| Unveiling IoT Security in Reality: A Firmware-Centric Journey | USENIX Security '24 | Nicolas Nino, Ruibo Lu, Wei Zhou, Kyu Hyung Lee, Ziming Zhao, Le Guan |
| Orbital Trust and Privacy: SoK on PKI and Location Privacy Challenges in Space Networks | USENIX Security '24 | David Koisser, Richard Mitev, Nikita Yadav, Franziska Vollmer, Ahmad-Reza Sadeghi |
| Dancer in the Dark: Synthesizing and Evaluating Polyglots for Blind Cross-Site Scripting | USENIX Security '24 | Robin Kirchner, Jonas Möller, Marius Musch, David Klein, Konrad Rieck, Martin Johns |
| Opportunistic Data Flow Integrity for Real-time Cyber-physical Systems Using Worst Case Execution Time Reservation | USENIX Security '24 | Yujie Wang, Ao Li, Jinwen Wang, Sanjoy Baruah, Ning Zhang |
| Spider-Scents: Grey-box Database-aware Web Scanning for Stored XSS | USENIX Security '24 | Eric Olsson, Benjamin Eriksson, Adam Doupé, Andrei Sabelfeld |
| Hijacking Attacks against Neural Network by Analyzing Training Data | USENIX Security '24 | Yunjie Ge, Qian Wang, Huayang Huang, Qi Li, Cong Wang, Chao Shen, Lingchen Zhao, Peipei Jiang, Zheng Fang, Shenyi Zhang |
| How Does a Deep Learning Model Architecture Impact Its Privacy? A Comprehensive Study of Privacy Attacks on CNNs and Transformers | USENIX Security '24 | Guangsheng Zhang, Bo Liu, Huan Tian, Tianqing Zhu, Ming Ding, Wanlei Zhou |
| False Claims against Model Ownership Resolution | USENIX Security '24 | Jian Liu, Rui Zhang, Sebastian Szyller, Kui Ren, N. Asokan |
| VOGUES: Validation of Object Guise using Estimated Components | USENIX Security '24 | Raymond Muller, Yanmao Man, Ming Li, Ryan Gerdes, Jonathan Petit, Z. Berkay Celik |
| With Great Power Come Great Side Channels: Statistical Timing Side-Channel Analyses with Bounded Type-1 Errors | USENIX Security '24 | Martin Dunsche, Marcel Maehren, Nurullah Erinola, Robert Merget, Nicolai Bissantz, Juraj Somorovsky, Jörg Schwenk |
| Enabling Developers, Protecting Users: Investigating Harassment and Safety in VR | USENIX Security '24 | Abhinaya S.B., Aafaq Sabir, Anupam Das |
| FaceObfuscator: Defending Deep Learning-based Privacy Attacks with Gradient Descent-resistant Features in Face Recognition | USENIX Security '24 | Shuaifan Jin, He Wang, Zhibo Wang, Feng Xiao, Jiahui Hu, Yuan He, Wenwen Zhang, Zhongjie Ba, Weijie Fang, Shuhong Yuan, Kui Ren |
| ENG25519: Faster TLS 1.3 handshake using optimized X25519 and Ed25519 | USENIX Security '24 | Jipeng Zhang, Junhao Huang, Lirui Zhao, Donglong Chen, Çetin Kaya Koç |
| "These results must be false": A usability evaluation of constant-time analysis tools | USENIX Security '24 | Marcel Fourné, Daniel De Almeida Braga, Jan Jancar, Mohamed Sabt, Peter Schwabe, Gilles Barthe, Pierre-Alain Fouque, Yasemin Acar |
| Unbalanced Circuit-PSI from Oblivious Key-Value Retrieval | USENIX Security '24 | Meng Hao, Weiran Liu, Liqiang Peng, Hongwei Li, Cong Zhang, Hanxiao Chen, Tianwei Zhang |
| Being Transparent is Merely the Beginning: Enforcing Purpose Limitation with Polynomial Approximation | USENIX Security '24 | Shuofeng Liu, Zihan Wang, Minhui Xue, Long Wang, Yuanchao Zhang, Guangdong Bai |
| Adversary is on the Road: Attacks on Visual SLAM using Unnoticeable Adversarial Patch | USENIX Security '24 | Baodong Chen, Wei Wang, Pascal Sikorski, Ting Zhu |
| SAIN: Improving ICS Attack Detection Sensitivity via State-Aware Invariants | USENIX Security '24 | Syed Ghazanfar Abbas, Muslum Ozgur Ozmen, Abdulellah Alsaheel, Arslan Khan, Z. Berkay Celik, Dongyan Xu |
| SSRF vs. Developers: A Study of SSRF-Defenses in PHP Applications | USENIX Security '24 | Malte Wessels, Simon Koch, Giancarlo Pellegrino, Martin Johns |
| Argus: All your (PHP) Injection-sinks are belong to us. | USENIX Security '24 | Rasoul Jahanshahi, Manuel Egele |
| PEPSI: Practically Efficient Private Set Intersection in the Unbalanced Setting | USENIX Security '24 | Rasoul Akhavan Mahdavi, Nils Lukas, Faezeh Ebrahimianghazani, Thomas Humphries, Bailey Kacsmar, John Premkumar, Xinda Li, Simon Oya, Ehsan Amjadian, Florian Kerschbaum |
| Reconstructing training data from document understanding models | USENIX Security '24 | Jérémie Dentan, Arnaud Paran, Aymen Shabou |
| Demystifying the Security Implications in IoT Device Rental Services | USENIX Security '24 | Yi He, Yunchao Guan, Ruoyu Lun, Shangru Song, Zhihao Guo, Jianwei Zhuge, Jianjun Chen, Qiang Wei, Zehui Wu, Miao Yu, Hetian Shi, Qi Li |
| O-Ring and K-Star: Efficient Multi-party Private Set Intersection | USENIX Security '24 | Mingli Wu, Tsz Hon Yuen, Kwan Yin Chan |
| Landscape More Secure Than Portrait? Zooming Into the Directionality of Digital Images With Security Implications | USENIX Security '24 | Benedikt Lorch, Rainer Böhme |