USENIX Security ’23 - Detecting Multi-Step IAM Attacks in AWS Environments via Model Checking

Authors/Presenters:Ilia Shevrin, Oded Margalit

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

USENIX Security ’23 - Credit Karma: Understanding Security Implications of Exposed Cloud Services through Automated Capability Inference

Authors/Presenters:Xueqiang Wang, Yuqiong Sun, Susanta Nanda, XiaoFeng Wang

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

USENIX Security ’23 - DScope: A Cloud-Native Internet Telescope

Authors/Presenters:Eric Pauley, Paul Barford, Patrick McDaniel

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

USENIX Security ’23 - Cross Container Attacks: The Bewildered eBPF on Clouds

Authors/Presenters:Yi He, Roland Guo, Yunlong Xing, Xijia Che, Kun Sun, Zhuotao Liu, Ke Xu, Qi Li

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

USENIX Security ’23 - High Recovery With Fewer Injections: Practical Binary Volumetric Injection Attacks Against Dynamic Searchable Encryption

Authors/Presenters:Xianglong Zhang, Wei Wang, Peng Xu, Laurence T. Yang, Kaitai Liang

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

USENIX Security ’23 - Automated Analysis Of Protocols That Use Authenticated Encryption: How Subtle AEAD Differences Can Impact Protocol Security

Distinguished Paper Award Winner
Authors/Presenters:Cas Cremers, Alexander Dax, Charlie Jacomme, Mang Zhao

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

USENIX Security ’23 - How Fast Do You Heal? A Taxonomy For Post-Compromise Security In Secure-Channel Establishment

Authors/Presenters:Olivier Blazy, Ioana Boureanu, Pascal Lafourcade, Cristina Onete, Léo Robert

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

USENIX Security ’23 - Hash Gone Bad: Automated Discovery Of Protocol Attacks That Exploit Hash Function Weaknesses

**Distinguished Paper Award Winner**
Authors/Presenters:Vincent Cheval, Cas Cremers, Alexander Dax, Lucca Hirschi, Charlie Jacomme, Steve Kremer

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

USENIX Security ’23 - A Comprehensive, Formal And Automated Analysis Of The EDHOC Protocol

Authors/Presenters:Charlie Jacomme, Elise Klein, Steve Kremer, Maïwenn Racouchot

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

USENIX Security ’23 - A Comprehensive, Formal And Automated Analysis Of The EDHOC Protocol

Authors/Presenters:Charlie Jacomme, Elise Klein, Steve Kremer, Maïwenn Racouchot

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

USENIX Security ’23 - The Impostor Among US(B): Off-Path Injection Attacks On USB Communications

Authors/Presenters:Robert Dumitru, Daniel Genkin, Andrew Wabnitz, Yuval Yarom

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

USENIX Security ’23 - Fuzz The Power: Dual-Role State Guided Black-box Fuzzing for USB Power Delivery

Authors/Presenters:Kyungtae Kim, Sungwoo Kim, Kevin R. B. Butler, Antonio Bianchi, Rick Kennell, Dave (Jing) Tian

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

USENIX Security ’23 - ACFA: Secure Runtime Auditing & Guaranteed Device Healing via Active Control Flow Attestation

Authors/Presenters:Adam Caulfield, Norrathep Rattanavipanon, Ivan De Oliveira Nunes

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

USENIX Security ’23 - FuncTeller: How Well Does eFPGA Hide Functionality?

Authors/Presenters:Zhaokun Han, Mohammed Shayan, Aneesh Dixit, Mustafa Shihab, Yiorgos Makris, Jeyavijayan (JV) Rajendrany

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.