| Divide and Surrender: Exploiting Variable Division Instruction Timing in HQC Key Recovery Attacks | USENIX Security '24 | Robin Leander Schröder, Stefan Gast, Qian Guo |
| Information Flow Control in Machine Learning through Modular Model Architecture | USENIX Security '24 | Trishita Tiwari, Suchin Gururangan, Chuan Guo, Weizhe Hua, Sanjay Kariyappa, Udit Gupta, Wenjie Xiong, Kiwan Maeng, Hsien-Hsin S. Lee, G. Edward Suh |
| Length Leakage in Oblivious Data Access Mechanisms | USENIX Security '24 | Grace Jia, Rachit Agarwal, Anurag Khandelwal |
| Formal Security Analysis of Widevine through the W3C EME Standard | USENIX Security '24 | Stéphanie Delaune, Joseph Lallemand, Gwendal Patat, Florian Roudot, Mohamed Sabt |
| Cryptographic Analysis of Delta Chat | USENIX Security '24 | Yuanming Song, Lenka Mareková, Kenneth G. Paterson |
| On Bridging the Gap between Control Flow Integrity and Attestation Schemes | USENIX Security '24 | Mahmoud Ammar, Ahmed Abdelraoof, Silviu Vlasceanu |
| Windows into the Past: Exploiting Legacy Crypto in Modern OS's Kerberos Implementation | USENIX Security '24 | Michal Shagam, Eyal Ronen |
| Privacy Side Channels in Machine Learning Systems | USENIX Security '24 | Edoardo Debenedetti, Giorgio Severi, Nicholas Carlini, Christopher A. Choquette-Choo, Matthew Jagielski, Milad Nasr, Eric Wallace, Florian Tramèr |
| Scalable Private Set Union, with Stronger Security | USENIX Security '24 | Yanxue Jia, Shi-Feng Sun, Hong-Sheng Zhou, Dawu Gu |
| DVSorder: Ballot Randomization Flaws Threaten Voter Privacy | USENIX Security '24 | Braden L. Crimmins, Dhanya Y. Narayanan, Drew Springall, J. Alex Halderman |
| Navigating the Privacy Compliance Maze: Understanding Risks with Privacy-Configurable Mobile SDKs | USENIX Security '24 | Yifan Zhang, Zhaojie Hu, Xueqiang Wang, Yuhui Hong, Yuhong Nan, XiaoFeng Wang, Jiatao Cheng, Luyi Xing |
| Devil in the Room: Triggering Audio Backdoors in the Physical World | USENIX Security '24 | Meng Chen, Xiangyu Xu, Li Lu, Zhongjie Ba, Feng Lin, Kui Ren |
| FraudWhistler: A Resilient, Robust and Plug-and-play Adversarial Example Detection Method for Speaker Recognition | USENIX Security '24 | Kun Wang, Xiangyu Xu, Li Lu, Zhongjie Ba, Feng Lin, Kui Ren |
| DaCapo: Automatic Bootstrapping Management for Efficient Fully Homomorphic Encryption | USENIX Security '24 | Seonyoung Cheon, Yongwoo Lee, Dongkwan Kim, Ju Min Lee, Sunchul Jung, Taekyung Kim, Dongyoon Lee, Hanjun Kim |
| The Unpatchables: Why Municipalities Persist in Running Vulnerable Hosts | USENIX Security '24 | Aksel Ethembabaoglu, Rolf van Wegberg, Yury Zhauniarovich, Michel van Eeten |
| Why Aren't We Using Passkeys? Obstacles Companies Face Deploying FIDO2 Passwordless Authentication | USENIX Security '24 | Leona Lassak, Elleen Pan, Blase Ur, Maximilian Golla |
| Key Recovery Attacks on Approximate Homomorphic Encryption with Non-Worst-Case Noise Flooding Countermeasures | USENIX Security '24 | Qian Guo, Denis Nabokov, Elias Suvanto, Thomas Johansson |
| PINE: Efficient Verification of a Euclidean Norm Bound of a Secret-Shared Vector | USENIX Security '24 | Guy N. Rothblum, Eran Omri, Junye Chen, Kunal Talwar |
| SoK (or SoLK?): On the Quantitative Study of Sociodemographic Factors and Computer Security Behaviors | USENIX Security '24 | Miranda Wei, Jaron Mink, Yael Eiger, Tadayoshi Kohno, Elissa M. Redmiles, Franziska Roesner |
| EaTVul: ChatGPT-based Evasion Attack Against Software Vulnerability Detection | USENIX Security '24 | Shigang Liu, Di Cao, Junae Kim, Tamas Abraham, Paul Montague, Seyit Camtepe, Jun Zhang, Yang Xiang |
| SoK: Security of Programmable Logic Controllers | USENIX Security '24 | Efrén López-Morales, Ulysse Planta, Carlos Rubio-Medrano, Ali Abbasi, Alvaro A. Cardenas |
| A Friend's Eye is A Good Mirror: Synthesizing MCU Peripheral Models from Peripheral Drivers | USENIX Security '24 | Chongqing Lei, Zhen Ling, Yue Zhang, Yan Yang, Junzhou Luo, Xinwen Fu |
| AE-Morpher: Improve Physical Robustness of Adversarial Objects against LiDAR-based Detectors via Object Reconstruction | USENIX Security '24 | Shenchen Zhu, Yue Zhao, Kai Chen, Bo Wang, Hualong Ma, Cheng'an Wei |
| Terrapin Attack: Breaking SSH Channel Integrity By Sequence Number Manipulation | USENIX Security '24 | Fabian Bäumer, Marcus Brinkmann, Jörg Schwenk |
| A Mixed-Methods Study on User Experiences and Challenges of Recovery Codes for an End-to-End Encrypted Service | USENIX Security '24 | Sandra Höltervennhoff, Noah Wöhler, Arne Möhle, Marten Oltrogge, Yasemin Acar, Oliver Wiese, Sascha Fahl |