| PrivImage: Differentially Private Synthetic Image Generation using Diffusion Models with Semantic-Aware Pretraining | USENIX Security '24 | Kecen Li, Chen Gong, Zhixiang Li, Yuzhong Zhao, Xinwen Hou, Tianhao Wang |
| Simulated Stress: A Case Study of the Effects of a Simulated Phishing Campaign on Employees' Perception, Stress and Self-Efficacy | USENIX Security '24 | Markus Schöps, Marco Gutfleisch, Eric Wolter, M. Angela Sasse |
| Uncovering the Limits of Machine Learning for Automatic Vulnerability Detection | USENIX Security '24 | Niklas Risse, Marcel Böhme |
| Improving ML-based Binary Function Similarity Detection by Assessing and Deprioritizing Control Flow Graph Features | USENIX Security '24 | Jialai Wang, Chao Zhang, Longfei Chen, Yi Rong, Yuxiao Wu, Hao Wang, Wende Tan, Qi Li, Zongpeng Li |
| Understanding Ethereum Mempool Security under Asymmetric DoS by Symbolized Stateful Fuzzing | USENIX Security '24 | Yibo Wang, Yuzhe Tang, Kai Li, Wanning Ding, Zhihua Yang |
| Malla: Demystifying Real-world Large Language Model Integrated Malicious Services | USENIX Security '24 | Zilong Lin, Jian Cui, Xiaojing Liao, XiaoFeng Wang |
| ACE: A Model Poisoning Attack on Contribution Evaluation Methods in Federated Learning | USENIX Security '24 | Zhangchen Xu, Fengqing Jiang, Luyao Niu, Jinyuan Jia, Bo Li, Radha Poovendran |
| LLM-Fuzzer: Scaling Assessment of Large Language Model Jailbreaks | USENIX Security '24 | Jiahao Yu, Xingwei Lin, Zheng Yu, Xinyu Xing |
| Do You See How I Pose? Using Poses as an Implicit Authentication Factor for QR Code Payment | USENIX Security '24 | Chuxiong Wu, Qiang Zeng |
| TYGR: Type Inference on Stripped Binaries using Graph Neural Networks | USENIX Security '24 | Chang Zhu, Ziyang Li, Anton Xue, Ati Priya Bajaj, Wil Gibbs, Yibo Liu, Rajeev Alur, Tiffany Bao, Hanjun Dai, Adam Doupé, Mayur Naik, Yan Shoshitaishvili, Ruoyu Wang, Aravind Machiry |
| Defects-in-Depth: Analyzing the Integration of Effective Defenses against One-Day Exploits in Android Kernels | USENIX Security '24 | Lukas Maar, Florian Draschbacher, Lukas Lamster, Stefan Mangard |
| "What do you want from theory alone?" Experimenting with Tight Auditing of Differentially Private Synthetic Data Generation | USENIX Security '24 | Meenatchi Sundaram Muthu Selva Annamalai, Georgi Ganev, Emiliano De Cristofaro |
| On the Criticality of Integrity Protection in 5G Fronthaul Networks | USENIX Security '24 | Jiarong Xing, Sophia Yoo, Xenofon Foukas, Daehyeok Kim, Michael K. Reiter |
| Understanding Help-Seeking and Help-Giving on Social Media for Image-Based Sexual Abuse | USENIX Security '24 | Miranda Wei, Sunny Consolvo, Patrick Gage Kelley, Tadayoshi Kohno, Tara Matthews, Sarah Meiklejohn, Franziska Roesner, Renee Shelby, Kurt Thomas, Rebecca Umbach |
| UBA-Inf: Unlearning Activated Backdoor Attack with Influence-Driven Camouflage | USENIX Security '24 | Zirui Huang, Yunlong Mao, Sheng Zhong |
| SIMurai: Slicing Through the Complexity of SIM Card Security Research | USENIX Security '24 | Tomasz Piotr Lisowski, Merlin Chlosta, Jinjin Wang, Marius Muench |
| Making Them Ask and Answer: Jailbreaking Large Language Models in Few Queries via Disguise and Reconstruction | USENIX Security '24 | Tong Liu, Yingjie Zhang, Zhe Zhao, Yinpeng Dong, Guozhu Meng, Kai Chen |
| The Imitation Game: Exploring Brand Impersonation Attacks on Social Media Platforms | USENIX Security '24 | Bhupendra Acharya, Dario Lazzaro, Efrén López-Morales, Adam Oest, Muhammad Saad, Antonio Emanuele Cinà, Lea Schönherr, Thorsten Holz |
| BackdoorIndicator: Leveraging OOD Data for Proactive Backdoor Detection in Federated Learning | USENIX Security '24 | Songze Li, Yanbo Dai |
| MFKDF: Multiple Factors Knocked Down Flat | USENIX Security '24 | Matteo Scarlata, Matilda Backendal, Miro Haller |
| Exploiting Leakage in Password Managers via Injection Attacks | USENIX Security '24 | Andrés Fábrega, Armin Namavari, Rachit Agarwal, Ben Nassi, Thomas Ristenpart |
| From One Thousand Pages of Specification to Unveiling Hidden Bugs: Large Language Model Assisted Fuzzing of Matter IoT Devices | USENIX Security '24 | Xiaoyue Ma, Lannan Luo, Qiang Zeng |
| Ahoy SAILR! There is No Need to DREAM of C: A Compiler-Aware Structuring Algorithm for Binary Decompilation | USENIX Security '24 | Zion Leonahenahe Basque, Ati Priya Bajaj, Wil Gibbs, Jude O'Kain, Derron Miao, Tiffany Bao, Adam Doupé, Yan Shoshitaishvili, Ruoyu Wang |
| Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs | USENIX Security '24 | Sebastian Angel, Eleftherios Ioannidis, Elizabeth Margolin, Srinath Setty, Jess Woods |
| You Cannot Escape Me: Detecting Evasions of SIEM Rules in Enterprise Networks | USENIX Security '24 | Rafael Uetz, Marco Herzog, Louis Hackländer, Simon Schwarz, Martin Henze |