USENIX Security '23 | That Person Moves Like A Car: Misclassification Attack Detection for Autonomous Systems Using Spatiotemporal Consistency | |
USENIX Security '23 | Strategies and Vulnerabilities of Participants in Venezuelan Influence Operations | |
USENIX Security '23 | Investigating Verification Behavior and Perceptions of Visual Digital Certificates | |
USENIX Security '23 | HOMESPY: The Invisible Sniffer of Infrared Remote Control of Smart TVs | |
USENIX Security '23 | TPatch: A Triggered Physical Adversarial Patch | |
USENIX Security '23 | Assessing Anonymity Techniques Employed in German Court Decisions: A De-Anonymization Experiment | |
USENIX Security '23 | GLeeFuzz: Fuzzing WebGL Through Error Message Guided Mutation | |
USENIX Security '23 | Are You Spying on Me? Large-Scale Analysis on IoT Data Exposure through Companion Apps | |
USENIX Security '23 | The Space of Adversarial Strategies | |
USENIX Security '23 | Automated Security Analysis of Exposure Notification Systems | |
USENIX Security '23 | Every Signature is Broken: On the Insecurity of Microsoft Office’s OOXML Signatures | |
USENIX Security '23 | Humans vs. Machines in Malware Classification | |
USENIX Security '23 | How fast do you heal? A taxonomy for post-compromise security in secure-channel establishment | |
USENIX Security '23 | Person Re-identification in 3D Space: A WiFi Vision-based Approach | |
USENIX Security '23 | Fourteen Years in the Life: A Root Server’s Perspective on DNS Resolver Security | |
USENIX Security '23 | ClepsydraCache -- Preventing Cache Attacks with Time-Based Evictions | |
USENIX Security '23 | Guarding Serverless Applications with Kalium | |
USENIX Security '23 | Security and Privacy Failures in Popular 2FA Apps | |
USENIX Security '23 | Hash Gone Bad: Automated discovery of protocol attacks that exploit hash function weaknesses | |
USENIX Security '23 | Combating Robocalls with Phone Virtual Assistant Mediated Interaction | |
USENIX Security '23 | Examining Consumer Reviews to Understand Security and Privacy Issues in the Market of Smart Home Devices | |
USENIX Security '23 | A Study of Multi-Factor and Risk-Based Authentication Availability | |
USENIX Security '23 | Isolated and Exhausted: Attacking Operating Systems via Site Isolation in the Browser | |
USENIX Security '23 | Internet Service Providers' and Individuals' Attitudes, Barriers, and Incentives to Secure IoT | |
USENIX Security '23 | Access Denied: Assessing Physical Risks to Internet Access Networks | |