USENIX Security '23 Poster Session

USENIX Security '23 is SOLD OUT.

Please do not plan to walk into the venue and register on site.
The event has reached maximum physical capacity, and we will not be able to accommodate any additional registrations.

Accepted Posters

The following posters will be presented at the USENIX Security ’23 Poster Session and Happy Hour on Thursday, August 10, from 6:00 pm–7:30 pm.

Pixelated Protection: Identifying Security Challenges in Game Development Processes
Philip Klostermeyer, Sabrina Klivan, Alexander Krause, Niklas Busch, and Sascha Fahl, CISPA Helmholtz Center for Information Security

Towards A Quantitative Risk Assessment of Physical Adversarial Attacks in the AV Perception Domain
Trishna Chakraborty, University of California, Irvine; S Hrushikesh Bhupathiraju, University of Florida; Dipkamal Bhusal, Rochester Institute of Technology; Michael Clifford, Toyota InfoTech Labs; Sara Rampazzi, University of Florida; Nidhi Rastogi, Rochester Institute of Technology; Qi Alfred Chen, University of California, Irvine

Proteus: An Extensible RISC-V Core for Hardware Extensions
Marton Bognar, Job Noorman, and Frank Piessens, imec-DistriNet, KU Leuven

Toward Facilitating Root Cause Localization in Fuzzing
Katsunori Aoki and Takahiro Shinagawa, The University of Tokyo

Virtual Adventures, Real Challenges: Analyzing Harassment Controls in VR
Abhinaya S B, Aafaq Sabir, and Anupam Das, North Carolina State University

Towards Quantifying Software Supply Chain Security Risks in Open-source 3D Printer Repositories
Jessy Ayala, University of California, Irvine

WhatsUpp with Sender Keys? Analysis, Improvements and Security Proofs
David Balbás, IMDEA Software Institute & Universidad Politécnica de Madrid; Daniel Collins, EPFL; Phillip Gajland, Max Planck Institute for Security and Privacy & Ruhr University Bochum

Performance Gains in Secure Machine Learning via TDA-Preprocessing
Dominic Gold, Florida Atlantic University; Koray Karabina, National Research Council Canada; Francis C. Motta, Florida Atlantic University

AI/ML-enabled Connected Healthcare Systems: New Remedies or New Risks?
Gargi Mitra, Mohammadreza Hallajiyan, and Mohammad Elnawawy, University of British Columbia; Shahrear Iqbal, National Research Council Canada; Karthik Pattabiraman, University of British Columbia

Security and Privacy Analysis of Employee Monitoring Applications
Adam Campbell, Adam Molnar, and Urs Hengartner, University of Waterloo

One Instruction to Rule Them All: Efficient (2+1)-PC for the SUBLEQ single-instruction architecture
Christopher Jiang and Ryan Henry, University of Calgary

Per-User Histogram In the Shuffle Model
Aashish Kolluri, National University of Singapore; Jacob Imola and Amrita Roy Chowdhury, University of California, San Diego

Towards A Security Analysis of Commercial Indoor Delivery Robot Systems
Fayzah Alshammari, Yunpeng Luo, and Qi Alfred Chen, University of California, Irvine

Automated Interaction With Smart Virtual Assistants Voice Apps Using Large Language Models
Aafaq Sabir and Anupam Das, North Carolina State University

FISHFUZZ: Catch Deeper Bugs by Throwing Larger Nets
Han Zheng, National Computer Network Intrusion Protection Center, University of Chinese Academy of Sciences, China; EPFL; Zhongguancun Lab; Jiayuan Zhang, School of Computer and Communication, Lanzhou University of Technology, China; National Computer Network Intrusion Protection Center, University of Chinese Academy of Sciences, China; Yuhang Huang and Zezhong Ren, National Computer Network Intrusion Protection Center, University of Chinese Academy of Sciences, China; He Wang, School of Cyber Engineering, Xidian University, China; National Computer Network Intrusion Protection Center, University of Chinese Academy of Sciences ,China; Chunjie Cao, School of Cyberspace Security, Hainan University, China; Yuqing Zhang, National Computer Network Intrusion Protection Center, University of Chinese Academy of Sciences; Flavio Toffalini and Mathias Payer, EPFL

Step-by-Step Vulnerability Detection using Large Language Models
Saad Ullah, Gianluca Stringhini, and Ayse K. Coskun, Boston University; Alessandro Morari and Saurabh Pujar, IBM Research

The Achilles Heel of Extended Reality Apps: Probing Availability Vulnerabilities in Artificial Intelligence Components
Yuhao Wu, Zihan Li, and Han Liu, Washington University in St. Louis; Ruimin Sun, Florida International University; Ning Zhang, Washington University in St. Louis

Permission Voucher: Enabling Seamless Interaction Between ID Card and Smart-City Infrastructure
Khan Reaz and Gerhard Wunder, Freie Universität Berlin

Privacy Authority-Aware Compiler for Homomorphic Encryption on Edge-Cloud
Dongkwan Kim and Hanjun Kim, Yonsei University

A Method for Detecting Various Forms of Re-Entrancy Vulnerabilities in Ethereum Blockchain Smart Contracts with Multi-Contract Interactions
Wenhui Jin, Yuguang Jin, Youngwoong Kim, and Heekuck Oh, Hanyang University

Bridging the Gap in PLC Binary Analysis: An Inclusive Dataset and PLCodeConflux Framework
Yonatan Gizachew Achamyeleh, Shih-Yuan Yu, and Mohammad Al Faruque, UC Irvine

ARMORE: Pushing Love Back Into Binaries
Luca Di Bartolomeo, Hossein Moghaddas, and Mathias Payer, EPFL

Silent Bugs Matter: A Study of Compiler-Introduced Security Bugs
Jianhao Xu, Nanjing University; Kangjie Lu, University of Minnesota; Zhengjie Du, Zhu Ding, and Linke Li, Nanjing University; Qiushi Wu, University of Minnesota; Mathias Payer, EPFL; Bing Mao, Nanjing University