USENIX Security '23
422 videos • 4,605 views • by USENIX
1
USENIX Security '23 - PhyAuth: Physical-Layer Message Authentication for ZigBee Networks
USENIX
Download
2
USENIX Security '23 - Time for Change: How Clocks Break UWB Secure Ranging
USENIX
Download
3
USENIX Security '23 - Formal Analysis and Patching of BLE-SC Pairing
USENIX
Download
4
USENIX Security '23 - Framing Frames: Bypassing Wi-Fi Encryption by Manipulating Transmit Queues
USENIX
Download
5
USENIX Security '23 - Abuse Vectors: A Framework for Conceptualizing IoT-Enabled Interpersonal Abuse
USENIX
Download
6
USENIX Security '23 - The Digital-Safety Risks of Financial Technologies for Survivors of...
USENIX
Download
7
USENIX Security '23 - "It's the Equivalent of Feeling Like You're in Jail”: Lessons from Firsthand..
USENIX
Download
8
USENIX Security '23 - Sneaky Spy Devices and Defective Detectors: The Ecosystem of Intimate...
USENIX
Download
9
USENIX Security '23 - Towards a General Video-based Keystroke Inference Attack
USENIX
Download
10
USENIX Security '23 - Going through the motions: AR/VR keylogging from user head motions
USENIX
Download
11
USENIX Security '23 - Auditory Eyesight: Demystifying μs-Precision Keystroke Tracking Attacks on...
USENIX
Download
12
USENIX Security '23 - Watch your Watch: Inferring Personality Traits from Wearable Activity Trackers
USENIX
Download
13
USENIX Security '23 - Squint Hard Enough: Attacking Perceptual Hashing with Adversarial Machine...
USENIX
Download
14
USENIX Security '23 - How to Cover up Anomalous Accesses to Electronic Health Records
USENIX
Download
15
USENIX Security '23 - KENKU: Towards Efficient and Stealthy Black-box Adversarial Attacks against...
USENIX
Download
16
USENIX Security '23 - Tubes Among Us: Analog Attack on Automatic Speaker Identification
USENIX
Download
17
USENIX Security '23 - Efficient Unbalanced Private Set Intersection Cardinality and User-friendly...
USENIX
Download
18
USENIX Security '23 - Near-Optimal Oblivious Key-Value Stores for Efficient PSI, PSU and Volume...
USENIX
Download
19
USENIX Security '23 - Distance-Aware Private Set Intersection
USENIX
Download
20
USENIX Security '23 - Linear Private Set Union from Multi-Query Reverse Private Membership Test
USENIX
Download
21
USENIX Security '23 - Auditing Frameworks Need Resource Isolation: A Systematic Study on the...
USENIX
Download
22
USENIX Security '23 - AIRTAG: Towards Automated Attack Investigation by Unsupervised Learning...
USENIX
Download
23
USENIX Security '23 - Rethinking System Audit Architectures for High Event Coverage and...
USENIX
Download
24
USENIX Security '23 - Improving Logging to Reduce Permission Over-Granting Mistakes
USENIX
Download
25
USENIX Security '23 - Diving into Robocall Content with SnorCall
USENIX
Download
26
USENIX Security '23 - UCBlocker: Unwanted Call Blocking Using Anonymous Authentication
USENIX
Download
27
USENIX Security '23 - Combating Robocalls with Phone Virtual Assistant Mediated Interaction
USENIX
Download
28
USENIX Security '23 - BotScreen: Trust Everybody, but Cut the Aimbots Yourself
USENIX
Download
29
USENIX Security '23 - "If I could do this, I feel anyone could:" The Design and Evaluation...
USENIX
Download
30
USENIX Security '23 - Exploring Privacy and Incentives Considerations in Adoption of COVID-19...
USENIX
Download
31
USENIX Security '23 - Exploring Tenants' Preferences of Privacy Negotiation in Airbnb
USENIX
Download
32
USENIX Security '23 - Know Your Cybercriminal: Evaluating Attacker Preferences by Measuring...
USENIX
Download
33
USENIX Security '23 - HorusEye: A Realtime IoT Malicious Traffic Detection Framework using...
USENIX
Download
34
USENIX Security '23 - An Input-Agnostic Hierarchical Deep Learning Framework for Traffic...
USENIX
Download
35
USENIX Security '23 - Subverting Website Fingerprinting Defenses with Robust Traffic Representation
USENIX
Download
36
USENIX Security '23 - Rosetta: Enabling Robust TLS Encrypted Traffic Classification in Diverse...
USENIX
Download
37
USENIX Security '23 - Towards Targeted Obfuscation of Adversarial Unsafe Images using...
USENIX
Download
38
USENIX Security '23 - TPatch: A Triggered Physical Adversarial Patch
USENIX
Download
39
USENIX Security '23 - CAPatch: Physical Adversarial Patch against Image Captioning Systems
USENIX
Download
40
USENIX Security '23 - Hard-label Black-box Universal Adversarial Patch Attack
USENIX
Download
41
USENIX Security '23 - Anatomy of a High-Profile Data Breach: Dissecting the Aftermath of a Crypto...
USENIX
Download
42
USENIX Security '23 - Glimpse: On-Demand PoW Light Client with Constant-Size Storage for DeFi
USENIX
Download
43
USENIX Security '23 - Mixed Signals: Analyzing Ground-Truth Data on the Users and Economics...
USENIX
Download
44
USENIX Security '23 - Is Your Wallet Snitching On You? An Analysis on the Privacy Implications...
USENIX
Download
45
USENIX Security '23 - Capstone: A Capability-based Foundation for Trustless Secure Memory Access
USENIX
Download
46
USENIX Security '23 - FloatZone: Accelerating Memory Error Detection using the Floating Point Unit
USENIX
Download
47
USENIX Security '23 - PUMM: Preventing Use-After-Free Using Execution Unit Partitioning
USENIX
Download
48
USENIX Security '23 - MTSan: A Feasible and Practical Memory Sanitizer for Fuzzing COTS Binaries
USENIX
Download
49
USENIX Security '23 - Hidden Reality: Caution, Your Hand Gesture Inputs in the Immersive Virtual...
USENIX
Download
50
USENIX Security '23 - LocIn: Inferring Semantic Location from Spatial Maps in Mixed Reality
USENIX
Download
51
USENIX Security '23 - Unique Identification of 50,000+ Virtual Reality Users from Head & Hand...
USENIX
Download
52
USENIX Security '23 - Exploring User Reactions and Mental Models Towards Perceptual Manipulation...
USENIX
Download
53
USENIX Security '23 - Erebus: Access Control for Augmented Reality Systems
USENIX
Download
54
USENIX Security '23 - No Single Silver Bullet: Measuring the Accuracy of Password Strength Meters
USENIX
Download
55
USENIX Security '23 - Password Guessing Using Random Forest
USENIX
Download
56
USENIX Security '23 - Pass2Edit: A Multi-Step Generative Model for Guessing Edited Passwords
USENIX
Download
57
USENIX Security '23 - Improving Real-world Password Guessing Attacks via Bi-directional Transformers
USENIX
Download
58
USENIX Security '23 - Araña: Discovering and Characterizing Password Guessing Attacks in Practice
USENIX
Download
59
USENIX Security '23 - PoliGraph: Automated Privacy Policy Analysis using Knowledge Graphs
USENIX
Download
60
USENIX Security '23 - Calpric: Inclusive and Fine-grain Labeling of Privacy Policies with...
USENIX
Download
61
USENIX Security '23 - POLICYCOMP: Counterpart Comparison of Privacy Policies Uncovers...
USENIX
Download
62
USENIX Security '23 - Lalaine: Measuring and Characterizing Non-Compliance of Apple Privacy Labels
USENIX
Download
63
USENIX Security '23 - Automated Cookie Notice Analysis and Enforcement
USENIX
Download
64
USENIX Security '23 - Continuous Learning for Android Malware Detection
USENIX
Download
65
USENIX Security '23 - Humans vs. Machines in Malware Classification
USENIX
Download
66
USENIX Security '23 - Adversarial Training for Raw-Binary Malware Classifiers
USENIX
Download
67
USENIX Security '23 - Black-box Adversarial Example Attack towards FCG Based Android Malware...
USENIX
Download
68
USENIX Security '23 - Evading Provenance-Based ML Detectors with Adversarial System Action
USENIX
Download
69
USENIX Security '23 - TreeSync: Authenticated Group Management for Messaging Layer Security
USENIX
Download
70
USENIX Security '23 - Formal Analysis of Session-Handling in Secure Messaging: Lifting Security...
USENIX
Download
71
USENIX Security '23 - Cryptographic Administration for Secure Group Messaging
USENIX
Download
72
USENIX Security '23 - Wink: Deniable Secure Messaging
USENIX
Download
73
USENIX Security '23 - Three Lessons From Threema: Analysis of a Secure Messenger
USENIX
Download
74
USENIX Security '23 - MorFuzz: Fuzzing Processor via Runtime Instruction Morphing enhanced...
USENIX
Download
75
USENIX Security '23 - µFUZZ: Redesign of Parallel Fuzzing using Microservice Architecture
USENIX
Download
76
USENIX Security '23 - FISHFUZZ: Catch Deeper Bugs by Throwing Larger Nets
USENIX
Download
77
USENIX Security '23 - HyPFuzz: Formal-Assisted Processor Fuzzing
USENIX
Download
78
USENIX Security '23 - PolyFuzz: Holistic Greybox Fuzzing of Multi-Language Systems
USENIX
Download
79
USENIX Security '23 - VIPER: Spotting Syscall-Guard Variables for Data-Only Attacks
USENIX
Download
80
USENIX Security '23 - AURC: Detecting Errors in Program Code and Documentation
USENIX
Download
81
USENIX Security '23 - Not All Data are Created Equal: Data and Pointer Prioritization for Scalable..
USENIX
Download
82
USENIX Security '23 - SAFER: Efficient and Error-Tolerant Binary Instrumentation
USENIX
Download
83
USENIX Security '23 - Reassembly is Hard: A Reflection on Challenges and Strategies
USENIX
Download
84
USENIX Security '23 - Measuring Up to (Reasonable) Consumer Expectations: Providing an Empirical...
USENIX
Download
85
USENIX Security '23 - Are Consumers Willing to Pay for Security and Privacy of IoT Devices?
USENIX
Download
86
USENIX Security '23 - Examining Consumer Reviews to Understand Security and Privacy Issues in the...
USENIX
Download
87
USENIX Security '23 - Internet Service Providers' and Individuals' Attitudes, Barriers, and...
USENIX
Download
88
USENIX Security '23 - Detecting and Handling IoT Interaction Threats in Multi-Platform Multi...
USENIX
Download
89
USENIX Security '23 - Private Proof-of-Stake Blockchains using Differentially-Private Stake...
USENIX
Download
90
USENIX Security '23 - PrivateFL: Accurate, Differentially Private Federated Learning via...
USENIX
Download
91
USENIX Security '23 - What Are the Chances? Explaining the Epsilon Parameter in Differential Privacy
USENIX
Download
92
USENIX Security '23 - Tight Auditing of Differentially Private Machine Learning
USENIX
Download
93
USENIX Security '23 - PrivTrace: Differentially Private Trajectory Synthesis by Adaptive Markov...
USENIX
Download
94
USENIX Security '23 - Meta-Sift: How to Sift Out a Clean Subset in the Presence of Data Poisoning?
USENIX
Download
95
USENIX Security '23 - Towards A Proactive ML Approach for Detecting Backdoor Poison Samples
USENIX
Download
96
USENIX Security '23 - PORE: Provably Robust Recommender Systems against Data Poisoning Attacks
USENIX
Download
97
USENIX Security '23 - Every Vote Counts: Ranking-Based Training of Federated Learning to Resist...
USENIX
Download
98
USENIX Security '23 - Fine-grained Poisoning Attack to Local Differential Privacy Protocols for...
USENIX
Download
99
USENIX Security '23 - Your Exploit is Mine: Instantly Synthesizing Counterattack Smart Contract
USENIX
Download
100
USENIX Security '23 - Smart Learning to Find Dumb Contracts
USENIX
Download
101
USENIX Security '23 - Confusum Contractum: Confused Deputy Vulnerabilities in Ethereum Smart...
USENIX
Download
102
USENIX Security '23 - Panda: Security Analysis of Algorand Smart Contracts
USENIX
Download
103
USENIX Security '23 - Proxy Hunting: Understanding and Characterizing Proxy-based Upgradeable...
USENIX
Download
104
USENIX Security '23 - Fuzztruction: Using Fault Injection-based Fuzzing to Leverage Implicit...
USENIX
Download
105
USENIX Security '23 - FuzzJIT: Oracle-Enhanced Fuzzing for JavaScript Engine JIT Compiler
USENIX
Download
106
USENIX Security '23 - GLeeFuzz: Fuzzing WebGL Through Error Message Guided Mutation
USENIX
Download
107
USENIX Security '23 - autofz: Automated Fuzzer Composition at Runtime
USENIX
Download
108
USENIX Security '23 - CarpetFuzz: Automatic Program Option Constraint Extraction from...
USENIX
Download
109
USENIX Security '23 - SCARF – A Low-Latency Block Cipher for Secure Cache-Randomization
USENIX
Download
110
USENIX Security '23 - The Gates of Time: Improving Cache Attacks with Transient Execution
USENIX
Download
111
USENIX Security '23 - Synchronization Storage Channels (S2C): Timer-less Cache Side-Channel...
USENIX
Download
112
USENIX Security '23 - ClepsydraCache -- Preventing Cache Attacks with Time-Based Evictions
USENIX
Download
113
USENIX Security '23 - CacheQL: Quantifying and Localizing Cache Side-Channel Vulnerabilities in...
USENIX
Download
114
USENIX Security '23 - InfinityGauntlet: Expose Smartphone Fingerprint Authentication to...
USENIX
Download
115
USENIX Security '23 - A Study of Multi-Factor and Risk-Based Authentication Availability
USENIX
Download
116
USENIX Security '23 - A Large-Scale Measurement of Website Login Policies
USENIX
Download
117
USENIX Security '23 - Security and Privacy Failures in Popular 2FA Apps
USENIX
Download
118
USENIX Security '23 - Multi-Factor Key Derivation Function (MFKDF) for Fast, Flexible, Secure, &...
USENIX
Download
119
USENIX Security '23 - Log: It’s Big, It’s Heavy, It’s Filled with Personal Data! Measuring the...
USENIX
Download
120
USENIX Security '23 - CodexLeaks: Privacy Leaks from Code Generation Language Models in GitHub...
USENIX
Download
121
USENIX Security '23 - Freaky Leaky SMS: Extracting User Locations by Analyzing SMS Timings
USENIX
Download
122
USENIX Security '23 - The Writing on the Wall and 3D Digital Twins: Personal Information in..
USENIX
Download
123
USENIX Security '23 - Glaze: Protecting Artists from Style Mimicry by Text-to-Image Models
USENIX
Download
124
USENIX Security '23 - Lost at C: A User Study on the Security Implications of Large Language Model..
USENIX
Download
125
USENIX Security '23 - Two-in-One: A Model Hijacking Attack Against Text Generation Models
USENIX
Download
126
USENIX Security '23 - PTW: Pivotal Tuning Watermarking for Pre-Trained Image Generators
USENIX
Download
127
USENIX Security '23 - Lessons Lost: Incident Response in the Age of Cyber Insurance and Breach...
USENIX
Download
128
USENIX Security '23 - Bug Hunters’ Perspectives on the Challenges and Benefits of the Bug Bounty...
USENIX
Download
129
USENIX Security '23 - Work-From-Home and COVID-19: Trajectories of Endpoint Security Management...
USENIX
Download
130
USENIX Security '23 - “Employees Who Don’t Accept the Time Security Takes Are Not Aware Enough”:...
USENIX
Download
131
USENIX Security '23 - Aegis: Mitigating Targeted Bit-flip Attacks against Deep Neural Networks
USENIX
Download
132
USENIX Security '23 - Rethinking White-Box Watermarks on Deep Learning Models under Neural...
USENIX
Download
133
USENIX Security '23 - PELICAN: Exploiting Backdoors of Naturally Trained Deep Learning Models In...
USENIX
Download
134
USENIX Security '23 - IvySyn: Automated Vulnerability Discovery in Deep Learning Frameworks
USENIX
Download
135
USENIX Security '23 - Hey Kimya, Is My Smart Speaker Spying on Me? Taking Control of Sensor...
USENIX
Download
136
USENIX Security '23 - Spying through Your Voice Assistants: Realistic Voice Command Fingerprinting
USENIX
Download
137
USENIX Security '23 - QFA2SR: Query-Free Adversarial Transfer Attacks to Speaker Recognition Systems
USENIX
Download
138
USENIX Security '23 - Learning Normality is Enough: A Software-based Mitigation against Inaudible...
USENIX
Download
139
USENIX Security '23 - Powering for Privacy: Improving User Trust in Smart Speaker Microphones with..
USENIX
Download
140
USENIX Security '23 - To Cloud or not to Cloud: A Qualitative Study on Self-Hosters' Motivation...
USENIX
Download
141
USENIX Security '23 - “I wouldn't want my unsafe code to run my pacemaker”: An Interview Study on...
USENIX
Download
142
USENIX Security '23 - Pushed by Accident: A Mixed-Methods Study on Strategies of Handling Secret...
USENIX
Download
143
USENIX Security '23 - A Mixed-Methods Study of Security Practices of Smart Contract Developers
USENIX
Download
144
USENIX Security '23 - The Role of Professional Product Reviewers in Evaluating Security and Privacy
USENIX
Download
145
USENIX Security '23 - Network Responses to Russia's Invasion of Ukraine in 2022: A Cautionary Tale..
USENIX
Download
146
USENIX Security '23 - A Study of China's Censorship and Its Evasion Through the Lens of Online...
USENIX
Download
147
USENIX Security '23 - DeResistor: Toward Detection-Resistant Probing for Evasion of Internet...
USENIX
Download
148
USENIX Security '23 - Timeless Timing Attacks and Preload Defenses in Tor's DNS Cache
USENIX
Download
149
USENIX Security '23 - How the Great Firewall of China Detects and Blocks Fully Encrypted Traffic
USENIX
Download
150
USENIX Security '23 - A Data-free Backdoor Injection Approach in Neural Networks
USENIX
Download
151
USENIX Security '23 - Sparsity Brings Vulnerabilities: Exploring New Metrics in Backdoor Attacks
USENIX
Download
152
USENIX Security '23 - Aliasing Backdoor Attacks on Pre-trained Models
USENIX
Download
153
USENIX Security '23 - ASSET: Robust Backdoor Data Detection Across a Multiplicity of Deep Learning..
USENIX
Download
154
USENIX Security '23 - VILLAIN: Backdoor Attacks Against Vertical Split Learning
USENIX
Download
155
USENIX Security '23 - ARI: Attestation of Real-time Mission Execution Integrity
USENIX
Download
156
USENIX Security '23 - Design of Access Control Mechanisms in Systems-on-Chip with Formal...
USENIX
Download
157
USENIX Security '23 - HashTag: Hash-based Integrity Protection for Tagged Architectures
USENIX
Download
158
USENIX Security '23 - XCheck: Verifying Integrity of 3D Printed Patient-Specific Devices via...
USENIX
Download
159
USENIX Security '23 - Demystifying Pointer Authentication on Apple M1
USENIX
Download
160
USENIX Security '23 - DDRace: Finding Concurrency UAF Vulnerabilities in Linux Drivers with...
USENIX
Download
161
USENIX Security '23 - Automata-Guided Control-Flow-Sensitive Fuzz Driver Generation
USENIX
Download
162
USENIX Security '23 - Hoedur: Embedded Firmware Fuzzing using Multi-Stream Inputs
USENIX
Download
163
USENIX Security '23 - Forming Faster Firmware Fuzzers
USENIX
Download
164
USENIX Security '23 - ReUSB: Replay-Guided USB Driver Fuzzing
USENIX
Download
165
USENIX Security '23 - Exorcising "Wraith": Protecting LiDAR-based Object Detector in Automated...
USENIX
Download
166
USENIX Security '23 - Discovering Adversarial Driving Maneuvers against Autonomous Vehicles
USENIX
Download
167
USENIX Security '23 - Understand Users' Privacy Perception and Decision of V2X Communication in...
USENIX
Download
168
USENIX Security '23 - You Can't See Me: Physical Removal Attacks on LiDAR-based Autonomous...
USENIX
Download
169
USENIX Security '23 - PatchVerif: Discovering Faulty Patches in Robotic Vehicles
USENIX
Download
170
USENIX Security '23 - Fast IDentity Online with Anonymous Credentials (FIDO-AC)
USENIX
Download
171
USENIX Security '23 - How to Bind Anonymous Credentials to Humans
USENIX
Download
172
USENIX Security '23 - Inducing Authentication Failures to Bypass Credit Card PINs
USENIX
Download
173
USENIX Security '23 - An Empirical Study & Evaluation of Modern CAPTCHAs
USENIX
Download
174
USENIX Security '23 - Account Verification on Social Media: User Perceptions and Paid Enrollment
USENIX
Download
175
USENIX Security '23 - User Awareness and Behaviors Concerning Encrypted DNS Settings in Web Browsers
USENIX
Download
176
USENIX Security '23 - Two Sides of the Shield: Understanding Protective DNS adoption factors
USENIX
Download
177
USENIX Security '23 - The Maginot Line: Attacking the Boundary of DNS Caching Protection
USENIX
Download
178
USENIX Security '23 - Fourteen Years in the Life: A Root Server’s Perspective on DNS Resolve...
USENIX
Download
179
USENIX Security '23 - NRDelegationAttack: Complexity DDoS attack on DNS Recursive Resolvers
USENIX
Download
180
USENIX Security '23 - Inductive Graph Unlearning
USENIX
Download
181
USENIX Security '23 - GAP: Differentially Private Graph Neural Networks with Aggregation...
USENIX
Download
182
USENIX Security '23 - PrivGraph: Differentially Private Graph Data Publication by Exploiting...
USENIX
Download
183
USENIX Security '23 - On the Security Risks of Knowledge Graph Reasoning
USENIX
Download
184
USENIX Security '23 - The Case for Learned Provenance Graph Storage Systems
USENIX
Download
185
USENIX Security '23 - A Large Scale Study of the Ethereum Arbitrage Ecosystem
USENIX
Download
186
USENIX Security '23 - ACon^2: Adaptive Conformal Consensus for Provable Blockchain Oracles
USENIX
Download
187
USENIX Security '23 - Snapping Snap Sync: Practical Attacks on Go Ethereum Synchronising Nodes
USENIX
Download
188
USENIX Security '23 - Token Spammers, Rug Pulls, and Sniper Bots: An Analysis of the Ecosystem...
USENIX
Download
189
USENIX Security '23 - Automated Inference on Financial Security of Ethereum Smart Contracts
USENIX
Download
190
USENIX Security '23 - LibScan: Towards More Precise Third-Party Library Identification for...
USENIX
Download
191
USENIX Security '23 - Union under Duress: Understanding Hazards of Duplicate Resource Mismediation..
USENIX
Download
192
USENIX Security '23 - UVSCAN: Detecting Third-Party Component Usage Violations in IoT Firmware
USENIX
Download
193
USENIX Security '23 - Beyond Typosquatting: An In-depth Look at Package Confusion
USENIX
Download
194
USENIX Security '23 - SandDriller: A Fully-Automated Approach for Testing Language-Based...
USENIX
Download
195
USENIX Security '23 - Instructions Unclear: Undefined Behaviour in Cellular Network Specifications
USENIX
Download
196
USENIX Security '23 - MobileAtlas: Geographically Decoupled Measurements in Cellular Networks for...
USENIX
Download
197
USENIX Security '23 - Eavesdropping Mobile App Activity via Radio-Frequency Energy Harvesting
USENIX
Download
198
USENIX Security '23 - Sherlock on Specs: Building LTE Conformance Tests through Automated Reasoning
USENIX
Download
199
USENIX Security '23 - BASECOMP: A Comparative Analysis for Integrity Protection in Cellular...
USENIX
Download
200
USENIX Security '23 - Investigating Verification Behavior and Perceptions of Visual Digital...
USENIX
Download