| INSIGHT: Attacking Industry-Adopted Learning Resilient Logic Locking Techniques Using Explainable Graph Neural Network | USENIX Security '24 | Lakshmi Likhitha Mankali, Ozgur Sinanoglu, Satwik Patnaik |
| A World Where We Trust Hard-Won Lessons in Security Research, Technology, and People | USENIX Security '24 | David Brumley |
| Unleashing the Power of Type-Based Call Graph Construction by Using Regional Pointer Information | USENIX Security '24 | Yuandao Cai, Yibo Jin, Charles Zhang |
| Less is More: Revisiting the Gaussian Mechanism for Differential Privacy | USENIX Security '24 | Tianxi Ji, Pan Li |
| What IF Is Not Enough? Fixing Null Pointer Dereference With Contextual Check | USENIX Security '24 | Yunlong Xing, Shu Wang, Shiyu Sun, Xu He, Kun Sun, Qi Li |
| CacheWarp: Software-based Fault Injection using Selective State Reset | USENIX Security '24 | Ruiyi Zhang, Lukas Gerlach, Daniel Weber, Lorenz Hetterich, Youheng Lü, Andreas Kogler, Michael Schwarz |
| Yes, One-Bit-Flip Matters! Universal DNN Model Inference Depletion with Runtime Code Fault Injection | USENIX Security '24 | Shaofeng Li, Xinyu Wang, Minhui Xue, Haojin Zhu, Zhi Zhang, Yansong Gao, Wen Wu, Xuemin (Sherman) Shen |
| Tossing in the Dark: Practical Bit-Flipping on Gray-box Deep Neural Networks for Runtime Trojan Injection | USENIX Security '24 | Zihao Wang, Di Tang, XiaoFeng Wang, Wei He, Zhaoyang Geng, Wenhao Wang |
| Towards Generic Database Management System Fuzzing | USENIX Security '24 | Yupeng Yang, Yongheng Chen, Rui Zhong, Jizhou Chen, Wenke Lee |
| DNN-GP: Diagnosing and Mitigating Model's Faults Using Latent Concepts | USENIX Security '24 | Shuo Wang, Hongsheng Hu, Jiamin Chang, Benjamin Zi Hao Zhao, Qi Alfred Chen, Minhui Xue |
| Relation Mining Under Local Differential Privacy | USENIX Security '24 | Kai Dong, Zheng Zhang, Chuang Jia, Zhen Ling, Ming Yang, Junzhou Luo, Xinwen Fu |
| Rethinking the Security Threats of Stale DNS Glue Records | USENIX Security '24 | Yunyi Zhang, Baojun Liu, Haixin Duan, Min Zhang, Xiang Li, Fan Shi, Chengxi Xu, Eihal Alowaisheq |
| HYPERPILL: Fuzzing for Hypervisor-bugs by Leveraging the Hardware Virtualization Interface | USENIX Security '24 | Alexander Bulekov, Qiang Liu, Manuel Egele, Mathias Payer |
| DPAdapter: Improving Differentially Private Deep Learning through Noise Tolerance Pre-training | USENIX Security '24 | Zihao Wang, Rui Zhu, Dongruo Zhou, Zhikun Zhang, John Mitchell, Haixu Tang, XiaoFeng Wang |
| EVOKE: Efficient Revocation of Verifiable Credentials in IoT Networks | USENIX Security '24 | Carlo Mazzocca, Abbas Acar, Selcuk Uluagac, Rebecca Montanari |
| Fuzzing BusyBox: Leveraging LLM and Crash Reuse for Embedded Bug Unearthing | USENIX Security '24 | Asmita, Yaroslav Oliinyk, Michael Scott, Ryan Tsang, Chongzhou Fang, Houman Homayoun |
| Practical Data-Only Attack Generation | USENIX Security '24 | Brian Johannesmeyer, Asia Slowinska, Herbert Bos, Cristiano Giuffrida |
| dp-promise: Differentially Private Diffusion Probabilistic Models for Image Synthesis | USENIX Security '24 | Haichen Wang, Shuchao Pang, Zhigang Lu, Yihang Rao, Yongbin Zhou, Minhui Xue |
| GoFetch: Breaking Constant-Time Cryptographic Implementations Using Data Memory-Dependent Prefetchers | USENIX Security '24 | Boru Chen, Yingchen Wang, Pradyumna Shome, Christopher Fletcher, David Kohlbrenner, Riccardo Paccagnella, Daniel Genkin |
| SafeFetch: Practical Double-Fetch Protection with Kernel-Fetch Caching | USENIX Security '24 | Victor Duta, Mitchel Josephus Aloserij, Cristiano Giuffrida |
| SoK: The Good, The Bad, and The Unbalanced: Measuring Structural Limitations of Deepfake Media Datasets | USENIX Security '24 | Seth Layton, Tyler Tucker, Daniel Olszewski, Kevin Warren, Kevin Butler, Patrick Traynor |
| SeaK: Rethinking the Design of a Secure Allocator for OS Kernel | USENIX Security '24 | Zicheng Wang, Yicheng Guang, Yueqi Chen, Zhenpeng Lin, Michael Le, Dang K Le, Dan Williams, Xinyu Xing, Zhongshu Gu, Hani Jamjoom |
| Gradients Look Alike: Sensitivity is Often Overestimated in DP-SGD | USENIX Security '24 | Anvith Thudi, Hengrui Jia, Casey Meehan, Ilia Shumailov, Nicolas Papernot |
| MOAT: Towards Safe BPF Kernel Extension | USENIX Security '24 | Hongyi Lu, Shuai Wang, Yechang Wu, Wanning He, Fengwei Zhang |
| DMAAUTH: A Lightweight Pointer Integrity-based Secure Architecture to Defeat DMA Attacks | USENIX Security '24 | Xingkai Wang, Wenbo Shen, Yujie Bu, Jinmeng Zhou, Yajin Zhou |