| Tickets or Privacy? Understand the Ecosystem of Chinese Ticket Grabbing Apps | USENIX Security '24 | Yijing Liu, Yiming Zhang, Baojun Liu, Haixin Duan, Qiang Li, Mingxuan Liu, Ruixuan Li, Jia Yao |
| GridSE: Towards Practical Secure Geographic Search via Prefix Symmetric Searchable Encryption | USENIX Security '24 | Ruoyang Guo, Jiarui Li, Shucheng Yu |
| Co-Designing a Mobile App for Bystander Privacy Protection in Jordanian Smart Homes: A Step Towards Addressing a Complex Privacy Landscape | USENIX Security '24 | Wael Albayaydh, Ivan Flechais |
| "I really just leaned on my community for support": Barriers, Challenges, and Coping Mechanisms Used by Survivors of Technology-Facilitated Abuse to Seek Social Support | USENIX Security '24 | Naman Gupta, Kate Walsh, Sanchari Das, Rahul Chatterjee |
| Enhancing Network Attack Detection with Distributed and In-Network Data Collection System | USENIX Security '24 | Seyed Mohammad Mehdi Mirnajafizadeh, Ashwin Raam Sethuram, David Mohaisen, DaeHun Nyang, Rhongho Jang |
| On Data Fabrication in Collaborative Vehicular Perception: Attacks and Countermeasures | USENIX Security '24 | Qingzhao Zhang, Shuowei Jin, Ruiyang Zhu, Jiachen Sun, Xumiao Zhang, Qi Alfred Chen, Z. Morley Mao |
| RECORD: A RECeption-Only Region Determination Attack on LEO Satellite Users | USENIX Security '24 | Eric Jedermann, Martin Strohmeier, Vincent Lenders, Jens Schmitt |
| FFXE: Dynamic Control Flow Graph Recovery for Embedded Firmware Binaries | USENIX Security '24 | Ryan Tsang, Asmita, Doreen Joseph, Soheil Salehi, Prasant Mohapatra, Houman Homayoun |
| Your Firmware Has Arrived: A Study of Firmware Update Vulnerabilities | USENIX Security '24 | Yuhao Wu, Jinwen Wang, Yujie Wang, Shixuan Zhai, Zihan Li, Yi He, Kun Sun, Qi Li, Ning Zhang |
| Security and Privacy Analysis of Samsung's Crowd-Sourced Bluetooth Location Tracking System | USENIX Security '24 | Tingfeng Yu, James Henderson, Alwen Tiu, Thomas Haines |
| A High Coverage Cybersecurity Scale Predictive of User Behavior | USENIX Security '24 | Yukiko Sawaya, Sarah Lu, Takamasa Isohara, Mahmood Sharif |
| Quantifying Privacy Risks of Prompts in Visual Prompt Learning | USENIX Security '24 | Yixin Wu, Rui Wen, Michael Backes, Pascal Berrang, Mathias Humbert, Yun Shen, Yang Zhang |
| Is It a Trap? A Large-scale Empirical Study And Comprehensive Assessment of Online Automated Privacy Policy Generators for Mobile Apps | USENIX Security '24 | Shidong Pan, Dawen Zhang, Mark Staples, Zhenchang Xing, Jieshan Chen, Xiwei Xu, Thong Hoang |
| Batch PIR and Labeled PSI with Oblivious Ciphertext Compression | USENIX Security '24 | Alexander Bienstock, Sarvar Patel, Joon Young Seo, Kevin Yeo |
| CAMP: Compositional Amplification Attacks against DNS | USENIX Security '24 | Huayi Duan, Marco Bearzi, Jodok Vieli, David Basin, Adrian Perrig, Si Liu, Bernhard Tellenbach |
| PointerGuess: Targeted Password Guessing Model Using Pointer Mechanism | USENIX Security '24 | Kedong Xiu, Ding Wang |
| "I just hated it and I want my money back": Data-driven Understanding of Mobile VPN Service Switching Preferences in The Wild | USENIX Security '24 | Rohit Raj, Mridul Newar, Mainack Mondal |
| iHunter: Hunting Privacy Violations at Scale in the Software Supply Chain on iOS | USENIX Security '24 | Dexin Liu, Yue Xiao, Chaoqi Zhang, Kaitao Xie, Xiaolong Bai, Shikun Zhang, Luyi Xing |
| CDN Cannon: Exploiting CDN Back-to-Origin Strategies for Amplification Attacks | USENIX Security '24 | Ziyu Lin, Zhiwei Lin, Ximeng Liu, Jianjun Chen, Run Guo, Cheng Chen, Shaodong Xiao |
| Single Pass Client-Preprocessing Private Information Retrieval | USENIX Security '24 | Arthur Lazzaretti, Charalampos Papamanthou |
| GhostRace: Exploiting and Mitigating Speculative Race Conditions | USENIX Security '24 | Hany Ragab, Andrea Mambretti, Anil Kurmus, Cristiano Giuffrida |
| A NEW HOPE: Contextual Privacy Policies for Mobile Applications and An Approach Toward Automated Generation | USENIX Security '24 | Shidong Pan, Zhen Tao, Thong Hoang, Dawen Zhang, Tianshi Li, Zhenchang Xing, Xiwei Xu, Mark Staples, Thierry Rakotoarivelo, David Lo |
| Abandon All Hope Ye Who Enter Here: A Dynamic, Longitudinal Investigation of Android's Data Safety Section | USENIX Security '24 | Ioannis Arkalakis, Michalis Diamantaris, Serafeim Moustakas, Sotiris Ioannidis, Jason Polakis, Panagiotis Ilia |
| Pixel+ and Pixel++: Compact and Efficient Forward-Secure Multi-Signatures for PoS Blockchain Consensus | USENIX Security '24 | Jianghong Wei, Guohua Tian, Ding Wang, Fuchun Guo, Willy Susilo, Xiaofeng Chen |
| When Threads Meet Interrupts: Effective Static Detection of Interrupt-Based Deadlocks in Linux | USENIX Security '24 | Chengfeng Ye, Yuandao Cai, Charles Zhang |