| Optimizing Shoulder-Surfing Resistance in Augmented and Virtual Reality: A Replication Study Proposal in the US | SOUPS 2023 | |
| De-identification in practice: professionals as end users | SOUPS 2023 | |
| Lightning Talks | SREcon23 Americas | |
| Accelerating Secure Collaborative Machine Learning with Protocol-Aware RDMA | USENIX Security '24 | Zhenghang Ren, Mingxuan Fan, Zilong Wang, Junxue Zhang, Chaoliang Zeng, Zhicong Huang, Cheng Hong, Kai Chen |
| ABACuS: All-Bank Activation Counters for Scalable and Low Overhead RowHammer Mitigation | USENIX Security '24 | Ataberk Olgun, Yahya Can Tugrul, Nisa Bostanci, Ismail Emir Yuksel, Haocong Luo, Steve Rhyner, Abdullah Giray Yaglikci, Geraldo F. Oliveira, Onur Mutlu |
| On Data Fabrication in Collaborative Vehicular Perception: Attacks and Countermeasures | USENIX Security '24 | Qingzhao Zhang, Shuowei Jin, Ruiyang Zhu, Jiachen Sun, Xumiao Zhang, Qi Alfred Chen, Z. Morley Mao |
| Understanding the Security and Privacy Implications of Online Toxic Content on Refugees | USENIX Security '24 | Arjun Arunasalam, Habiba Farrukh, Eliz Tekcan, Z. Berkay Celik |
| Automated Large-Scale Analysis of Cookie Notice Compliance | USENIX Security '24 | Ahmed Bouhoula, Karel Kubicek, Amit Zac, Carlos Cotrini, David Basin |
| You Cannot Escape Me: Detecting Evasions of SIEM Rules in Enterprise Networks | USENIX Security '24 | Rafael Uetz, Marco Herzog, Louis Hackländer, Simon Schwarz, Martin Henze |
| Can Virtual Reality Protect Users from Keystroke Inference Attacks? | USENIX Security '24 | Zhuolin Yang, Zain Sarwar, Iris Hwang, Ronik Bhaskar, Ben Y. Zhao, Haitao Zheng |
| Neural Network Semantic Backdoor Detection and Mitigation: A Causality-Based Approach | USENIX Security '24 | Bing Sun, Jun Sun, Wayne Koh, Jie Shi |
| Finding Traceability Attacks in the Bluetooth Low Energy Specification and Its Implementations | USENIX Security '24 | Jianliang Wu, Patrick Traynor, Dongyan Xu, Dave (Jing) Tian, Antonio Bianchi |
| Devil in the Room: Triggering Audio Backdoors in the Physical World | USENIX Security '24 | Meng Chen, Xiangyu Xu, Li Lu, Zhongjie Ba, Feng Lin, Kui Ren |
| Atropos: Effective Fuzzing of Web Applications for Server-Side Vulnerabilities | USENIX Security '24 | Emre Güler, Sergej Schumilo, Moritz Schloegel, Nils Bars, Philipp Görz, Xinyi Xu, Cemal Kaygusuz, Thorsten Holz |
| FraudWhistler: A Resilient, Robust and Plug-and-play Adversarial Example Detection Method for Speaker Recognition | USENIX Security '24 | Kun Wang, Xiangyu Xu, Li Lu, Zhongjie Ba, Feng Lin, Kui Ren |
| Swipe Left for Identity Theft: An Analysis of User Data Privacy Risks on Location-based Dating Apps | USENIX Security '24 | Karel Dhondt, Victor Le Pochat, Yana Dimova, Wouter Joosen, Stijn Volckaert |
| Dancer in the Dark: Synthesizing and Evaluating Polyglots for Blind Cross-Site Scripting | USENIX Security '24 | Robin Kirchner, Jonas Möller, Marius Musch, David Klein, Konrad Rieck, Martin Johns |
| ResolverFuzz: Automated Discovery of DNS Resolver Vulnerabilities with Query-Response Fuzzing | USENIX Security '24 | Qifan Zhang, Xuesong Bai, Xiang Li, Haixin Duan, Qi Li, Zhou Li |
| Ahoy SAILR! There is No Need to DREAM of C: A Compiler-Aware Structuring Algorithm for Binary Decompilation | USENIX Security '24 | Zion Leonahenahe Basque, Ati Priya Bajaj, Wil Gibbs, Jude O'Kain, Derron Miao, Tiffany Bao, Adam Doupé, Yan Shoshitaishvili, Ruoyu Wang |
| Racing on the Negative Force: Efficient Vulnerability Root-Cause Analysis through Reinforcement Learning on Counterexamples | USENIX Security '24 | Dandan Xu, Di Tang, Yi Chen, XiaoFeng Wang, Kai Chen, Haixu Tang, Longxing Li |
| WEBRR: A Forensic System for Replaying and Investigating Web-Based Attacks in The Modern Web | USENIX Security '24 | Joey Allen, Zheng Yang, Feng Xiao, Matthew Landen, Roberto Perdisci, Wenke Lee |
| Unleashing the Power of Type-Based Call Graph Construction by Using Regional Pointer Information | USENIX Security '24 | Yuandao Cai, Yibo Jin, Charles Zhang |
| The Effect of Design Patterns on (Present and Future) Cookie Consent Decisions | USENIX Security '24 | Nataliia Bielova, Laura Litvine, Anysia Nguyen, Mariam Chammat, Vincent Toubiana, Estelle Hary |
| RECORD: A RECeption-Only Region Determination Attack on LEO Satellite Users | USENIX Security '24 | Eric Jedermann, Martin Strohmeier, Vincent Lenders, Jens Schmitt |
| A Taxonomy of C Decompiler Fidelity Issues | USENIX Security '24 | Luke Dramko, Jeremy Lacomis, Edward J. Schwartz, Bogdan Vasilescu, Claire Le Goues |