USENIX Security ’23 - Automated Analysis Of Protocols That Use Authenticated Encryption: How Subtle AEAD Differences Can Impact Protocol Security

Distinguished Paper Award Winner
Authors/Presenters:Cas Cremers, Alexander Dax, Charlie Jacomme, Mang Zhao

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

USENIX Security ’23 - How Fast Do You Heal? A Taxonomy For Post-Compromise Security In Secure-Channel Establishment

Authors/Presenters:Olivier Blazy, Ioana Boureanu, Pascal Lafourcade, Cristina Onete, Léo Robert

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

USENIX Security ’23 - Hash Gone Bad: Automated Discovery Of Protocol Attacks That Exploit Hash Function Weaknesses

**Distinguished Paper Award Winner**
Authors/Presenters:Vincent Cheval, Cas Cremers, Alexander Dax, Lucca Hirschi, Charlie Jacomme, Steve Kremer

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

USENIX Security ’23 - A Comprehensive, Formal And Automated Analysis Of The EDHOC Protocol

Authors/Presenters:Charlie Jacomme, Elise Klein, Steve Kremer, Maïwenn Racouchot

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

USENIX Security ’23 - A Comprehensive, Formal And Automated Analysis Of The EDHOC Protocol

Authors/Presenters:Charlie Jacomme, Elise Klein, Steve Kremer, Maïwenn Racouchot

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

USENIX Security ’23 - The Impostor Among US(B): Off-Path Injection Attacks On USB Communications

Authors/Presenters:Robert Dumitru, Daniel Genkin, Andrew Wabnitz, Yuval Yarom

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

USENIX Security ’23 - Fuzz The Power: Dual-Role State Guided Black-box Fuzzing for USB Power Delivery

Authors/Presenters:Kyungtae Kim, Sungwoo Kim, Kevin R. B. Butler, Antonio Bianchi, Rick Kennell, Dave (Jing) Tian

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

USENIX Security ’23 - ACFA: Secure Runtime Auditing & Guaranteed Device Healing via Active Control Flow Attestation

Authors/Presenters:Adam Caulfield, Norrathep Rattanavipanon, Ivan De Oliveira Nunes

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

USENIX Security ’23 - FuncTeller: How Well Does eFPGA Hide Functionality?

Authors/Presenters:Zhaokun Han, Mohammed Shayan, Aneesh Dixit, Mustafa Shihab, Yiorgos Makris, Jeyavijayan (JV) Rajendrany

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

USENIX Security ’23 - Greenhouse: Single-Service Rehosting of Linux-Based Firmware Binaries in User-Space Emulation

Authors/Presenters:Hui Jun Tay, Kyle Zeng, Jayakrishna Menon Vadayath, Arvind S. Raj, Audrey Dutcher, Tejesh Reddy, Wil Gibbs, Zion Leonahenahe Basque, Fangzhou Dong, Zack Smith, Adam Doupé, Tiffany Bao, Yan Shoshitaishvili, Ruoyu Wang

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

USENIX Security ’23 - "All Of Them Claim To Be The Best": Multi-Perspective Study Of VPN Users And VPN Providers

Authors/Presenters:Reethika Ramesh, Anjali Vyas, Roya Ensafi

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

USENIX Security ’23 - FABRID: Flexible Attestation-Based Routing for Inter-Domain Networks

Authors/Presenters:Cyrill Krähenbühl, Marc Wyss, David Basin, Vincent Lenders, Adrian Perrig, Martin Strohmeier

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

USENIX Security ’23 - Back to School: On the (In)Security of Academic VPNs

Authors/Presenters:Ka Lok Wu, Man Hong Hue, Ngai Man Poon, Kin Man Leung, Wai Yin Po, Kin Ting Wong, Sze Ho Hui, Sze Yiu Chau

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

USENIX Security ’23 - Bypassing Tunnels: Leaking VPN Client Traffic by Abusing Routing Tables

Authors/Presenters:Nian Xue, Yashaswi Malla, Zihang Xia, Christina Pöpper, Mathy Vanhoef

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.