Usenix 2023 accepted papers pdf. Spring Accepted Papers ; Fall Accepted Papers .

Usenix 2023 accepted papers pdf If your accepted paper should not be published prior to the event, please notify the USENIX Production Department. If your accepted paper should not be published prior to the event, please notify production@usenix. This is a hard deadline. USENIX Security '24: Fast RS-IOP Multivariate Polynomial Commitments and Verifiable Secret Sharing: Zongyang Zhang, Weihan Li, Yanpei Guo, Kexin Shi, Sherman S. We congratulate the authors of these papers for producing innovative and exciting work. Papers and proceedings are freely USENIX is committed to Open Access to the research presented at our events. letter-sized pages in two-col- USENIX is committed to Open Access to the research presented at our events. USENIX Security '23 has three submission deadlines. Make searchable your final paper PDF. USENIX ATC brings together leading systems researchers for the presentation of cutting-edge systems research and the opportunity to gain insight into a wealth of must-know topics, including virtualization, system and network management and troubleshooting, cloud and The 2023 USENIX Annual Technical Conference will be co- located with the 17th USENIX Symposium on Operating Systems Design and Implementation (OSDI ’23) and take place on July USENIX Security '24: Lightweight Authentication of Web Data via Garble-Then-Prove: USENIX Security '24: VeriSimplePIR: Verifiability in SimplePIR at No Online Cost for Honest Servers: Leo de Castro, Keewoo Lee: USENIX Security '24: A Taxonomy of C Decompiler Fidelity Issues: Luke Dramko, Jeremy Lacomis, Edward J. These schemes enable a client to fetch a record from a remote database server such that (a) the server does not learn which record the client reads, and (b) the client either obtains the "authentic" record or detects server misbehavior and safely aborts. Artifact evaluation is optional, although we hope all accepted papers will participate. OSDI brings together professionals from academic and industrial backgrounds in what has become a premier forum for discussing the design, implementation, and implications of systems software. In this paper, we introduce SparsePIR, a single-server keyword private information retrieval (PIR) construction that enables querying over sparse databases. This repo includes the source code, data, and documentation to reproduce the major claims in the USENIX Security 2023 paper How China Detects and Blocks Fully Encrypted Traffic. We employ carefully-designed templates to construct prompts that are more likely to result in privacy leaks. The symposium emphasizes innovative research as well as quantified or insightful experiences in systems design and implementation. org as soon as possible. Unfortunately, system administrators (sysadmins) sometimes over-grant permissions when resolving unintended access-deny issues reported by legitimate users, which may open up security vulnerabilities for attackers. Towards Generic Database Management System Fuzzing Yupeng Yang and Yongheng Chen, Georgia Institute of Technology; Rui Zhong, Palo Alto Networks; Jizhou Chen and Wenke Lee, Georgia Institute of Technology In this paper, we aim to systematically understand the impact of RNIC microarchitecture resources on performance isolation. S. In this paper, we tackle this problem and propose ARGUS, the first self-learning intrusion detection system for detecting contextual attacks on IoT environments, in which the attacker maliciously invokes IoT device actions to reach its goals. Papers and proceedings are freely Feb 19, 2024 · 2023 USENIX Annual Technical Conference (ATC’23). @inproceedings {285104, author = {Zilong Wang and Layong Luo and Qingsong Ning and Chaoliang Zeng and Wenxue Li and Xinchen Wan and Peng Xie and Tao Feng and Ke Cheng and Xiongfei Geng and Tianhao Wang and Weicheng Ling and Kejia Huo and Pingbo An and Kui Ji and Shideng Zhang and Bin Xu and Ruiqing Feng and Tao Ding and Kai Chen and Chuanxiong Guo}, USENIX is committed to Open Access to the research presented at our events. In this paper, we study the eBPF-based cross container attacks and reveal their security impacts in real world services. None of the text in the body of the paper, beyond words that might appear in illustrations, should be rendered as images. e. ) Hardware and Software for Security and Performance SAGE: Software-based Attestation for GPU Execution A curated collection of the latest academic research papers and developments in AI Security. At its core, SparsePIR is based on a novel encoding algorithm that encodes sparse database entries as linear combinations while being compatible with important PIR optimizations including In this paper we propose doing so not by imposing uniform and comprehensive standards, but by creating a fine-grained two-sided market via an intercloud broker. . Prepublication versions of the accepted papers from the fall submission deadline are available below. 2022 USENIX Annual Technical Conference will take place July 11–13, 2022, at the Omni La Costa Resort & Spa in Carlsbad, CA, USA. Papers should be typeset on U. Accepted papers, however, will be made available online to everyone beginning on the first day of the conference. Paper Submission: Technical papers must be uploaded as PDFs by February 16, 2023 (but note the mandatory February 10 registration deadline above). The crux is to infer union variables and their discriminants in COM binaries. While existing attacks on LiDAR-based autonomous driving architectures focus on lowering the confidence score of AV object detection models to induce obstacle misdetection, our research discovers how to leverage laser-based spoofing techniques to selectively In this paper, we develop a voice anonymization system, named V-Cloak, which attains real-time voice anonymization while preserving the intelligibility, naturalness and timbre of the audio. Split learning (SL) is a popular framework to protect a client's training data by splitting up a model among the client and the server. • Notification to authors: Friday, April 28, 2023 • Final paper files due: Thursday, June 8, 2023 Conference Organizers Program Co-Chairs Julia Lawall, Inria Dan Williams, Virginia Tech Program Committee TBA Overview The 2023 USENIX Annual Technical Conference seeks original, high-quality submissions that improve and further the knowledge In this paper, we propose Capstone, a more expressive architectural capability design that supports multiple existing memory isolation models in a trustless setup, i. The paper should be self-contained without appendices. A PDF of your final paper is due via the submissions system by Thursday, June 8, 2023. Fall Deadline: Tuesday, March 28, 2023; Winter Deadline: Tuesday, July 11, 2023; All embargoed papers will be released on the first day of the symposium, Wednesday, August 9, 2023. The 2023 USENIX Annual Technical Conference will be co- located with the 17th USENIX Symposium on Operating Systems Design and Implementation (OSDI ’23) and take place on July In this paper, we report MaginotDNS, a powerful cache poisoning attack against DNS servers that simultaneously act as forwarder and recursive resolver (termed as CDNS). USENIX ATC '23 Full Proceedings Interior (PDF, 70 MB, Best for Mobile Devices) Attendee Files (Registered attendees: Sign in to your USENIX account to download these files. Apr 17, 2023 · The 20th USENIX Symposium on Networked Systems Design and Implementation (NSDI '23) will take place April 17–19, 2023, at the Boston Marriott Long Wharf in Boston, MA, USA. First, we propose a dynamic cache engine to minimize feature retrieving traffic. Final Papers deadline. All papers will be available online to registered attendees no earlier than Thursday, January 26, 2023. The papers will be available online to everyone beginning on the first day of the symposium. USENIX Association 2023. Abusers, often intimate partners, use tools such as spyware to surveil and harass victim-survivors. This year’s program size is a 65% increase over the previous year’s record. Make Your Bits Go Faster. These brokers will allow users to view the cloud ecosystem not just as a collection of individual and largely incompatible clouds but as a more integrated Sky of Computing. Previous efforts have shown that a semi-honest server can conduct a model inversion attack to recover the client's inputs and model parameters to some extent, as well as to infer the labels. Support USENIX and our commitment to Open Access. In this paper, we present the first side-channel security analysis of Intel Optane persistent memory. Out of the 65 accepted papers, 13 (20%) were related to storage. If you are unsure who your shepherd is, please contact atc23chairs@usenix. Embed all fonts in your final paper PDF. Papers and proceedings are freely In this paper, we design CAPatch, a physical adversarial patch that can result in mistakes in the final captions, i. (Visa applications can take at least 30 working USENIX is committed to Open Access to the research presented at our events. Unlike other adversarial patches, TPatch remains benign under normal circumstances but can be triggered to launch a hiding, creating or altering attack by a designed distortion introduced by signal injection attacks towards cameras. If your paper is accepted and you need an invitation letter to apply All papers will be available online to registered attendees no earlier than Thursday, January 26, 2023. , input-specific). Feng Dong, School of Cyber Science and Engineering, Huazhong University of Science and Technology / Sangfor Technologies Inc. A printable PDF of your final paper is due via the submissions system by Thursday, June 1, 2023. All papers that are accepted by the end of the winter submission reviewing cycle (February–June 2023) will appear in the proceedings for USENIX Security '23. [IEEE S&P '21] in the space of IoT privacy nutrition labels, we conducted an online study in January 2023 on Prolific with n=1,505 participants to investigate the impact of privacy labels on users' risk perception and willingness to install apps. In addition to our member discounts, USENIX offers several discounts to help you to attend USENIX Security '23. Page Spring Accepted Papers ; Fall Accepted Papers USENIX is committed to Open Access to the research presented at our events. Out of the 353 submissions to ATC’23, 80 of them (23%) were related to storage. It optimizes the novel acoustic feature loss and perturbation loss, based on Mel-frequency Cepstral Coefficients (MFCC). Prepublication versions of the accepted papers from the summer submission deadline are available below. Coronavirus/COVID-19 Health and Safety Plan. We evaluate the performance overhead and security of Kalium using realistic open-source applications; our results show that Kalium mitigates Jul 10, 2023 · OSDI brings together professionals from academic and industrial backgrounds in what has become a premier forum for discussing the design, implementation, and implications of systems software. If you have questions, please contact the SOUPS 2023 Technical Papers Co-Chairs, Katharina Krombholz and Rick Wash, or the USENIX Production Department. We design an algorithm based on multi-arm bandits to generate filter rules that block ads while controlling the trade-off between blocking ads and avoiding visual breakage. Security at the End of the Tunnel: The Anatomy of VPN Mental Models Among Experts and Non-Experts in a Corporate Context This paper introduces and evaluates a semi-automated pipeline for extracting sensitive personal information from the Codex model used in GitHub Copilot. 2023, including titles, authors, and abstracts, with support for paper interpretation based on Kimi AI. In this paper, we present two novel attacks that cause VPN clients to leak traffic outside the protected VPN tunnel. Specifically, we develop a robust traffic representation method that generates Traffic Aggregation Matrix (TAM) to fully capture key informative features leaked from Tor traces. Papers and proceedings are freely available to everyone once the event begins. Final papers should be no longer than 14 pages, including figures and tables, plus as many pages as needed for references. While ATC is focused on systems research broadly, storage systems constitute a significant part of this community. org, or the USENIX office, submissionspolicy@usenix. In this paper, we introduce PATCHVERIF, an automated patch analysis framework. Registration. With eBPF attacks, we successfully compromise five online Jupyter/Interactive Shell services and the Cloud Shell of Google Cloud Platform. If the conference registration fee will pose a hardship for the presenter of the accepted paper, please contact conference@ usenix. The incredible effort we describe resulted in the 2023 proceedings, which include 422 accepted papers. Using this model, we develop a test suite to evaluate RDMA performance isolation solutions. , raw packet timing and sizes) and the homogeneousness of the required input (i. Our designed anonymizer features a one-shot generative model that modulates the features of the original audio at different frequency levels. USENIX is committed to Open Access to the research presented at our events. Network simulations and emulations can only cover a subset of the continuously evolving set of workloads networks can experience, leaving room for unexplored corner cases and bugs that can cause sub-optimal performance on live traffic. Instructions for Authors of Refereed Papers. Important Dates. letter-sized pages in two-col- All authors of accepted USENIX Security '24 papers (including shepherd approved, but not major revisions) are encouraged to submit artifacts for Artifact Evaluation (AE). Artifacts can be submitted in the same cycle as the accepted paper or in any of the following cycles for 2024. The attack is made possible through exploiting vulnerabilities in the bailiwick checking algorithms, one of the cornerstones of DNS security since the 1990s, and affects Prepublication versions of papers accepted for USENIX Security ’24 will be published and open and accessible to everyone with-out restrictions on the following dates: • Summer Deadline: Tuesday, November 14, 2023 • Fall Deadline: Tuesday, April 9, 2024 • Winter Deadline: TBD (final papers will be published with the full conference USENIX is committed to Open Access to the research presented at our events. FAST brings together storage-system researchers and practitioners to explore new directions in the design, implementation, evaluation, and deployment of storage systems. Final papers deadline. No extensions will be granted. Any video, audio, and/or slides that are posted after the event are also free and open to everyone. Accepted papers and demos/posters will be considered for a Best Paper Award and Best Demo Award. This repository aims to provide a comprehensive source for researchers and enthusiasts to stay updated on AI Security trends and findings. Accepted submissions will be treated as confidential prior to publication on the WOOT '25 website; rejected submissions will be permanently treated as confidential. If your paper is accepted and you need an invitation letter to apply for a visa to attend the conference, please contact conference@usenix. Jul 10, 2024 · Thanks to those who joined us for the 2023 USENIX Annual Technical Conference (USENIX ATC '23). In this paper, we leverage natural language processing (NLP) to automatically extract option descriptions from program documents and analyze the relationship (e. The list of accepted papers for USENIX-Sec. PATCHVERIF’s goal is to evaluate whether a given patch introduces bugs in the patched RV control software. ; Liu Wang and Xu Nie, Beijing University of Posts and Telecommunications; Fei Shao, Case Western Reserve University; Haoyu Wang, School of Cyber Science and Engineering, Huazhong University of Science and Technology; Ding Li, Key Laboratory of High-Confidence Software In this paper, we present Kalium, an extensible security framework that leverages local function state and global application state to enforce control-flow integrity (CFI) in serverless applications. This paper designs KENKU, an efficient and stealthy black-box adversarial attack framework against ASRs, supporting hidden voice command and integrated command attacks. Conference Title Author(s) OSDI '24: Validating the eBPF Verifier via State Embedding: Hao Sun, Zhendong Su: OSDI '24: Llumnix: Dynamic Scheduling for Large Language Model Serving Accepted papers will generally be available online to regis-tered attendees before the conference. Areas of Interest All papers that are accepted by the end of the winter submission reviewing cycle (February–June 2023) will appear in the proceedings for USENIX Security '23. Distinguished Paper Award Winner and Runner-Up Winner of the 2023 Internet Defense Prize Available Media Today's digital communication relies on complex protocols and specifications for exchanging structured messages and data. All submissions will be made online via their respective web forms: Summer Deadline , Fall Deadline , Winter Deadline . USENIX Security '23 has three submission deadlines. Jul 6, 2023 · Download Call for Papers PDF. We look forward to the impact that these papers will have in the years to come. We present a model that represents how RDMA operations use RNIC resources. , conflicts, dependencies) among the options before filtering out invalid combinations and only leaving the valid ones for fuzzing. If you wish to submit a paper to, or deliver a talk at, another upcoming USENIX event, please review the open Calls for Papers and Calls for Participation for our upcoming USENIX conferences. USENIX ATC '23 will bring together leading systems researchers for cutting-edge systems research and the opportunity to gain insight into a wealth of must-know topics. By co-designing caching policy and the order of sampling, we find a sweet spot of low overhead and a high cache hit ratio. USENIX Security '24 Summer Accepted Papers | USENIX Jul 6, 2023 · Download Call for Papers PDF. We appreciate your willingness to help safeguard your fellow event attendees and USENIX Security '23 Glaze: Protecting Artists from Style Mimicry by Text-to-Image Models Shawn Shan, University of Chicago; Jenna Cryan, University of Chicago; Emily Wenger, University of Chicago; Haitao Zheng, University of Chicago; Rana Hanocka, University of Chicago; Ben Y. In this paper, we introduce AutoFR, a reinforcement learning framework to fully automate the process of filter rule creation and evaluation for sites of interest. This paper introduces protocols for authenticated private information retrieval. , either create a completely different sentence or a sentence with keywords missing, against multi-modal image captioning systems. Unfortunately, anecdotal evidence suggests that smart, Internet-connected devices such as home thermostats, cameras, and Bluetooth item finders may similarly be used against victim-surviv 21st USENIX Conference on File and Storage Technologies (FAST '23), February 21–23, 2023, Hyatt Regency Santa Clara, Santa Clara, CA, USA. In total, the camera-ready version should be no longer than 18 pages, including the bibliography and any appendices. Ranasinghe: USENIX Security '24 @inproceedings {287168, author = {Ming Xu and Jitao Yu and Xinyi Zhang and Chuanwang Wang and Shenghao Zhang and Haoqi Wu and Weili Han}, title = {Improving Real-world Password Guessing Attacks via Bi-directional Transformers}, USENIX is committed to Open Access to the research presented at our events. Accurate and thorough analysis of network performance is challenging. org. org by January 31, 2023. The root cause of both attacks is a widespread design flaw in how clients configure the Operating System (OS) to route all traffic through the VPN tunnel. Spring Accepted Papers ; Fall Accepted Papers USENIX is committed to Open Access to the research presented at our events. All submissions must follow the guidelines described below. , without relying on trusted software components. Schwartz, Bogdan Vasilescu Papers accompanied by nondisclosure agreement forms will not be considered. ARGUS monitors the contextual setting based on the state and actions of IoT devices in the environment. USENIX ATC '22 will bring together leading systems researchers for cutting-edge systems research and the opportunity to gain insight into a wealth of must-know topics. The shepherd is listed in the submissions system. Leveraging dynamic program analysis techniques, Ape supports the automatic synthesis of adversarial smart contracts. M. NSDI focuses on the design principles, implementation, and practical evaluation of networked and distributed systems. The papers will be available online to everyone beginning on the first day of the main conference, February 21, 2023. These instructions are for authors of papers accepted for publication at the 23rd USENIX Conference on File and Storage Technologies (FAST '25). Chow, Ximeng Liu, Jin Dong: USENIX Security '24: MultiFuzz: A Multi-Stream Fuzzer For Testing Monolithic Firmware: Michael Chesser, Surya Nepal, Damith C. The 20th USENIX Symposium on Networked Systems Design and Implementation (NSDI '23) will take place April 17–19, 2023, at the Boston Marriott Long Wharf in Boston, MA, USA. We reverse-engineer the internal cache hierarchy, cache sizes, associativity, replacement policies, and wear-leveling mechanism of the Optane memory. Maximum page length. This paper proposes BGL, a distributed GNN training system designed to address the bottlenecks with a few key ideas. Artifact evaluation will begin only after paper acceptance decisions have already been made. We hope you enjoyed the event. If the conference registration fee will pose a hardship for the presenter of the accepted paper, please contact the Conference Department at conference@usenix. Questions about the process can be directed to fast24aec@usenix. If you have questions, please contact the Production Department. Zhao, University of Chicago Fall Deadline: Tuesday, March 28, 2023; Winter Deadline: Tuesday, July 11, 2023; All embargoed papers will be released on the first day of the symposium, Wednesday, August 9, 2023. Paper format. This is challenging since existing type recovery techniques do not support union type in binaries. Autonomous Vehicles (AVs) increasingly use LiDAR-based object detection systems to perceive other vehicles and pedestrians on the road. Papers and proceedings are freely The Nineteenth Symposium on Usable Privacy and Security (SOUPS 2023), August 6–8, 2023, Anaheim, CA, USA. As in previous years, USENIX ATC ’23 solicited three types of papers. In our design, we take a broader view of FHE development, extending the scope of optimizations beyond the cryptographic challenges existing tools focus on. Please review USENIX's Coronavirus/COVID-19 Health and Safety Plan prior to registering for the event. USENIX Security brings together researchers, practitioners, system programmers, and others to share and explore the latest advances in the security and privacy of computer systems and networks. Replicating the methodology of Emani-Naeini et al. We show how Capstone is well-suited for environments where privilege boundaries are fluid (dynamically extensible), memory Access control configurations are gatekeepers to block unwelcome access to sensitive data. 2023 USENIX Annual Technical Conference will take place July 10–12, 2023, at the Sheraton Boston, Boston, MA, USA. By submitting a paper, you agree that at least one of the authors will attend the conference to present it. Deep learning has proven to be promising for traffic fingerprinting that explores features of packet timing and sizes. Notification for paper authors: Friday, December 8, 2023 USENIX is committed to Open Access to the research presented at our events. 3 days ago · 17th USENIX Symposium on Operating Systems Design and Implementation, OSDI 2023, Boston, MA, USA, July 10-12, 2023. In this paper, we propose TPatch, a physical adversarial patch triggered by acoustic signals. Although well-known for automatic feature extraction, it is faced with a gap between the heterogeneousness of the traffic (i. Papers and proceedings are freely In this paper, we propose COMFUSION, the first tool that detects union type confusion in COM. Once accepted, papers must be reformatted to fit in 14 pages, excluding bibliography and well-marked appendices. In this paper, we propose a novel WF attack called Robust Fingerprinting (RF), which enables an attacker to fingerprint the Tor traffic under various defenses. POLYCORN: Data-driven Cross-layer Multipath Networking for High-speed Railway through Composable Schedulerlets If the conference registration fee will pose a hardship for the presenter of the accepted paper, please contact conference@usenix. However, it will be possible for authors of accepted papers to present remotely with permission from the PC Co-Chairs. This typically does not require authors to do anything additional, as PDFs generated via tools like pdfLaTeX are typically searchable. g. Papers and proceedings are freely Tech-enabled interpersonal abuse (IPA) is a pervasive problem. usenix. It is designed for anyone who is curious about the methodologies in our study and wants to reproduce the claims in our paper independently. In addition to full length, 11-page research papers, authors could submit 5-page short research papers that describe complete and properly evaluated ideas using fewer pages. In this paper, we present HECO, a new end-to-end design for FHE compilers that takes high-level imperative programs and emits efficient and secure FHE implementations. The full program will be available soon. a hardship for the presenter of the accepted paper, panel proposals via email to sec23it@usenix. Papers accompanied by nondisclosure agreement forms The 17th USENIX Symposium on Operating Systems Design and Implementation (OSDI '23) will be co-located with the 2023 USENIX Annual Technical Conference (USENIX ATC '23) and take place on July 10–12, 2023, in Boston, MA, USA. To this aim, PATCHVERIF uses a combination of static and dynamic analysis to measure how the analyzed patch affects the physical state of an RV. As part of USENIX's open access policy, all papers will be available online before the conference. Shedding light on such ''copy-paste'' malpractice, this paper introduces the Blockchain Imitation Game and proposes a generalized imitation attack methodology called Ape. Presentation: For accepted papers, we encourage at least one of the paper authors to attend the conference and present the work. In addition, a special AutoDriving Security Award will be given to one of the accepted papers to recognize and reward research that makes substantial contributions to secure today's autonomous driving technology. izfgfu ojl omzcr lft huxr slahps xqfj pwcrmys cxmkn gxrt
{"Title":"100 Most popular rock bands","Description":"","FontSize":5,"LabelsList":["Alice in Chains ⛓ ","ABBA 💃","REO Speedwagon 🚙","Rush 💨","Chicago 🌆","The Offspring 📴","AC/DC ⚡️","Creedence Clearwater Revival 💦","Queen 👑","Mumford & Sons 👨‍👦‍👦","Pink Floyd 💕","Blink-182 👁","Five Finger Death Punch 👊","Marilyn Manson 🥁","Santana 🎅","Heart ❤️ ","The Doors 🚪","System of a Down 📉","U2 🎧","Evanescence 🔈","The Cars 🚗","Van Halen 🚐","Arctic Monkeys 🐵","Panic! at the Disco 🕺 ","Aerosmith 💘","Linkin Park 🏞","Deep Purple 💜","Kings of Leon 🤴","Styx 🪗","Genesis 🎵","Electric Light Orchestra 💡","Avenged Sevenfold 7️⃣","Guns N’ Roses 🌹 ","3 Doors Down 🥉","Steve Miller Band 🎹","Goo Goo Dolls 🎎","Coldplay ❄️","Korn 🌽","No Doubt 🤨","Nickleback 🪙","Maroon 5 5️⃣","Foreigner 🤷‍♂️","Foo Fighters 🤺","Paramore 🪂","Eagles 🦅","Def Leppard 🦁","Slipknot 👺","Journey 🤘","The Who ❓","Fall Out Boy 👦 ","Limp Bizkit 🍞","OneRepublic 1️⃣","Huey Lewis & the News 📰","Fleetwood Mac 🪵","Steely Dan ⏩","Disturbed 😧 ","Green Day 💚","Dave Matthews Band 🎶","The Kinks 🚿","Three Days Grace 3️⃣","Grateful Dead ☠️ ","The Smashing Pumpkins 🎃","Bon Jovi ⭐️","The Rolling Stones 🪨","Boston 🌃","Toto 🌍","Nirvana 🎭","Alice Cooper 🧔","The Killers 🔪","Pearl Jam 🪩","The Beach Boys 🏝","Red Hot Chili Peppers 🌶 ","Dire Straights ↔️","Radiohead 📻","Kiss 💋 ","ZZ Top 🔝","Rage Against the Machine 🤖","Bob Seger & the Silver Bullet Band 🚄","Creed 🏞","Black Sabbath 🖤",". 🎼","INXS 🎺","The Cranberries 🍓","Muse 💭","The Fray 🖼","Gorillaz 🦍","Tom Petty and the Heartbreakers 💔","Scorpions 🦂 ","Oasis 🏖","The Police 👮‍♂️ ","The Cure ❤️‍🩹","Metallica 🎸","Matchbox Twenty 📦","The Script 📝","The Beatles 🪲","Iron Maiden ⚙️","Lynyrd Skynyrd 🎤","The Doobie Brothers 🙋‍♂️","Led Zeppelin ✏️","Depeche Mode 📳"],"Style":{"_id":"629735c785daff1f706b364d","Type":0,"Colors":["#355070","#fbfbfb","#6d597a","#b56576","#e56b6f","#0a0a0a","#eaac8b"],"Data":[[0,1],[2,1],[3,1],[4,5],[6,5]],"Space":null},"ColorLock":null,"LabelRepeat":1,"ThumbnailUrl":"","Confirmed":true,"TextDisplayType":null,"Flagged":false,"DateModified":"2022-08-23T05:48:","CategoryId":8,"Weights":[],"WheelKey":"100-most-popular-rock-bands"}