| VoltSchemer: Use Voltage Noise to Manipulate Your Wireless Charger | USENIX Security '24 | Zihao Zhan, Yirui Yang, Haoqi Shan, Hanqiu Wang, Yier Jin, Shuo Wang |
| RustSan: Retrofitting AddressSanitizer for Efficient Sanitization of Rust | USENIX Security '24 | Kyuwon Cho, Jongyoon Kim, Kha Dinh Duy, Hajeong Lim, Hojoon Lee |
| Stop, Don't Click Here Anymore: Boosting Website Fingerprinting By Considering Sets of Subpages | USENIX Security '24 | Asya Mitseva, Andriy Panchenko |
| MetaSafe: Compiling for Protecting Smart Pointer Metadata to Ensure Safe Rust Integrity | USENIX Security '24 | Martin Kayondo, Inyoung Bang, Yeongjun Kwak, Hyungon Moon, Yunheung Paek |
| DONAPI: Malicious NPM Packages Detector using Behavior Sequence Knowledge Mapping | USENIX Security '24 | Cheng Huang, Nannan Wang, Ziyan Wang, Siqi Sun, Lingzi Li, Junren Chen, Qianchong Zhao, Jiaxuan Han, Zhen Yang, Lei Shi |
| VibSpeech: Exploring Practical Wideband Eavesdropping via Bandlimited Signal of Vibration-based Side Channel | USENIX Security '24 | Chao Wang, Feng Lin, Hao Yan, Tong Wu, Wenyao Xu, Kui Ren |
| PatchCURE: Improving Certifiable Robustness, Model Utility, and Computation Efficiency of Adversarial Patch Defenses | USENIX Security '24 | Chong Xiang, Tong Wu, Sihui Dai, Jonathan Petit, Suman Jana, Prateek Mittal |
| Fledging Will Continue Until Privacy Improves: Empirical Analysis of Google's Privacy-Preserving Targeted Advertising | USENIX Security '24 | Giuseppe Calderonio, Mir Masood Ali, Jason Polakis |
| ZKSMT: A VM for Proving SMT Theorems in Zero Knowledge | USENIX Security '24 | Daniel Luick, John C. Kolesar, Timos Antonopoulos, William R. Harris, James Parker, Ruzica Piskac, Eran Tromer, Xiao Wang, Ning Luo |
| HECKLER: Breaking Confidential VMs with Malicious Interrupts | USENIX Security '24 | Benedict Schlüter, Supraja Sridhara, Mark Kuhne, Andrin Bertschi, Shweta Shinde |
| Scalable Zero-knowledge Proofs for Non-linear Functions in Machine Learning | USENIX Security '24 | Meng Hao, Hanxiao Chen, Hongwei Li, Chenkai Weng, Yuan Zhang, Haomiao Yang, Tianwei Zhang |
| SLUBStick: Arbitrary Memory Writes through Practical Software Cross-Cache Attacks within the Linux Kernel | USENIX Security '24 | Lukas Maar, Stefan Gast, Martin Unterguggenberger, Mathias Oberhuber, Stefan Mangard |
| GraphGuard: Private Time-Constrained Pattern Detection Over Streaming Graphs in the Cloud | USENIX Security '24 | Songlei Wang, Yifeng Zheng, Xiaohua Jia |
| MicGuard: A Comprehensive Detection System against Out-of-band Injection Attacks for Different Level Microphone-based Devices | USENIX Security '24 | Tiantian Liu, Feng Lin, Zhongjie Ba, Li Lu, Zhan Qin, Kui Ren |
| A Broad Comparative Evaluation of Software Debloating Tools | USENIX Security '24 | Michael D. Brown, Adam Meily, Brian Fairservice, Akshay Sood, Jonathan Dorn, Eric Kilmer, Ronald Eytchison |
| FV8: A Forced Execution JavaScript Engine for Detecting Evasive Techniques | USENIX Security '24 | Nikolaos Pantelaios, Alexandros Kapravelos |
| Near-Optimal Constrained Padding for Object Retrievals with Dependencies | USENIX Security '24 | Pranay Jain, Andrew C. Reed, Michael K. Reiter |
| GPU Memory Exploitation for Fun and Profit | USENIX Security '24 | Yanan Guo, Zhenkai Zhang, Jun Yang |
| All Your Tokens are Belong to Us: Demystifying Address Verification Vulnerabilities in Solidity Smart Contracts | USENIX Security '24 | Tianle Sun, Ningyu He, Jiang Xiao, Yinliang Yue, Xiapu Luo, Haoyu Wang |
| Mempool Privacy via Batched Threshold Encryption: Attacks and Defenses | USENIX Security '24 | Arka Rai Choudhuri, Sanjam Garg, Julien Piet, Guru-Vamsi Policharla |
| GuideEnricher: Protecting the Anonymity of Ethereum Mixing Service Users with Deep Reinforcement Learning | USENIX Security '24 | Ravindu De Silva, Wenbo Guo, Nicola Ruaro, Ilya Grishchenko, Christopher Kruegel, Giovanni Vigna |
| Using My Functions Should Follow My Checks: Understanding and Detecting Insecure OpenZeppelin Code in Smart Contracts | USENIX Security '24 | Han Liu, Daoyuan Wu, Yuqiang Sun, Haijun Wang, Kaixuan Li, Yang Liu, Yixiang Chen |
| ChainPatrol: Balancing Attack Detection and Classification with Performance Overhead for Service Function Chains Using Virtual Trailers | USENIX Security '24 | Momen Oqaily, Hinddeep Purohit, Yosr Jarraya, Lingyu Wang, Boubakr Nour, Makan Pourzandi, Mourad Debbabi |
| LaserAdv: Laser Adversarial Attacks on Speech Recognition Systems | USENIX Security '24 | Guoming Zhang, Xiaohui Ma, Huiting Zhang, Zhijie Xiang, Xiaoyu Ji, Yanni Yang, Xiuzhen Cheng, Pengfei Hu |
| Correction-based Defense Against Adversarial Video Attacks via Discretization-Enhanced Video Compressive Sensing | USENIX Security '24 | Wei Song, Cong Cong, Haonan Zhong, Jingling Xue |