| Wireless Signal Injection Attacks on VSAT Satellite Modems | USENIX Security '24 | Robin Bisping, Johannes Willbold, Martin Strohmeier, Vincent Lenders |
| Prompt Stealing Attacks Against Text-to-Image Generation Models | USENIX Security '24 | Xinyue Shen, Yiting Qu, Michael Backes, Yang Zhang |
| Trust Me If You Can – How Usable Is Trusted Types In Practice? | USENIX Security '24 | Sebastian Roth, Lea Gröber, Philipp Baus, Katharina Krombholz, Ben Stock |
| zkCross: A Novel Architecture for Cross-Chain Privacy-Preserving Auditing | USENIX Security '24 | Yihao Guo, Minghui Xu, Xiuzhen Cheng, Dongxiao Yu, Wangjie Qiu, Gang Qu, Weibing Wang, Mingming Song |
| Deciphering Textual Authenticity: A Generalized Strategy through the Lens of Large Language Semantics for Detecting Human vs. Machine-Generated Text | USENIX Security '24 | Mazal Bethany, Brandon Wherry, Emet Bethany, Nishant Vishwamitra, Anthony Rios, Peyman Najafirad |
| Moderating Illicit Online Image Promotion for Unsafe User Generated Content Games Using Large Vision-Language Models | USENIX Security '24 | Keyan Guo, Ayush Utkarsh, Wenbo Ding, Isabelle Ondracek, Ziming Zhao, Guo Freeman, Nishant Vishwamitra, Hongxin Hu |
| DEEPTYPE: Refining Indirect Call Targets with Strong Multi-layer Type Analysis | USENIX Security '24 | Tianrou Xia, Hong Hu, Dinghao Wu |
| Sprints: Intermittent Blockchain PoW Mining | USENIX Security '24 | Michael Mirkin, Lulu Zhou, Ittay Eyal, Fan Zhang |
| Pandawan: Quantifying Progress in Linux-based Firmware Rehosting | USENIX Security '24 | Ioannis Angelakopoulos, Gianluca Stringhini, Manuel Egele |
| You Can Obfuscate, but You Cannot Hide: CrossPoint Attacks against Network Topology Obfuscation | USENIX Security '24 | Xuanbo Huang, Kaiping Xue, Lutong Chen, Mingrui Ai, Huancheng Zhou, Bo Luo, Guofei Gu, Qibin Sun |
| Biosignal Authentication Considered Harmful Today | USENIX Security '24 | Veena Krish, Nicola Paoletti, Milad Kazemi, Scott Smolka, Amir Rahmati |
| ChainReactor: Automated Privilege Escalation Chain Discovery via AI Planning | USENIX Security '24 | Giulio De Pasquale, Ilya Grishchenko, Riccardo Iesari, Gabriel Pizarro, Lorenzo Cavallaro, Christopher Kruegel, Giovanni Vigna |
| Max Attestation Matters: Making Honest Parties Lose Their Incentives in Ethereum PoS | USENIX Security '24 | Mingfei Zhang, Rujia Li, Sisi Duan |
| CO3: Concolic Co-execution for Firmware | USENIX Security '24 | Changming Liu, Alejandro Mera, Engin Kirda, Meng Xu, Long Lu |
| Improving Indirect-Call Analysis in LLVM with Type and Data-Flow Co-Analysis | USENIX Security '24 | Dinghao Liu, Shouling Ji, Kangjie Lu, Qinming He |
| LR-Miner: Static Race Detection in OS Kernels by Mining Locking Rules | USENIX Security '24 | Tuo Li, Jia-Ju Bai, Gui-Dong Han, Shi-Min Hu |
| A First Physical-World Trajectory Prediction Attack via LiDAR-induced Deceptions in Autonomous Driving | USENIX Security '24 | Yang Lou, Yi Zhu, Qun Song, Rui Tan, Chunming Qiao, Wei-Bin Lee, Jianping Wang |
| The Decisive Power of Indecision: Low-Variance Risk-Limiting Audits and Election Contestation via Marginal Mark Recording | USENIX Security '24 | Benjamin Fuller, Rashmi Pai, Alexander Russell |
| GlobalConfusion: TrustZone Trusted Application 0-Days by Design | USENIX Security '24 | Marcel Busch, Philipp Mao, Mathias Payer |
| YPIR: High-Throughput Single-Server PIR with Silent Preprocessing | USENIX Security '24 | Samir Jordan Menon, David J. Wu |
| Abuse-Resistant Location Tracking: Balancing Privacy and Safety in the Offline Finding Ecosystem | USENIX Security '24 | Harry Eldridge, Gabrielle Beck, Matthew Green, Nadia Heninger, Abhishek Jain |
| I Experienced More than 10 DeFi Scams: On DeFi Users' Perception of Security Breaches and Countermeasures | USENIX Security '24 | Mingyi Liu, Jun Ho Huh, HyungSeok Han, Jaehyuk Lee, Jihae Ahn, Frank Li, Hyoungshick Kim, Taesoo Kim |
| CARDSHARK: Understanding and Stablizing Linux Kernel Concurrency Bugs Against the Odds | USENIX Security '24 | Tianshuo Han, Xiaorui Gong, Jian Liu |
| Towards Privacy and Security in Private Clouds: A Representative Survey on the Prevalence of Private Hosting and Administrator Characteristics | USENIX Security '24 | Lea Gröber, Simon Lenau, Rebecca Weil, Elena Groben, Michael Schilling, Katharina Krombholz |
| ElectionGuard: a Cryptographic Toolkit to Enable Verifiable Elections | USENIX Security '24 | Josh Benaloh, Michael Naehrig, Olivier Pereira, Dan S. Wallach |