| Swipe Left for Identity Theft: An Analysis of User Data Privacy Risks on Location-based Dating Apps | USENIX Security '24 | Karel Dhondt, Victor Le Pochat, Yana Dimova, Wouter Joosen, Stijn Volckaert |
| "Belt and suspenders" or "just red tape"?: Investigating Early Artifacts and User Perceptions of IoT App Security Certification | USENIX Security '24 | Prianka Mandal, Amit Seal Ami, Victor Olaiya, Sayyed Hadi Razmjo, Adwait Nadkarni |
| MAGIC: Detecting Advanced Persistent Threats via Masked Graph Representation Learning | USENIX Security '24 | Zian Jia, Yun Xiong, Yuhong Nan, Yao Zhang, Jinjing Zhao, Mi Wen |
| "I Don't Know If We're Doing Good. I Don't Know If We're Doing Bad": Investigating How Practitioners Scope, Motivate, and Conduct Privacy Work When Developing AI Products | USENIX Security '24 | Hao-Ping (Hank) Lee, Lan Gao, Stephanie Yang, Jodi Forlizzi, Sauvik Das |
| Voice App Developer Experiences with Alexa and Google Assistant: Juggling Risks, Liability, and Security | USENIX Security '24 | William Seymour, Noura Abdi, Kopo M. Ramokapane, Jide Edu, Guillermo Suarez-Tangil, Jose Such |
| Cascade: CPU Fuzzing via Intricate Program Generation | USENIX Security '24 | Flavien Solt, Katharina Ceesay-Seitz, Kaveh Razavi |
| ModelGuard: Information-Theoretic Defense Against Model Extraction Attacks | USENIX Security '24 | Minxue Tang, Anna Dai, Louis DiValentin, Aolin Ding, Amin Hass, Neil Zhenqiang Gong, Yiran Chen, Hai "Helen" Li |
| Unveiling the Secrets without Data: Can Graph Neural Networks Be Exploited through Data-Free Model Extraction Attacks? | USENIX Security '24 | Yuanxin Zhuang, Chuan Shi, Mengmei Zhang, Jinghui Chen, Lingjuan Lyu, Pan Zhou, Lichao Sun |
| ATTention Please! An Investigation of the App Tracking Transparency Permission | USENIX Security '24 | Reham Mohamed, Arjun Arunasalam, Habiba Farrukh, Jason Tong, Antonio Bianchi, Z. Berkay Celik |
| SHiFT: Semi-hosted Fuzz Testing for Embedded Applications | USENIX Security '24 | Alejandro Mera, Changming Liu, Ruimin Sun, Engin Kirda, Long Lu |
| Learning with Semantics: Towards a Semantics-Aware Routing Anomaly Detection System | USENIX Security '24 | Yihao Chen, Qilei Yin, Qi Li, Zhuotao Liu, Ke Xu, Yi Xu, Mingwei Xu, Ziqian Liu, Jianping Wu |
| EL3XIR: Fuzzing COTS Secure Monitors | USENIX Security '24 | Christian Lindenmeier, Mathias Payer, Marcel Busch |
| MultiFuzz: A Multi-Stream Fuzzer For Testing Monolithic Firmware | USENIX Security '24 | Michael Chesser, Surya Nepal, Damith C. Ranasinghe |
| "There are rabbit holes I want to go down that I'm not allowed to go down": An Investigation of Security Expert Threat Modeling Practices for Medical Devices | USENIX Security '24 | Ronald E. Thompson, Madline McLaughlin, Carson Powers, Daniel Votipka |
| Towards More Practical Threat Models in Artificial Intelligence Security | USENIX Security '24 | Kathrin Grosse, Lukas Bieringer, Tarek R. Besold, Alexandre M. Alahi |
| From the Childhood Past: Views of Young Adults on Parental Sharing of Children's Photos | USENIX Security '24 | Tania Ghafourian, Nicholas Micallef, Sameer Patil |
| WhisperFuzz: White-Box Fuzzing for Detecting and Locating Timing Vulnerabilities in Processors | USENIX Security '24 | Pallavi Borkar, Chen Chen, Mohamadreza Rostami, Nikhilesh Singh, Rahul Kande, Ahmad-Reza Sadeghi, Chester Rebeiro, Jeyavijayan Rajendran |
| CellularLint: A Systematic Approach to Identify Inconsistent Behavior in Cellular Network Specifications | USENIX Security '24 | Mirza Masfiqur Rahman, Imtiaz Karim, Elisa Bertino |
| Spill the TeA: An Empirical Study of Trusted Application Rollback Prevention on Android Smartphones | USENIX Security '24 | Marcel Busch, Philipp Mao, Mathias Payer |
| A Decade of Privacy-Relevant Android App Reviews: Large Scale Trends | USENIX Security '24 | Omer Akgul, Sai Teja Peddinti, Nina Taft, Michelle L. Mazurek, Hamza Harkous, Animesh Srivastava, Benoit Seguin |
| PIXELMOD: Improving Soft Moderation of Visual Misleading Information on Twitter | USENIX Security '24 | Pujan Paudel, Chen Ling, Jeremy Blackburn, Gianluca Stringhini |
| DeepEclipse: How to Break White-Box DNN-Watermarking Schemes | USENIX Security '24 | Alessandro Pegoraro, Carlotta Segna, Kavita Kumari, Ahmad-Reza Sadeghi |
| SoK: All You Need to Know About On-Device ML Model Extraction - The Gap Between Research and Practice | USENIX Security '24 | Tushar Nayan, Qiming Guo, Mohammed Al Duniawi, Marcus Botacin, Selcuk Uluagac, Ruimin Sun |
| ClearStamp: A Human-Visible and Robust Model-Ownership Proof based on Transposed Model Training | USENIX Security '24 | Torsten Krauß, Jasper Stang, Alexandra Dmitrienko |
| TAPFixer: Automatic Detection and Repair of Home Automation Vulnerabilities based on Negated-property Reasoning | USENIX Security '24 | Yinbo Yu, Yuanqi Xu, Kepu Huang, Jiajia Liu |