USENIX Security ’23 - Bilingual Problems: Studying the Security Risks Incurred by Native Extensions in Scripting Languages

Authors/Presenters:Cristian-Alexandru Staicu, Sazzadur Rahaman, Ágnes Kiss, Michael Backes

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

USENIX Security ’23 - Hiding in Plain Sight: An Empirical Study of Web Application Abuse in Malware

Authors/Presenters:Mingxuan Yao, Jonathan Fuller, Ranjita Pai Kasturi, Saumya Agarwal, Amit Kumar Sikder, Brendan Saltaformaggio

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

USENIX Security ’23 - SQIRL: Grey-Box Detection of SQL Injection Vulnerabilities Using Reinforcement Learning

Authors/Presenters:Salim Al Wahaibi, Myles Foley, Sergio Maffeis

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

USENIX Security ’23 - WHIP: Improving Static Vulnerability Detection in Web Application by Forcing tools to Collaborate

Authors/Presenters:Feras Al-Kassar, Luca Compagna, Davide Balzarotti

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

USENIX Security ’23 - Auditing Framework APIs via Inferred App-side Security Specifications

Authors/Presenters:Parjanya Vyas, Asim Waheed, Yousra Aafer, N. Asokan

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

USENIX Security ’23 - Remote Direct Memory Introspection

Authors/Presenters:Hongyi Liu, Jiarong Xing, Yibo Huang, Danyang Zhuo, Srinivas Devadas, Ang Chen
Distinguished Paper Award Winner

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

USENIX Security ’23 - Detecting Multi-Step IAM Attacks in AWS Environments via Model Checking

Authors/Presenters:Ilia Shevrin, Oded Margalit

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

USENIX Security ’23 - Credit Karma: Understanding Security Implications of Exposed Cloud Services through Automated Capability Inference

Authors/Presenters:Xueqiang Wang, Yuqiong Sun, Susanta Nanda, XiaoFeng Wang

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

USENIX Security ’23 - DScope: A Cloud-Native Internet Telescope

Authors/Presenters:Eric Pauley, Paul Barford, Patrick McDaniel

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

USENIX Security ’23 - Cross Container Attacks: The Bewildered eBPF on Clouds

Authors/Presenters:Yi He, Roland Guo, Yunlong Xing, Xijia Che, Kun Sun, Zhuotao Liu, Ke Xu, Qi Li

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

USENIX Security ’23 - High Recovery With Fewer Injections: Practical Binary Volumetric Injection Attacks Against Dynamic Searchable Encryption

Authors/Presenters:Xianglong Zhang, Wei Wang, Peng Xu, Laurence T. Yang, Kaitai Liang

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

USENIX Security ’23 - Automated Analysis Of Protocols That Use Authenticated Encryption: How Subtle AEAD Differences Can Impact Protocol Security

Distinguished Paper Award Winner
Authors/Presenters:Cas Cremers, Alexander Dax, Charlie Jacomme, Mang Zhao

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

USENIX Security ’23 - How Fast Do You Heal? A Taxonomy For Post-Compromise Security In Secure-Channel Establishment

Authors/Presenters:Olivier Blazy, Ioana Boureanu, Pascal Lafourcade, Cristina Onete, Léo Robert

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

USENIX Security ’23 - Hash Gone Bad: Automated Discovery Of Protocol Attacks That Exploit Hash Function Weaknesses

**Distinguished Paper Award Winner**
Authors/Presenters:Vincent Cheval, Cas Cremers, Alexander Dax, Lucca Hirschi, Charlie Jacomme, Steve Kremer

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.

USENIX Security ’23 - A Comprehensive, Formal And Automated Analysis Of The EDHOC Protocol

Authors/Presenters:Charlie Jacomme, Elise Klein, Steve Kremer, Maïwenn Racouchot

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.