| In Wallet We Trust: Bypassing the Digital Wallets Payment Security for Free Shopping | USENIX Security '24 | Raja Hasnain Anwar, Syed Rafiul Hussain, Muhammad Taqi Raza |
| Racing for TLS Certificate Validation: A Hijacker's Guide to the Android TLS Galaxy | USENIX Security '24 | Sajjad Pourali, Xiufen Yu, Lianying Zhao, Mohammad Mannan, Amr Youssef |
| D-Helix: A Generic Decompiler Testing Framework Using Symbolic Differentiation | USENIX Security '24 | Muqi Zou, Arslan Khan, Ruoyu Wu, Han Gao, Antonio Bianchi, Dave (Jing) Tian |
| Web Platform Threats: Automated Detection of Web Security Issues With WPT | USENIX Security '24 | Pedro Bernardo, Lorenzo Veronese, Valentino Dalla Valle, Stefano Calzavara, Marco Squarcina, Pedro Adão, Matteo Maffei |
| The Impact of Exposed Passwords on Honeyword Efficacy | USENIX Security '24 | Zonghao Huang, Lujo Bauer, Michael K. Reiter |
| AttackGNN: Red-Teaming GNNs in Hardware Security Using Reinforcement Learning | USENIX Security '24 | Vasudev Gohil, Satwik Patnaik, Dileep Kalathil, Jeyavijayan Rajendran |
| PhishDecloaker: Detecting CAPTCHA-cloaked Phishing Websites via Hybrid Vision-based Interactive Models | USENIX Security '24 | Xiwen Teoh, Yun Lin, Ruofan Liu, Zhiyong Huang, Jin Song Dong |
| BeeBox: Hardening BPF against Transient Execution Attacks | USENIX Security '24 | Di Jin, Alexander J. Gaidis, Vasileios P. Kemerlis |
| FAMOS: Robust Privacy-Preserving Authentication on Payment Apps via Federated Multi-Modal Contrastive Learning | USENIX Security '24 | Yifeng Cai, Ziqi Zhang, Jiaping Gui, Bingyan Liu, Xiaoke Zhao, Ruoyu Li, Zhe Li, Ding Li |
| SymFit: Making the Common (Concrete) Case Fast for Binary-Code Concolic Execution | USENIX Security '24 | Zhenxiao Qi, Jie Hu, Zhaoqi Xiao, Heng Yin |
| Investigating Moderation Challenges to Combating Hate and Harassment: The Case of Mod-Admin Power Dynamics and Feature Misuse on Reddit | USENIX Security '24 | Madiha Tabassum, Alana Mackey, Ashley Schuett, Ada Lerner |
| Efficient Privacy Auditing in Federated Learning | USENIX Security '24 | Hongyan Chang, Brandon Edwards, Anindya S. Paul, Reza Shokri |
| InSpectre Gadget: Inspecting the Residual Attack Surface of Cross-privilege Spectre v2 | USENIX Security '24 | Sander Wiebing, Alvise de Faveri Tron, Herbert Bos, Cristiano Giuffrida |
| Shesha: Multi-head Microarchitectural Leakage Discovery in new-generation Intel Processors | USENIX Security '24 | Anirban Chakraborty, Nimish Mishra, Debdeep Mukhopadhyay |
| BUDAlloc: Defeating Use-After-Free Bugs by Decoupling Virtual Address Management from Kernel | USENIX Security '24 | Junho Ahn, Jaehyeon Lee, Kanghyuk Lee, Wooseok Gwak, Minseong Hwang, Youngjin Kwon |
| Towards an Effective Method of ReDoS Detection for Non-backtracking Engines | USENIX Security '24 | Weihao Su, Hong Huang, Rongchen Li, Haiming Chen, Tingjian Ge |
| "Did They F***ing Consent to That?": Safer Digital Intimacy via Proactive Protection Against Image-Based Sexual Abuse | USENIX Security '24 | Lucy Qin, Vaughn Hamilton, Sharon Wang, Yigit Aydinalp, Marin Scarlett, Elissa M. Redmiles |
| Improving the Ability of Thermal Radiation Based Hardware Trojan Detection | USENIX Security '24 | Ting Su, Yaohua Wang, Shi Xu, Lusi Zhang, Simin Feng, Jialong Song, Yiming Liu, Yongkang Tang, Yang Zhang, Shaoqing Li, Yang Guo, Hengzhu Liu |
| KnowPhish: Large Language Models Meet Multimodal Knowledge Graphs for Enhancing Reference-Based Phishing Detection | USENIX Security '24 | Yuexin Li, Chengyu Huang, Shumin Deng, Mei Lin Lock, Tri Cao, Nay Oo, Hoon Wei Lim, Bryan Hooi |
| HIVE: A Hardware-assisted Isolated Execution Environment for eBPF on AArch64 | USENIX Security '24 | Peihua Zhang, Chenggang Wu, Xiangyu Meng, Yinqian Zhang, Mingfan Peng, Shiyang Zhang, Bing Hu, Mengyao Xie, Yuanming Lai, Yan Kang, Zhe Wang |
| Zero-setup Intermediate-rate Communication Guarantees in a Global Internet | USENIX Security '24 | Marc Wyss, Adrian Perrig |
| Diffie-Hellman Picture Show: Key Exchange Stories from Commercial VoWiFi Deployments | USENIX Security '24 | Gabriel K. Gegenhuber, Florian Holzbauer, Philipp É. Frenzel, Edgar Weippl, Adrian Dabrowski |
| Formal verification of the PQXDH Post-Quantum key agreement protocol for end-to-end secure messaging | USENIX Security '24 | Karthikeyan Bhargavan, Charlie Jacomme, Franziskus Kiefer, Rolfe Schmidt |
| Less Defined Knowledge and More True Alarms: Reference-based Phishing Detection without a Pre-defined Reference List | USENIX Security '24 | Ruofan Liu, Yun Lin, Xiwen Teoh, Gongshen Liu, Zhiyong Huang, Jin Song Dong |
| Endokernel: A Thread Safe Monitor for Lightweight Subprocess Isolation | USENIX Security '24 | Fangfei Yang, Bumjin Im, Weijie Huang, Kelly Kaoudis, Anjo Vahldiek-Oberwagner, Chia-Che Tsai, Nathan Dautenhahn |