, Amit Klein, Yossi Gilad |
| 2023 | Did the Shark Eat the Watchdog in the NTP Pool? Deceiving the NTP Pool's Monitoring System. Jonghoon Kwon, Jeonggyu Song, Junbeom Hur, Adrian Perrig |
| 2023 | DiffSmooth: Certifiably Robust Learning via Diffusion Models and Local Smoothing. Jiawei Zhang, Zhongzhu Chen, Huan Zhang, Chaowei Xiao, Bo Li |
| 2023 | Differential Testing of Cross Deep Learning Framework APIs: Revealing Inconsistencies and Vulnerabilities. Zizhuang Deng, Guozhu Meng, Kai Chen, Tong Liu, Lu Xiang, Chunyang Chen |
| 2023 | Discovering Adversarial Driving Maneuvers against Autonomous Vehicles. Ruoyu Song, Muslum Ozgur Ozmen, Hyungsub Kim, Raymond Muller, Z. Berkay Celik, Antonio Bianchi |
| 2023 | Distance-Aware Private Set Intersection. Anrin Chakraborti, Giulia Fanti, Michael K. Reiter |
| 2023 | Diving into Robocall Content with SnorCall. Sathvik Prasad, Trevor Dunlap, Alexander J. Ross, Bradley Reaves |
| 2023 | Don't be Dense: Efficient Keyword PIR for Sparse Databases. Sarvar Patel, Joon Young Seo, Kevin Yeo |
| 2023 | Downfall: Exploiting Speculative Data Gathering. Daniel Moghimi |
| 2023 | Downgrading DNSSEC: How to Exploit Crypto Agility for Hijacking Signed Zones. Elias Heftrig, Haya Schulmann, Michael Waidner |
| 2023 | Dubhe: Succinct Zero-Knowledge Proofs for Standard AES and related Applications. Changchang Ding, Yan Huang |
| 2023 | Duoram: A Bandwidth-Efficient Distributed ORAM for 2- and 3-Party Computation. Adithya Vadapalli, Ryan Henry, Ian Goldberg |
| 2023 | DynSQL: Stateful Fuzzing for Database Management Systems with Complex and Valid SQL Query Generation. Zu-Ming Jiang, Jia-Ju Bai, Zhendong Su |
| 2023 | ELASM: Error-Latency-Aware Scale Management for Fully Homomorphic Encryption. Yongwoo Lee, Seonyoung Cheon, Dongkwan Kim, Dongyoon Lee, Hanjun Kim |
| 2023 | Eavesdropping Mobile App Activity via Radio-Frequency Energy Harvesting. Tao Ni, Guohao Lan, Jia Wang, Qingchuan Zhao, Weitao Xu |
| 2023 | Educators' Perspectives of Using (or Not Using) Online Exam Proctoring. David G. Balash, Elena Korkes, Miles Grant, Adam J. Aviv, Rahel A. Fainchtein, Micah Sherr |
| 2023 | Efficient 3PC for Binary Circuits with Application to Maliciously-Secure DNN Inference. Yun Li, Yufei Duan, Zhicong Huang, Cheng Hong, Chao Zhang, Yifan Song |
| 2023 | Efficient Unbalanced Private Set Intersection Cardinality and User-friendly Privacy-preserving Contact Tracing. Mingli Wu, Tsz Hon Yuen |
| 2023 | Egg Hunt in Tesla Infotainment: A First Look at Reverse Engineering of Qt Binaries. Haohuang Wen, Zhiqiang Lin |
| 2023 | EnigMap: External-Memory Oblivious Map for Secure Enclaves. Afonso Tinoco, Sixiang Gao, Elaine Shi |
| 2023 | Eos: Efficient Private Delegation of zkSNARK Provers. Alessandro Chiesa, Ryan Lehmkuhl, Pratyush Mishra, Yinuo Zhang |
| 2023 | Erebus: Access Control for Augmented Reality Systems. Yoonsang Kim, Sanket Goutam, Amir Rahmati, Arie E. Kaufman |
| 2023 | Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations. Tadayoshi Kohno, Yasemin Acar, Wulf Loh |
| 2023 | Evading Provenance-Based ML Detectors with Adversarial System Actions. Kunal Mukherjee, Joshua Wiedemeier, Tianhao Wang, James Wei, Feng Chen, Muhyun Kim, Murat Kantarcioglu, Kangkook Jee |
| 2023 | Every Signature is Broken: On the Insecurity of Microsoft Office's OOXML Signatures. Simon Rohlmann, Vladislav Mladenov, Christian Mainka, Daniel Hirschberger, Jörg Schwenk |
| 2023 | Every Vote Counts: Ranking-Based Training of Federated Learning to Resist Poisoning Attacks. Hamid Mozaffari, Virat Shejwalkar, Amir Houmansadr |
| 2023 | Examining Consumer Reviews to Understand Security and Privacy Issues in the Market of Smart Home Devices. Swaathi Vetrivel, Veerle van Harten, Carlos Hernandez Gañán, Michel van Eeten, Simon Parkin |
| 2023 | Examining Power Dynamics and User Privacy in Smart Technology Use Among Jordanian Households. Wael S. Albayaydh, Ivan Flechais |
| 2023 | Exorcising "Wraith": Protecting LiDAR-based Object Detector in Automated Driving System from Appearing Attacks. Qifan Xiao, Xudong Pan, Yifan Lu, Mi Zhang, Jiarun Dai, Min Yang |
| 2023 | Exploring Privacy and Incentives Considerations in Adoption of COVID-19 Contact Tracing Apps. Oshrat Ayalon, Dana Turjeman, Elissa M. Redmiles |
| 2023 | Exploring Tenants' Preferences of Privacy Negotiation in Airbnb. Zixin Wang, Danny Yuxing Huang, Yaxing Yao |
| 2023 | Exploring User Reactions and Mental Models Towards Perceptual Manipulation Attacks in Mixed Reality. Kaiming Cheng, Jeffery F. Tian, Tadayoshi Kohno, Franziska Roesner |
| 2023 | Exploring the Unknown DTLS Universe: Analysis of the DTLS Server Ecosystem on the Internet. Nurullah Erinola, Marcel Maehren, Robert Merget, Juraj Somorovsky, Jörg Schwenk |
| 2023 | Extended Hell(o): A Comprehensive Large-Scale Study on Email Confidentiality and Integrity Mechanisms in the Wild. Birk Blechschmidt, Ben Stock |
| 2023 | Extending a Hand to Attackers: Browser Privilege Escalation Attacks via Extensions. Young Min Kim, Byoungyoung Lee |
| 2023 | Extracting Protocol Format as State Machine via Controlled Static Loop Analysis. Qingkai Shi, Xiangzhe Xu, Xiangyu Zhang |
| 2023 | Extracting Training Data from Diffusion Models. Nicholas Carlini, Jamie Hayes, Milad Nasr, Matthew Jagielski, Vikash Sehwag, Florian Tramèr, Borja Balle, Daphne Ippolito, Eric Wallace |
| 2023 | Eye-Shield: Real-Time Protection of Mobile Device Screen Information from Shoulder Surfing. Brian Tang, Kang G. Shin |
| 2023 | FABRID: Flexible Attestation-Based Routing for Inter-Domain Networks. Cyrill Krähenbühl, Marc Wyss, David A. Basin, Vincent Lenders, Adrian Perrig, Martin Strohmeier |
| 2023 | FACE-AUDITOR: Data Auditing in Facial Recognition Systems. Min Chen, Zhikun Zhang, Tianhao Wang, Michael Backes, Yang Zhang |
| 2023 | FISHFUZZ: Catch Deeper Bugs by Throwing Larger Nets. Han Zheng, Jiayuan Zhang, Yuhang Huang, Zezhong Ren, He Wang, Chunjie Cao, Yuqing Zhang, Flavio Toffalini, Mathias Payer |
| 2023 | Fact-Saboteurs: A Taxonomy of Evidence Manipulation Attacks against Fact-Verification Systems. Sahar Abdelnabi, Mario Fritz |
| 2023 | Fairness Properties of Face Recognition and Obfuscation Systems. Harrison Rosenberg, Brian Tang, Kassem Fawaz, Somesh Jha |
| 2023 | Fast IDentity Online with Anonymous Credentials (FIDO-AC). Wei-Zhu Yeoh, Michal Kepkowski, Gunnar Heide, Dali Kaafar, Lucjan Hanzlik |
| 2023 | FedVal: Different good or different bad in federated learning. Viktor Valadi, Xinchi Qiu, Pedro Porto Buarque de Gusmão, Nicholas D. Lane, Mina Alibeigi |
| 2023 | Fine-grained Poisoning Attack to Local Differential Privacy Protocols for Mean and Variance Estimation. Xiaoguang Li, Ninghui Li, Wenhai Sun, Neil Zhenqiang Gong, Hui Li |
| 2023 | FirmSolo: Enabling dynamic analysis of binary Linux-based IoT kernel modules. Ioannis Angelakopoulos, Gianluca Stringhini, Manuel Egele |
| 2023 | FloatZone: Accelerating Memory Error Detection using the Floating Point Unit. Floris Gorter, Enrico Barberis, Raphael Isemann, Erik van der Kouwe, Cristiano Giuffrida, Herbert Bos |
| 2023 | Formal Analysis and Patching of BLE-SC Pairing. Min Shi, Jing Chen, Kun He, Haoran Zhao, Meng Jia, Ruiying Du |
| 2023 | Formal Analysis of SPDM: Security Protocol and Data Model version 1.2. Cas Cremers, Alexander Dax, Aurora Naska |
| 2023 | Formal Analysis of Session-Handling in Secure Messaging: Lifting Security from Sessions to Conversations. Cas Cremers, Charlie Jacomme, Aurora Naska |
| 2023 | Forming Faster Firmware Fuzzers. Lukas Seidel, Dominik Christian Maier, Marius Muench |
| 2023 | Fourteen Years in the Life: A Root Server's Perspective on DNS Resolver Security. Alden Hilton, Casey T. Deccio, Jacob Davis |
| 2023 | Framing Frames: Bypassing Wi-Fi Encryption by Manipulating Transmit Queues. Domien Schepers, Aanjhan Ranganathan, Mathy Vanhoef |
| 2023 | Freaky Leaky SMS: Extracting User Locations by Analyzing SMS Timings. Evangelos Bitsikas, Theodor Schnitzler, Christina Pöpper, Aanjhan Ranganathan |
| 2023 | FreeEagle: Detecting Complex Neural Trojans in Data-Free Cases. Chong Fu, Xuhong Zhang, Shouling Ji, Ting Wang, Peng Lin, Yanghe Feng, Jianwei Yin |
| 2023 | FuncTeller: How Well Does eFPGA Hide Functionality? Zhaokun Han, Mohammed Shayan, Aneesh Dixit, Mustafa M. Shihab, Yiorgos Makris, Jeyavijayan Rajendran |
| 2023 | Fuzz The Power: Dual-role State Guided Black-box Fuzzing for USB Power Delivery. Kyungtae Kim, Sungwoo Kim, Kevin R. B. Butler, Antonio Bianchi, Rick Kennell, Dave Tian |
| 2023 | FuzzJIT: Oracle-Enhanced Fuzzing for JavaScript Engine JIT Compiler. Junjie Wang, Zhiyi Zhang, Shuang Liu, Xiaoning Du, Junjie Chen |
| 2023 | Fuzztruction: Using Fault Injection-based Fuzzing to Leverage Implicit Domain Knowledge. Nils Bars, Moritz Schloegel, Tobias Scharnowski, Nico Schiller, Thorsten Holz |
| 2023 | GAP: Differentially Private Graph Neural Networks with Aggregation Perturbation. Sina Sajadmanesh, Ali Shahin Shamsabadi, Aurélien Bellet, Daniel Gatica-Perez |
| 2023 | GLeeFuzz: Fuzzing WebGL Through Error Message Guided Mutation. Hui Peng, Zhihao Yao, Ardalan Amiri Sani, Dave Tian, Mathias Payer |
| 2023 | Generative Intrusion Detection and Prevention on Data Stream. HyungBin Seo, MyungKeun Yoon |
| 2023 | GigaDORAM: Breaking the Billion Address Barrier. Brett Hemenway Falk, Rafail Ostrovsky, Matan Shtepel, Jacob Zhang |
| 2023 | Glaze: Protecting Artists from Style Mimicry by Text-to-Image Models. Shawn Shan, Jenna Cryan, Emily Wenger, Haitao Zheng, Rana Hanocka, Ben Y. Zhao |
| 2023 | Glimpse: On-Demand PoW Light Client with Constant-Size Storage for DeFi. Giulia Scaffino, Lukas Aumayr, Zeta Avarikioti, Matteo Maffei |
| 2023 | GlitchHiker: Uncovering Vulnerabilities of Image Signal Transmission with IEMI. Qinhong Jiang, Xiaoyu Ji, Chen Yan, Zhixin Xie, Haina Lou, Wenyuan Xu |
| 2023 | Glowing in the Dark: Uncovering IPv6 Address Discovery and Scanning Strategies in the Wild. Hammas Bin Tanveer, Rachee Singh, Paul Pearce, Rishab Nithyanand |
| 2023 | Going through the motions: AR/VR keylogging from user head motions. Carter Slocum, Yicheng Zhang, Nael B. Abu-Ghazaleh, Jiasi Chen |
| 2023 | Gradient Obfuscation Gives a False Sense of Security in Federated Learning. Kai Yue, Richeng Jin, Chau-Wai Wong, Dror Baron, Huaiyu Dai |
| 2023 | Greenhouse: Single-Service Rehosting of Linux-Based Firmware Binaries in User-Space Emulation. Hui Jun Tay, Kyle Zeng, Jayakrishna Menon Vadayath, Arvind S. Raj, Audrey Dutcher, Tejesh Reddy, Wil Gibbs, Zion Leonahenahe Basque, Fangzhou Dong, Zack Smith, Adam Doupé, Tiffany Bao, Yan Shoshitaishvili, Ruoyu Wang |
| 2023 | Guarding Serverless Applications with Kalium. Deepak Sirone Jegan, Liang Wang, Siddhant Bhagat, Michael M. Swift |
| 2023 | HECO: Fully Homomorphic Encryption Compiler. Alexander Viand, Patrick Jattke, Miro Haller, Anwar Hithnawi |
| 2023 | HOLMES: Efficient Distribution Testing for Secure Collaborative Learning. Ian Chang, Katerina Sotiraki, Weikeng Chen, Murat Kantarcioglu, Raluca A. Popa |
| 2023 | HOMESPY: The Invisible Sniffer of Infrared Remote Control of Smart TVs. Kong Huang, Yutong Zhou, Ke Zhang, Jiacen Xu, Jiongyi Chen, Di Tang, Kehuan Zhang |
| 2023 | Hard-label Black-box Universal Adversarial Patch Attack. Guanhong Tao, Shengwei An, Siyuan Cheng, Guangyu Shen, Xiangyu Zhang |
| 2023 | Hash Gone Bad: Automated discovery of protocol attacks that exploit hash function weaknesses. Vincent Cheval, Cas Cremers, Alexander Dax, Lucca Hirschi, Charlie Jacomme, Steve Kremer |
| 2023 | HashTag: Hash-based Integrity Protection for Tagged Architectures. Lukas Lamster, Martin Unterguggenberger, David Schrammel, Stefan Mangard |
| 2023 | Hey Kimya, Is My Smart Speaker Spying on Me? Taking Control of Sensor Privacy Through Isolation and Amnesia. Piet De Vaere, Adrian Perrig |
| 2023 | Hidden Reality: Caution, Your Hand Gesture Inputs in the Immersive Virtual World are Visible to All! Sindhu Reddy Kalathur Gopal, Diksha Shukla, James David Wheelock, Nitesh Saxena |
| 2023 | Hiding in Plain Sight: An Empirical Study of Web Application Abuse in Malware. Mingxuan Yao, Jonathan Fuller, Ranjita Pai Kasturi, Saumya Agarwal, Amit Kumar Sikder, Brendan Saltaformaggio |
| 2023 | High Recovery with Fewer Injections: Practical Binary Volumetric Injection Attacks against Dynamic Searchable Encryption. Xianglong Zhang, Wei Wang, Peng Xu, Laurence T. Yang, Kaitai Liang |
| 2023 | Hoedur: Embedded Firmware Fuzzing using Multi-Stream Inputs. Tobias Scharnowski, Simon Wörner, Felix Buchmann, Nils Bars, Moritz Schloegel, Thorsten Holz |
| 2023 | HorusEye: A Realtime IoT Malicious Traffic Detection Framework using Programmable Switches. Yutao Dong, Qing Li, Kaidong Wu, Ruoyu Li, Dan Zhao, Gareth Tyson, Junkun Peng, Yong Jiang, Shutao Xia, Mingwei Xu |
| 2023 | Hot Pixels: Frequency, Power, and Temperature Attacks on GPUs and Arm SoCs. Hritvik Taneja, Jason Kim, Jie Jeff Xu, Stephan van Schaik, Daniel Genkin, Yuval Yarom |
| 2023 | How Effective is Multiple-Vantage-Point Domain Control Validation? Grace H. Cimaszewski, Henry Birge-Lee, Liang Wang, Jennifer Rexford, Prateek Mittal |
| 2023 | How Library IT Staff Navigate Privacy and Security Challenges and Responsibilities. Alan F. Luo, Noel Warford, Samuel Dooley, Rachel Greenstadt, Michelle L. Mazurek, Nora McDonald |
| 2023 | How fast do you heal? A taxonomy for post-compromise security in secure-channel establishment. Olivier Blazy, Ioana Boureanu, Pascal Lafourcade, Cristina Onete, Léo Robert |
| 2023 | How the Great Firewall of China Detects and Blocks Fully Encrypted Traffic. Mingshi Wu, Jackson Sippe, Danesh Sivakumar, Jack Burg, Peter Anderson, Xiaokang Wang, Kevin Bock, Amir Houmansadr, Dave Levin, Eric Wustrow |
| 2023 | How to Bind Anonymous Credentials to Humans. Julia Hesse, Nitin Singh, Alessandro Sorniotti |
| 2023 | How to Cover up Anomalous Accesses to Electronic Health Records. Xiaojun Xu, Qingying Hao, Zhuolin Yang, Bo Li, David M. Liebovitz, Gang Wang, Carl A. Gunter |
| 2023 | Humans vs. Machines in Malware Classification. Simone Aonzo, Yufei Han, Alessandro Mantovani, Davide Balzarotti |
| 2023 | HyPFuzz: Formal-Assisted Processor Fuzzing. Chen Chen, Rahul Kande, Nathan Nguyen, Flemming Andersen, Aakash Tyagi, Ahmad-Reza Sadeghi, Jeyavijayan Rajendran |
| 2023 | ICSPatch: Automated Vulnerability Localization and Non-Intrusive Hotpatching in Industrial Control Systems using Data Dependence Graphs. Prashant Hari Narayan Rajput, Constantine Doumanidis, Michail Maniatakos |
| 2023 | Improving Logging to Reduce Permission Over-Granting Mistakes. Bingyu Shen, Tianyi Shan, Yuanyuan Zhou |
| 2023 | Improving Real-world Password Guessing Attacks via Bi-directional Transformers. Ming Xu, Jitao Yu, Xinyi Zhang, Chuanwang Wang, Shenghao Zhang, Haoqi Wu, Weili Han |
| 2023 | In the Quest to Protect Users from Side-Channel Attacks - A User-Centred Design Space to Mitigate Thermal Attacks on Public Payment Terminals. Karola Marky, Shaun Alexander Macdonald, Yasmeen Abdrabou, Mohamed Khamis |
| 2023 | Inception: Exposing New Attack Surfaces with Training in Transient Execution. Daniël Trujillo, Johannes Wikner, Kaveh Razavi |
| 2023 | Inducing Authentication Failures to Bypass Credit Card PINs. David A. Basin, Patrick Schaller, Jorge Toro-Pozo |
| 2023 | Inductive Graph Unlearning. Cheng-Long Wang, Mengdi Huai, Di Wang |
| 2023 | InfinityGauntlet: Expose Smartphone Fingerprint Authentication to Brute-force Attack. Yu Chen, Yang Yu, Lidong Zhai |
| 2023 | Instructions Unclear: Undefined Behaviour in Cellular Network Specifications. Daniel Klischies, Moritz Schloegel, Tobias Scharnowski, Mikhail Bogodukhov, David Rupprecht, Veelasha Moonsamy |
| 2023 | Intender: Fuzzing Intent-Based Networking with Intent-State Transition Guidance. Jiwon Kim, Benjamin E. Ujcich, Dave Tian |
| 2023 | Internet Service Providers' and Individuals' Attitudes, Barriers, and Incentives to Secure IoT. Nissy Sombatruang, Tristan Caulfield, Ingolf Becker, Akira Fujita, Takahiro Kasama, Koji Nakao, Daisuke Inoue |
| 2023 | Investigating Verification Behavior and Perceptions of Visual Digital Certificates. Dañiel Gerhardt, Alexander Ponticello, Adrian Dabrowski, Katharina Krombholz |
| 2023 | Is Your Wallet Snitching On You? An Analysis on the Privacy Implications of Web3. Christof Ferreira Torres, Fiona Willi, Shweta Shinde |
| 2023 | Isolated and Exhausted: Attacking Operating Systems via Site Isolation in the Browser. Matthias Gierlings, Marcus Brinkmann, Jörg Schwenk |
| 2023 | It's all in your head(set): Side-channel attacks on AR/VR systems. Yicheng Zhang, Carter Slocum, Jiasi Chen, Nael B. Abu-Ghazaleh |
| 2023 | IvySyn: Automated Vulnerability Discovery in Deep Learning Frameworks. Neophytos Christou, Di Jin, Vaggelis Atlidakis, Baishakhi Ray, Vasileios P. Kemerlis |
| 2023 | Jinn: Hijacking Safe Programs with Trojans. Komail Dharsee, John Criswell |
| 2023 | KENKU: Towards Efficient and Stealthy Black-box Adversarial Attacks against ASR Systems. Xinghui Wu, Shiqing Ma, Chao Shen, Chenhao Lin, Qian Wang, Qi Li, Yuan Rao |
| 2023 | Keep Your Friends Close, but Your Routeservers Closer: Insights into RPKI Validation in the Internet. Tomas Hlavacek, Haya Schulmann, Niklas Vogel, Michael Waidner |
| 2023 | KextFuzz: Fuzzing macOS Kernel EXTensions on Apple Silicon via Exploiting Mitigations. Tingting Yin, Zicong Gao, Zhenghang Xiao, Zheyu Ma, Min Zheng, Chao Zhang |
| 2023 | Know Your Cybercriminal: Evaluating Attacker Preferences by Measuring Profile Sales on an Active, Leading Criminal Market for User Impersonation at Scale. Michele Campobasso, Luca Allodi |
| 2023 | Knowledge Expansion and Counterfactual Interaction for Reference-Based Phishing Detection. Ruofan Liu, Yun Lin, Yifan Zhang, Penn Han Lee, Jin Song Dong |
| 2023 | Lalaine: Measuring and Characterizing Non-Compliance of Apple Privacy Labels. Yue Xiao, Zhengyi Li, Yue Qin, Xiaolong Bai, Jiale Guan, Xiaojing Liao, Luyi Xing |
| 2023 | Learning Normality is Enough: A Software-based Mitigation against Inaudible Voice Attacks. Xinfeng Li, Xiaoyu Ji, Chen Yan, Chaohao Li, Yichen Li, Zhenning Zhang, Wenyuan Xu |
| 2023 | Lessons Lost: Incident Response in the Age of Cyber Insurance and Breach Attorneys. Daniel W. Woods, Rainer Böhme, Josephine Wolff, Daniel Schwarcz |
| 2023 | LibScan: Towards More Precise Third-Party Library Identification for Android Applications. Yafei Wu, Cong Sun, Dongrui Zeng, Gang Tan, Siqi Ma, Peicheng Wang |
| 2023 | LightThief: Your Optical Communication Information is Stolen behind the Wall. Xin Liu, Wei Wang, Guanqun Song, Ting Zhu |
| 2023 | Linear Private Set Union from Multi-Query Reverse Private Membership Test. Cong Zhang, Yu Chen, Weiran Liu, Min Zhang, Dongdai Lin |
| 2023 | LocIn: Inferring Semantic Location from Spatial Maps in Mixed Reality. Habiba Farrukh, Reham Mohamed, Aniket Nare, Antonio Bianchi, Z. Berkay Celik |
| 2023 | Log: It's Big, It's Heavy, It's Filled with Personal Data! Measuring the Logging of Sensitive Information in the Android Ecosystem. Allan Lyons, Julien Gamba, Austin Shawaga, Joel Reardon, Juan Tapiador, Serge Egelman, Narseo Vallina-Rodriguez |
| 2023 | Long Live The Honey Badger: Robust Asynchronous DPSS and its Applications. Thomas Yurek, Zhuolun Xiang, Yu Xia, Andrew Miller |
| 2023 | Lost at C: A User Study on the Security Implications of Large Language Model Code Assistants. Gustavo Sandoval, Hammond Pearce, Teo Nys, Ramesh Karri, Siddharth Garg, Brendan Dolan-Gavitt |
| 2023 | Lost in Conversion: Exploit Data Structure Conversion with Attribute Loss to Break Android Systems. Rui Li, Wenrui Diao, Shishuai Yang, Xiangyu Liu, Shanqing Guo, Kehuan Zhang |
| 2023 | MINER: A Hybrid Data-Driven Approach for REST API Fuzzing. Chenyang Lyu, Jiacheng Xu, Shouling Ji, Xuhong Zhang, Qinying Wang, Binbin Zhao, Gaoning Pan, Wei Cao, Peng Cheng, Raheem Beyah |
| 2023 | MTSan: A Feasible and Practical Memory Sanitizer for Fuzzing COTS Binaries. Xingman Chen, Yinghao Shi, Zheyu Jiang, Yuan Li, Ruoyu Wang, Haixin Duan, Haoyu Wang, Chao Zhang |
| 2023 | Machine-checking Multi-Round Proofs of Shuffle: Terelius-Wikstrom and Bayer-Groth. Thomas Haines, Rajeev Goré, Mukesh Tiwari |
| 2023 | McFIL: Model Counting Functionality-Inherent Leakage. Maximilian Zinkus, Yinzhi Cao, Matthew D. Green |
| 2023 | Measuring Up to (Reasonable) Consumer Expectations: Providing an Empirical Basis for Holding IoT Manufacturers Legally Responsible. Lorenz Kustosch, Carlos Gañán, Mattis van 't Schip, Michel van Eeten, Simon Parkin |
| 2023 | Medusa Attack: Exploring Security Hazards of In-App QR Code Scanning. Xing Han, Yuheng Zhang, Xue Zhang, Zeyuan Chen, Mingzhe Wang, Yiwei Zhang, Siqi Ma, Yu Yu, Elisa Bertino, Juanru Li |
| 2023 | Meta-Sift: How to Sift Out a Clean Subset in the Presence of Data Poisoning? Yi Zeng, Minzhou Pan, Himanshu Jahagirdar, Ming Jin, Lingjuan Lyu, Ruoxi Jia |
| 2023 | Minimalist: Semi-automated Debloating of PHP Web Applications through Static Analysis. Rasoul Jahanshahi, Babak Amin Azad, Nick Nikiforakis, Manuel Egele |
| 2023 | Mitigating Security Risks in Linux with KLAUS: A Method for Evaluating Patch Correctness. Yuhang Wu, Zhenpeng Lin, Yueqi Chen, Dang K. Le, Dongliang Mu, Xinyu Xing |
| 2023 | Mixed Signals: Analyzing Ground-Truth Data on the Users and Economics of a Bitcoin Mixing Service. Fieke Miedema, Kelvin Lubbertsen, Verena Schrama, Rolf van Wegberg |
| 2023 | MobileAtlas: Geographically Decoupled Measurements in Cellular Networks for Security and Privacy Research. Gabriel K. Gegenhuber, Wilfried Mayer, Edgar R. Weippl, Adrian Dabrowski |
| 2023 | MorFuzz: Fuzzing Processor via Runtime Instruction Morphing enhanced Synchronizable Co-simulation. Jinyan Xu, Yiyuan Liu, Sirui He, Haoran Lin, Yajin Zhou, Cong Wang |
| 2023 | Multi-Factor Key Derivation Function (MFKDF) for Fast, Flexible, Secure, & Practical Key Management. Vivek Nair, Dawn Song |
| 2023 | Multiview: Finding Blind Spots in Access-Deny Issues Diagnosis. Bingyu Shen, Tianyi Shan, Yuanyuan Zhou |
| 2023 | NAUTILUS: Automated RESTful API Vulnerability Detection. Gelei Deng, Zhiyi Zhang, Yuekang Li, Yi Liu, Tianwei Zhang, Yang Liu, Guo Yu, Dongjin Wang |
| 2023 | NRDelegationAttack: Complexity DDoS attack on DNS Recursive Resolvers. Yehuda Afek, Anat Bremler-Barr, Shani Stajnrod |
| 2023 | NVLeak: Off-Chip Side-Channel Attacks via Non-Volatile Memory Systems. Zixuan Wang, Mohammadkazem Taram, Daniel Moghimi, Steven Swanson, Dean M. Tullsen, Jishen Zhao |
| 2023 | Near-Optimal Oblivious Key-Value Stores for Efficient PSI, PSU and Volume-Hiding Multi-Maps. Alexander Bienstock, Sarvar Patel, Joon Young Seo, Kevin Yeo |
| 2023 | Near-Ultrasound Inaudible Trojan (Nuit): Exploiting Your Speaker to Attack Your Microphone. Qi Xia, Qian Chen, Shouhuai Xu |
| 2023 | Network Detection of Interactive SSH Impostors Using Deep Learning. Julien Piet, Aashish Sharma, Vern Paxson, David A. Wagner |
| 2023 | Network Responses to Russia's Invasion of Ukraine in 2022: A Cautionary Tale for Internet Freedom. Reethika Ramesh, Ram Sundara Raman, Apurva Virkud, Alexandra Dirksen, Armin Huremagic, David Fifield, Dirk Rodenburg, Rod Hynes, Douglas Madory, Roya Ensafi |
| 2023 | NeuroPots: Realtime Proactive Defense against Bit-Flip Attacks in Neural Networks. Qi Liu, Jieming Yin, Wujie Wen, Chengmo Yang, Shi Sha |
| 2023 | No Linux, No Problem: Fast and Correct Windows Binary Fuzzing via Target-embedded Snapshotting. Leo Stone, Rishi Ranjan, Stefan Nagy, Matthew Hicks |
| 2023 | No Single Silver Bullet: Measuring the Accuracy of Password Strength Meters. Ding Wang, Xuan Shan, Qiying Dong, Yaosheng Shen, Chunfu Jia |
| 2023 | No more Reviewer #2: Subverting Automatic Paper-Reviewer Assignment using Adversarial Learning. Thorsten Eisenhofer, Erwin Quiring, Jonas Möller, Doreen Riepel, Thorsten Holz, Konrad Rieck |
| 2023 | Not All Data are Created Equal: Data and Pointer Prioritization for Scalable Protection Against Data-Oriented Attacks. Salman Ahmed, Hans Liljestrand, Hani Jamjoom, Matthew Hicks, N. Asokan, Danfeng Yao |
| 2023 | Notice the Imposter! A Study on User Tag Spoofing Attack in Mobile Apps. Shuai Li, Zhemin Yang, Guangliang Yang, Hange Zhang, Nan Hua, Yurui Huang, Min Yang |
| 2023 | On the Feasibility of Malware Unpacking via Hardware-assisted Loop Profiling. Binlin Cheng, Erika A. Leal, Haotian Zhang, Jiang Ming |
| 2023 | On the Security Risks of Knowledge Graph Reasoning. Zhaohan Xi, Tianyu Du, Changjiang Li, Ren Pang, Shouling Ji, Xiapu Luo, Xusheng Xiao, Fenglong Ma, Ting Wang |
| 2023 | One Server for the Price of Two: Simple and Fast Single-Server Private Information Retrieval. Alexandra Henzinger, Matthew M. Hong, Henry Corrigan-Gibbs, Sarah Meiklejohn, Vinod Vaikuntanathan |
| 2023 | One Size Does Not Fit All: Uncovering and Exploiting Cross Platform Discrepant APIs in WeChat. Chao Wang, Yue Zhang, Zhiqiang Lin |
| 2023 | One Size Does not Fit All: Quantifying the Risk of Malicious App Encounters for Different Android User Profiles. Savino Dambra, Leyla Bilge, Platon Kotzias, Yun Shen, Juan Caballero |
| 2023 | Oops..! I Glitched It Again! How to Multi-Glitch the Glitching-Protections on ARM TrustZone-M. Xhani Marvin Saß, Richard Mitev, Ahmad-Reza Sadeghi |
| 2023 | Othered, Silenced and Scapegoated: Understanding the Situated Security of Marginalised Populations in Lebanon. Jessica McClearn, Rikke Bjerg Jensen, Reem Talhouk |
| 2023 | PATROL: Provable Defense against Adversarial Policy in Two-player Games. Wenbo Guo, Xian Wu, Lun Wang, Xinyu Xing, Dawn Song |
| 2023 | PCAT: Functionality and Data Stealing from Split Learning by Pseudo-Client Attack. Xinben Gao, Lan Zhang |
| 2023 | PELICAN: Exploiting Backdoors of Naturally Trained Deep Learning Models In Binary Code Analysis. Zhuo Zhang, Guanhong Tao, Guangyu Shen, Shengwei An, Qiuling Xu, Yingqi Liu, Yapeng Ye, Yaoxuan Wu, Xiangyu Zhang |
| 2023 | PET: Prevent Discovered Errors from Being Triggered in the Linux Kernel. Zicheng Wang, Yueqi Chen, Qingkai Zeng |
| 2023 | POLICYCOMP: Counterpart Comparison of Privacy Policies Uncovers Overbroad Personal Data Collection Practices. Lu Zhou, Chengyongxiao Wei, Tong Zhu, Guoxing Chen, Xiaokuan Zhang, Suguo Du, Hui Cao, Haojin Zhu |
| 2023 | PORE: Provably Robust Recommender Systems against Data Poisoning Attacks. Jinyuan Jia, Yupei Liu, Yuepeng Hu, Neil Zhenqiang Gong |
| 2023 | PROGRAPHER: An Anomaly Detection System based on Provenance Graph Embedding. Fan Yang, Jiacen Xu, Chunlin Xiong, Zhou Li, Kehuan Zhang |
| 2023 | PROVIDENCE: a Flexible Round-by-Round Risk-Limiting Audit. Oliver Broadrick, Poorvi L. Vora, Filip Zagórski |
| 2023 | PTW: Pivotal Tuning Watermarking for Pre-Trained Image Generators. Nils Lukas, Florian Kerschbaum |
| 2023 | PUMM: Preventing Use-After-Free Using Execution Unit Partitioning. Carter Yagemann, Simon P. Chung, Brendan Saltaformaggio, Wenke Lee |
| 2023 | Panda: Security Analysis of Algorand Smart Contracts. Zhiyuan Sun, Xiapu Luo, Yinqian Zhang |
| 2023 | Pass2Edit: A Multi-Step Generative Model for Guessing Edited Passwords. Ding Wang, Yunkai Zou, Yuan-an Xiao, Siqi Ma, Xiaofeng Chen |
| 2023 | Password Guessing Using Random Forest. Ding Wang, Yunkai Zou, Zijian Zhang, Kedong Xiu |
| 2023 | PatchVerif: Discovering Faulty Patches in Robotic Vehicles. Hyungsub Kim, Muslum Ozgur Ozmen, Z. Berkay Celik, Antonio Bianchi, Dongyan Xu |
| 2023 | Person Re-identification in 3D Space: A WiFi Vision-based Approach. Yili Ren, Yichao Wang, Sheng Tan, Yingying Chen, Jie Yang |
| 2023 | PhyAuth: Physical-Layer Message Authentication for ZigBee Networks. Ang Li, Jiawei Li, Dianqi Han, Yan Zhang, Tao Li, Ting Zhu, Yanchao Zhang |
| 2023 | Place Your Locks Well: Understanding and Detecting Lock Misuse Bugs. Yuandao Cai, Peisen Yao, Chengfeng Ye, Charles Zhang |
| 2023 | PoliGraph: Automated Privacy Policy Analysis using Knowledge Graphs. Hao Cui, Rahmadi Trimananda, Athina Markopoulou, Scott Jordan |
| 2023 | PolyFuzz: Holistic Greybox Fuzzing of Multi-Language Systems. Wen Li, Jinyang Ruan, Guangbei Yi, Long Cheng, Xiapu Luo, Haipeng Cai |
| 2023 | Pool-Party: Exploiting Browser Resource Pools for Web Tracking. Peter Snyder, Soroush Karami, Arthur Edelstein, Benjamin Livshits, Hamed Haddadi |
| 2023 | Powering Privacy: On the Energy Demand and Feasibility of Anonymity Networks on Smartphones. Daniel Hugenroth, Alastair R. Beresford |
| 2023 | Powering for Privacy: Improving User Trust in Smart Speaker Microphones with Intentional Powering and Perceptible Assurance. Youngwook Do, Nivedita Arora, Ali Mirzazadeh, Injoo Moon, Eryue Xu, Zhihan Zhang, Gregory D. Abowd, Sauvik Das |
| 2023 | Practical Asynchronous High-threshold Distributed Key Generation and Distributed Polynomial Sampling. Sourav Das, Zhuolun Xiang, Lefteris Kokoris-Kogias, Ling Ren |
| 2023 | Precise and Generalized Robustness Certification for Neural Networks. Yuanyuan Yuan, Shuai Wang, Zhendong Su |
| 2023 | Prime Match: A Privacy-Preserving Inventory Matching System. Antigoni Polychroniadou, Gilad Asharov, Benjamin E. Diamond, Tucker Balch, Hans Buehler, Richard Hua, Suwen Gu, Greg Gimler, Manuela Veloso |
| 2023 | PrivGraph: Differentially Private Graph Data Publication by Exploiting Community Information. Quan Yuan, Zhikun Zhang, Linkang Du, Min Chen, Peng Cheng, Mingyang Sun |
| 2023 | PrivTrace: Differentially Private Trajectory Synthesis by Adaptive Markov Models. Haiming Wang, Zhikun Zhang, Tianhao Wang, Shibo He, Michael Backes, Jiming Chen, Yang Zhang |
| 2023 | Private Proof-of-Stake Blockchains using Differentially-Private Stake Distortion. Chenghong Wang, David Pujol, Kartik Nayak, Ashwin Machanavajjhala |
| 2023 | PrivateFL: Accurate, Differentially Private Federated Learning via Personalized Data Transformation. Yuchen Yang, Bo Hui, Haolin Yuan, Neil Zhenqiang Gong, Yinzhi Cao |
| 2023 | ProSpeCT: Provably Secure Speculation for the Constant-Time Policy. Lesly-Ann Daniel, Marton Bognar, Job Noorman, Sébastien Bardin, Tamara Rezk, Frank Piessens |
| 2023 | Problematic Advertising and its Disparate Exposure on Facebook. Muhammad Ali, Angelica Goetzen, Alan Mislove, Elissa M. Redmiles, Piotr Sapiezynski |
| 2023 | Proxy Hunting: Understanding and Characterizing Proxy-based Upgradeable Smart Contracts in Blockchains. William Edward Bodell III, Sajad Meisami, Yue Duan |
| 2023 | Pspray: Timing Side-Channel based Linux Kernel Heap Exploitation Technique. Yoochan Lee, Jinhan Kwak, Junesoo Kang, Yuseok Jeon, Byoungyoung Lee |
| 2023 | Pushed by Accident: A Mixed-Methods Study on Strategies of Handling Secret Information in Source Code Repositories. Alexander Krause, Jan H. Klemmer, Nicolas Huaman, Dominik Wermke, Yasemin Acar, Sascha Fahl |
| 2023 | QFA2SR: Query-Free Adversarial Transfer Attacks to Speaker Recognition Systems. Guangke Chen, Yedi Zhang, Zhe Zhao, Fu Song |
| 2023 | RIDAS: Real-time identification of attack sources on controller area networks. Jiwoo Shin, Hyunghoon Kim, Seyoung Lee, Wonsuk Choi, Dong Hoon Lee, Hyo Jin Jo |
| 2023 | ReUSB: Replay-Guided USB Driver Fuzzing. Jisoo Jang, Minsuk Kang, Dokyung Song |
| 2023 | Reassembly is Hard: A Reflection on Challenges and Strategies. Hyungseok Kim, Soomin Kim, Junoh Lee, Kangkook Jee, Sang Kil Cha |
| 2023 | Remote Attacks on Speech Recognition Systems Using Sound from Power Supply. Lanqing Yang, Xinqi Chen, Xiangyong Jian, Leping Yang, Yijie Li, Qianfei Ren, Yi-Chao Chen, Guangtao Xue, Xiaoyu Ji |
| 2023 | Remote Code Execution from SSTI in the Sandbox: Automatically Detecting and Exploiting Template Escape Bugs. Yudi Zhao, Yuan Zhang, Min Yang |
| 2023 | Remote Direct Memory Introspection. Hongyi Liu, Jiarong Xing, Yibo Huang, Danyang Zhuo, Srinivas Devadas, Ang Chen |
| 2023 | Rethinking System Audit Architectures for High Event Coverage and Synchronous Log Availability. Varun Gandhi, Sarbartha Banerjee, Aniket Agrawal, Adil Ahmad, Sangho Lee, Marcus Peinado |
| 2023 | Rethinking White-Box Watermarks on Deep Learning Models under Neural Structural Obfuscation. Yifan Yan, Xudong Pan, Mi Zhang, Min Yang |
| 2023 | Reusable Enclaves for Confidential Serverless Computing. Shixuan Zhao, Pinshen Xu, Guoxing Chen, Mengya Zhang, Yinqian Zhang, Zhiqiang Lin |
| 2023 | Reversing, Breaking, and Fixing the French Legislative Election E-Voting Protocol. Alexandre Debant, Lucca Hirschi |
| 2023 | Rods with Laser Beams: Understanding Browser Fingerprinting on Phishing Pages. Iskander Sánchez-Rola, Leyla Bilge, Davide Balzarotti, Armin Buescher, Petros Efstathopoulos |
| 2023 | Rosetta: Enabling Robust TLS Encrypted Traffic Classification in Diverse Network Environments with TCP-Aware Traffic Augmentation. Renjie Xie, Jiahao Cao, Enhuan Dong, Mingwei Xu, Kun Sun, Qi Li, Licheng Shen, Menghao Zhang |
| 2023 | RøB: Ransomware over Modern Web Browsers. Harun Oz, Ahmet Aris, Abbas Acar, Güliz Seray Tuncay, Leonardo Babun, A. Selcuk Uluagac |
| 2023 | SAFER: Efficient and Error-Tolerant Binary Instrumentation. Soumyakant Priyadarshan, Huan Nguyen, Rohit Chouhan, R. Sekar |
| 2023 | SCARF - A Low-Latency Block Cipher for Secure Cache-Randomization. Federico Canale, Tim Güneysu, Gregor Leander, Jan Philipp Thoma, Yosuke Todo, Rei Ueno |
| 2023 | SHELTER: Extending Arm CCA with Isolation in User Space. Yiming Zhang, Yuxin Hu, Zhenyu Ning, Fengwei Zhang, Xiapu Luo, Haoyang Huang, Shoumeng Yan, Zhengyu He |
| 2023 | SMACK: Semantically Meaningful Adversarial Audio Attack. Zhiyuan Yu, Yuanhaur Chang, Ning Zhang, Chaowei Xiao |
| 2023 | SQIRL: Grey-Box Detection of SQL Injection Vulnerabilities Using Reinforcement Learning. Salim Al Wahaibi, Myles Foley, Sergio Maffeis |
| 2023 | SandDriller: A Fully-Automated Approach for Testing Language-Based JavaScript Sandboxes. Abdullah AlHamdan, Cristian-Alexandru Staicu |
| 2023 | Secure Floating-Point Training. Deevashwer Rathee, Anwesh Bhattacharya, Divya Gupta, Rahul Sharma, Dawn Song |
| 2023 | Security Analysis of MongoDB Queryable Encryption. Zichen Gui, Kenneth G. Paterson, Tianxin Tang |
| 2023 | Security and Privacy Failures in Popular 2FA Apps. Conor Gilsenan, Fuzail Shakir, Noura Alomar, Serge Egelman |
| 2023 | Sherlock on Specs: Building LTE Conformance Tests through Automated Reasoning. Yi Chen, Di Tang, Yepeng Yao, Mingming Zha, Xiaofeng Wang, Xiaozhong Liu, Haixu Tang, Baoxu Liu |
| 2023 | Side-Channel Attacks on Optane Persistent Memory. Sihang Liu, Suraaj Kanniwadi, Martin Schwarzl, Andreas Kogler, Daniel Gruss, Samira Manabi Khan |
| 2023 | Silent Bugs Matter: A Study of Compiler-Introduced Security Bugs. Jianhao Xu, Kangjie Lu, Zhengjie Du, Zhu Ding, Linke Li, Qiushi Wu, Mathias Payer, Bing Mao |
| 2023 | Silent Spring: Prototype Pollution Leads to Remote Code Execution in Node.js. Mikhail Shcherbakov, Musard Balliu, Cristian-Alexandru Staicu |
| 2023 | Smart Learning to Find Dumb Contracts. Tamer Abdelaziz, Aquinas Hobor |
| 2023 | Snapping Snap Sync: Practical Attacks on Go Ethereum Synchronising Nodes. Massimiliano Taverna, Kenneth G. Paterson |
| 2023 | Sneaky Spy Devices and Defective Detectors: The Ecosystem of Intimate Partner Surveillance with Covert Devices. Rose Ceccio, Sophie Stephenson, Varun Chadha, Danny Yuxing Huang, Rahul Chatterjee |
| 2023 | Sparsity Brings Vulnerabilities: Exploring New Metrics in Backdoor Attacks. Jianwen Tian, Kefan Qiu, Debin Gao, Zhi Wang, Xiaohui Kuang, Gang Zhao |
| 2023 | SpectrEM: Exploiting Electromagnetic Emanations During Transient Execution. Jesse De Meulemeester, Antoon Purnal, Lennert Wouters, Arthur Beckers, Ingrid Verbauwhede |
| 2023 | Speculation at Fault: Modeling and Testing Microarchitectural Leakage of CPU Exceptions. Jana Hofmann, Emanuele Vannacci, Cédric Fournet, Boris Köpf, Oleksii Oleksenko |
| 2023 | Spying through Your Voice Assistants: Realistic Voice Command Fingerprinting. Dilawer Ahmed, Aafaq Sabir, Anupam Das |
| 2023 | Squint Hard Enough: Attacking Perceptual Hashing with Adversarial Machine Learning. Jonathan Prokos, Neil Fendley, Matthew Green, Roei Schuster, Eran Tromer, Tushar M. Jois, Yinzhi Cao |
| 2023 | Squirrel: A Scalable Secure Two-Party Computation Framework for Training Gradient Boosting Decision Tree. Wen-jie Lu, Zhicong Huang, Qizhi Zhang, Yuchen Wang, Cheng Hong |
| 2023 | Strategies and Vulnerabilities of Participants in Venezuelan Influence Operations. Ruben Recabarren, Bogdan Carbunar, Nestor Hernandez, Ashfaq Ali Shafin |
| 2023 | Subverting Website Fingerprinting Defenses with Robust Traffic Representation. Meng Shen, Kexin Ji, Zhenbo Gao, Qi Li, Liehuang Zhu, Ke Xu |
| 2023 | Synchronization Storage Channels (S2C): Timer-less Cache Side-Channel Attacks on the Apple M1 via Hardware Synchronization Instructions. Jiyong Yu, Aishani Dutta, Trent Jaeger, David Kohlbrenner, Christopher W. Fletcher |
| 2023 | Systematic Assessment of Fuzzers using Mutation Analysis. Philipp Görz, Björn Mathis, Keno Hassler, Emre Güler, Thorsten Holz, Andreas Zeller, Rahul Gopinath |
| 2023 | TAP: Transparent and Privacy-Preserving Data Services. Daniël Reijsbergen, Aung Maw, Zheng Yang, Tien Tuan Anh Dinh, Jianying Zhou |
| 2023 | TPatch: A Triggered Physical Adversarial Patch. Wenjun Zhu, Xiaoyu Ji, Yushi Cheng, Shibo Zhang, Wenyuan Xu |
| 2023 | TRIDENT: Towards Detecting and Mitigating Web-based Social Engineering Attacks. Zheng Yang, Joey Allen, Matthew Landen, Roberto Perdisci, Wenke Lee |
| 2023 | TRust: A Compilation Framework for In-process Isolation to Protect Safe Rust against Untrusted Code. Inyoung Bang, Martin Kayondo, Hyungon Moon, Yunheung Paek |
| 2023 | TVA: A multi-party computation system for secure and expressive time series analytics. Muhammad Faisal, Jerry Zhang, John Liagouris, Vasiliki Kalavri, Mayank Varia |
| 2023 | Temporal CDN-Convex Lens: A CDN-Assisted Practical Pulsing DDoS Attack. Run Guo, Jianjun Chen, Yihang Wang, Keran Mu, Baojun Liu, Xiang Li, Chao Zhang, Haixin Duan, Jianping Wu |
| 2023 | That Person Moves Like A Car: Misclassification Attack Detection for Autonomous Systems Using Spatiotemporal Consistency. Yanmao Man, Raymond Muller, Ming Li, Z. Berkay Celik, Ryan M. Gerdes |
| 2023 | The Blockchain Imitation Game. Kaihua Qin, Stefanos Chaliasos, Liyi Zhou, Benjamin Livshits, Dawn Song, Arthur Gervais |
| 2023 | The Case for Learned Provenance Graph Storage Systems. Hailun Ding, Juan Zhai, Dong Deng, Shiqing Ma |
| 2023 | The Digital-Safety Risks of Financial Technologies for Survivors of Intimate Partner Violence. Rosanna Bellini, Kevin Lee, Megan A. Brown, Jeremy Shaffer, Rasika Bhalerao, Thomas Ristenpart |
| 2023 | The Gates of Time: Improving Cache Attacks with Transient Execution. Daniel Katzman, William Kosasih, Chitchanok Chuengsatiansup, Eyal Ronen, Yuval Yarom |
| 2023 | The Impostor Among US(B): Off-Path Injection Attacks on USB Communications. Robert Dumitru, Daniel Genkin, Andrew Wabnitz, Yuval Yarom |
| 2023 | The Maginot Line: Attacking the Boundary of DNS Caching Protection. Xiang Li, Chaoyi Lu, Baojun Liu, Qifan Zhang, Zhou Li, Haixin Duan, Qi Li |
| 2023 | The Most Dangerous Codec in the World: Finding and Exploiting Vulnerabilities in H.264 Decoders. Willy R. Vasquez, Stephen Checkoway, Hovav Shacham |
| 2023 | The OK Is Not Enough: A Large Scale Study of Consent Dialogs in Smartphone Applications. Simon Koch, Benjamin Altpeter, Martin Johns |
| 2023 | The Role of Professional Product Reviewers in Evaluating Security and Privacy. Wentao Guo, Jason Walter, Michelle L. Mazurek |
| 2023 | The Space of Adversarial Strategies. Ryan Sheatsley, Blaine Hoak, Eric Pauley, Patrick D. McDaniel |
| 2023 | The Writing on the Wall and 3D Digital Twins: Personal Information in (not so) Private Real Estate. Rachel McAmis, Tadayoshi Kohno |
| 2023 | Three Lessons From Threema: Analysis of a Secure Messenger. Kenneth G. Paterson, Matteo Scarlata, Kien Tuong Truong |
| 2023 | Tight Auditing of Differentially Private Machine Learning. Milad Nasr, Jamie Hayes, Thomas Steinke, Borja Balle, Florian Tramèr, Matthew Jagielski, Nicholas Carlini, Andreas Terzis |
| 2023 | Time for Change: How Clocks Break UWB Secure Ranging. Claudio Anliker, Giovanni Camurati, Srdjan Capkun |
| 2023 | Timeless Timing Attacks and Preload Defenses in Tor's DNS Cache. Rasmus Dahlberg, Tobias Pulls |
| 2023 | To Cloud or not to Cloud: A Qualitative Study on Self-Hosters' Motivation, Operation, and Security Mindset. Lea Gröber, Rafael Mrowczynski, Nimisha Vijay, Daphne A. Muller, Adrian Dabrowski, Katharina Krombholz |
| 2023 | Token Spammers, Rug Pulls, and Sniper Bots: An Analysis of the Ecosystem of Tokens in Ethereum and in the Binance Smart Chain (BNB). Federico Cernera, Massimo La Morgia, Alessandro Mei, Francesco Sassi |
| 2023 | Towards A Proactive ML Approach for Detecting Backdoor Poison Samples. Xiangyu Qi, Tinghao Xie, Jiachen T. Wang, Tong Wu, Saeed Mahloujifar, Prateek Mittal |
| 2023 | Towards Targeted Obfuscation of Adversarial Unsafe Images using Reconstruction and Counterfactual Super Region Attribution Explainability. Mazal Bethany, Andrew Seong, Samuel Henrique Silva, Nicole Beebe, Nishant Vishwamitra, Peyman Najafirad |
| 2023 | Towards a General Video-based Keystroke Inference Attack. Zhuolin Yang, Yuxin Chen, Zain Sarwar, Hadleigh Schwartz, Ben Y. Zhao, Haitao Zheng |
| 2023 | TreeSync: Authenticated Group Management for Messaging Layer Security. Théophile Wallez, Jonathan Protzenko, Benjamin Beurdouche, Karthikeyan Bhargavan |
| 2023 | Trojan Source: Invisible Vulnerabilities. Nicholas Boucher, Ross Anderson |
| 2023 | Tubes Among Us: Analog Attack on Automatic Speaker Identification. Shimaa Ahmed, Yash Wani, Ali Shahin Shamsabadi, Mohammad Yaghini, Ilia Shumailov, Nicolas Papernot, Kassem Fawaz |
| 2023 | Two Sides of the Shield: Understanding Protective DNS adoption factors. Elsa Turcios Rodriguez, Radu Anghel, Simon Parkin, Michel van Eeten, Carlos Gañán |
| 2023 | Two-in-One: A Model Hijacking Attack Against Text Generation Models. Wai Man Si, Michael Backes, Yang Zhang, Ahmed Salem |
| 2023 | UCBlocker: Unwanted Call Blocking Using Anonymous Authentication. Changlai Du, Hexuan Yu, Yang Xiao, Y. Thomas Hou, Angelos D. Keromytis, Wenjing Lou |
| 2023 | URET: Universal Robustness Evaluation Toolkit (for Evasion). Kevin Eykholt, Taesung Lee, Douglas Lee Schales, Jiyong Jang, Ian M. Molloy, Masha Zorin |
| 2023 | UVSCAN: Detecting Third-Party Component Usage Violations in IoT Firmware. Binbin Zhao, Shouling Ji, Xuhong Zhang, Yuan Tian, Qinying Wang, Yuwen Pu, Chenyang Lyu, Raheem Beyah |
| 2023 | Ultimate SLH: Taking Speculative Load Hardening to the Next Level. Zhiyuan Zhang, Gilles Barthe, Chitchanok Chuengsatiansup, Peter Schwabe, Yuval Yarom |
| 2023 | UnGANable: Defending Against GAN-based Face Manipulation. Zheng Li, Ning Yu, Ahmed Salem, Michael Backes, Mario Fritz, Yang Zhang |
| 2023 | Uncontained: Uncovering Container Confusion in the Linux Kernel. Jakob Koschel, Pietro Borrello, Daniele Cono D'Elia, Herbert Bos, Cristiano Giuffrida |
| 2023 | Understand Users' Privacy Perception and Decision of V2X Communication in Connected Autonomous Vehicles. Zekun Cai, Aiping Xiong |
| 2023 | Union under Duress: Understanding Hazards of Duplicate Resource Mismediation in Android Software Supply Chain. Xueqiang Wang, Yifan Zhang, Xiaofeng Wang, Yan Jia, Luyi Xing |
| 2023 | Unique Identification of 50, 000+ Virtual Reality Users from Head & Hand Motion Data. Vivek Nair, Wenbo Guo, Justus Mattern, Rui Wang, James F. O'Brien, Louis B. Rosenberg, Dawn Song |
| 2023 | User Awareness and Behaviors Concerning Encrypted DNS Settings in Web Browsers. Alexandra Nisenoff, Ranya Sharma, Nick Feamster |
| 2023 | V-Cloak: Intelligibility-, Naturalness- & Timbre-Preserving Real-Time Voice Anonymization. Jiangyi Deng, Fei Teng, Yanjiao Chen, Xiaofu Chen, Zhaohui Wang, Wenyuan Xu |
| 2023 | V1SCAN: Discovering 1-day Vulnerabilities in Reused C/C++ Open-source Software Components Using Code Classification Techniques. Seunghoon Woo, Eunjin Choi, Heejo Lee, Hakjoo Oh |
| 2023 | VILLAIN: Backdoor Attacks Against Vertical Split Learning. Yijie Bai, Yanjiao Chen, Hanlei Zhang, Wenyuan Xu, Haiqin Weng, Dou Goodman |
| 2023 | VIPER: Spotting Syscall-Guard Variables for Data-Only Attacks. Hengkai Ye, Song Liu, Zhechang Zhang, Hong Hu |
| 2023 | VeriZexe: Decentralized Private Computation with Universal Setup. Alex Luoyuan Xiong, Binyi Chen, Zhenfei Zhang, Benedikt Bünz, Ben Fisch, Fernando Krell, Philippe Camacho |
| 2023 | VulChecker: Graph-based Vulnerability Localization in Source Code. Yisroel Mirsky, George Macon, Michael D. Brown, Carter Yagemann, Matthew Pruett, Evan Downing, J. Sukarno Mertoguno, Wenke Lee |
| 2023 | WHIP: Improving Static Vulnerability Detection in Web Application by Forcing tools to Collaborate. Feras Al Kassar, Luca Compagna, Davide Balzarotti |
| 2023 | Watch your Watch: Inferring Personality Traits from Wearable Activity Trackers. Noé Zufferey, Mathias Humbert, Romain Tavenard, Kévin Huguenin |
| 2023 | WaterBear: Practical Asynchronous BFT Matching Security Guarantees of Partially Synchronous BFT. Haibin Zhang, Sisi Duan, Boxin Zhao, Liehuang Zhu |
| 2023 | We Really Need to Talk About Session Tickets: A Large-Scale Analysis of Cryptographic Dangers with TLS Session Tickets. Sven Hebrok, Simon Nachtigall, Marcel Maehren, Nurullah Erinola, Robert Merget, Juraj Somorovsky, Jörg Schwenk |
| 2023 | What Are the Chances? Explaining the Epsilon Parameter in Differential Privacy. Priyanka Nanayakkara, Mary Anne Smart, Rachel Cummings, Gabriel Kaptchuk, Elissa M. Redmiles |
| 2023 | Wink: Deniable Secure Messaging. Anrin Chakraborti, Darius Suciu, Radu Sion |
| 2023 | Work-From-Home and COVID-19: Trajectories of Endpoint Security Management in a Security Operations Center. Kailani R. Jones, Dalton A. Brucker-Hahn, Bradley Fidler, Alexandru G. Bardas |
| 2023 | X-Adv: Physical Adversarial Object Attacks against X-ray Prohibited Item Detection. Aishan Liu, Jun Guo, Jiakai Wang, Siyuan Liang, Renshuai Tao, Wenbo Zhou, Cong Liu, Xianglong Liu, Dacheng Tao |
| 2023 | XCheck: Verifying Integrity of 3D Printed Patient-Specific Devices via Computing Tomography. Zhiyuan Yu, Yuanhaur Chang, Shixuan Zhai, Nicholas Deily, Tao Ju, Xiaofeng Wang, Uday Jammalamadaka, Ning Zhang |
| 2023 | You Can't See Me: Physical Removal Attacks on LiDAR-based Autonomous Vehicles Driving Frameworks. Yulong Cao, S. Hrushikesh Bhupathiraju, Pirouz Naghavi, Takeshi Sugawara, Z. Morley Mao, Sara Rampazzi |
| 2023 | You've Got Report: Measurement and Security Implications of DMARC Reporting. Md. Ishtiaq Ashiq, Weitong Li, Tobias Fiebig, Taejoong Chung |
| 2023 | Your Exploit is Mine: Instantly Synthesizing Counterattack Smart Contract. Zhuo Zhang, Zhiqiang Lin, Marcelo Morales, Xiangyu Zhang, Kaiyuan Zhang |
| 2023 | ZBCAN: A Zero-Byte CAN Defense System. Khaled Serag, Rohit Bhatia, Akram Faqih, Muslum Ozgur Ozmen, Vireshwar Kumar, Z. Berkay Celik, Dongyan Xu |
| 2023 | autofz: Automated Fuzzer Composition at Runtime. Yu-Fu Fu, Jae-Hyuk Lee, Taesoo Kim |
| 2023 | xNIDS: Explaining Deep Learning-based Network Intrusion Detection Systems for Active Intrusion Responses. Feng Wei, Hongda Li, Ziming Zhao, Hongxin Hu |
| 2023 | zkSaaS: Zero-Knowledge SNARKs as a Service. Sanjam Garg, Aarushi Goel, Abhishek Jain, Guru-Vamsi Policharla, Sruthi Sekar |
| 2023 | µFUZZ: Redesign of Parallel Fuzzing using Microservice Architecture. Yongheng Chen, Rui Zhong, Yupeng Yang, Hong Hu, Dinghao Wu, Wenke Lee |