| Double Face: Leveraging User Intelligence to Characterize and Recognize AI-synthesized Faces | USENIX Security '24 | Matthew Joslin, Xian Wang, Shuang Hao |
| Take a Step Further: Understanding Page Spray in Linux Kernel Exploitation | USENIX Security '24 | Ziyi Guo, Dang K Le, Zhenpeng Lin, Kyle Zeng, Ruoyu Wang, Tiffany Bao, Yan Shoshitaishvili, Adam Doupé, Xinyu Xing |
| Can I Hear Your Face? Pervasive Attack on Voice Authentication Systems with a Single Face Image | USENIX Security '24 | Nan Jiang, Bangjie Sun, Terence Sim, Jun Han |
| LanDscAPe: Exploring LDAP Weaknesses and Data Leaks at Internet Scale | USENIX Security '24 | Jonas Kaspereit, Gurur Öndarö, Gustavo Luvizotto Cesar, Simon Ebbers, Fabian Ising, Christoph Saatjohann, Mattijs Jonker, Ralph Holz, Sebastian Schinzel |
| Bending microarchitectural weird machines towards practicality | USENIX Security '24 | Ping-Lun Wang, Riccardo Paccagnella, Riad S. Wahby, Fraser Brown |
| FakeBehalf: Imperceptible Email Spoofing Attacks against the Delegation Mechanism in Email Systems | USENIX Security '24 | Jinrui Ma, Lutong Chen, Kaiping Xue, Bo Luo, Xuanbo Huang, Mingrui Ai, Huanjie Zhang, David S.L. Wei, Yan Zhuang |
| Forget and Rewire: Enhancing the Resilience of Transformer-based Models against Bit-Flip Attacks | USENIX Security '24 | Najmeh Nazari, Hosein Mohammadi Makrani, Chongzhou Fang, Hossein Sayadi, Setareh Rafatirad, Khaled N. Khasawneh, Houman Homayoun |
| ABACuS: All-Bank Activation Counters for Scalable and Low Overhead RowHammer Mitigation | USENIX Security '24 | Ataberk Olgun, Yahya Can Tugrul, Nisa Bostanci, Ismail Emir Yuksel, Haocong Luo, Steve Rhyner, Abdullah Giray Yaglikci, Geraldo F. Oliveira, Onur Mutlu |
| Automated Large-Scale Analysis of Cookie Notice Compliance | USENIX Security '24 | Ahmed Bouhoula, Karel Kubicek, Amit Zac, Carlos Cotrini, David Basin |
| WEBRR: A Forensic System for Replaying and Investigating Web-Based Attacks in The Modern Web | USENIX Security '24 | Joey Allen, Zheng Yang, Feng Xiao, Matthew Landen, Roberto Perdisci, Wenke Lee |
| Go Go Gadget Hammer: Flipping Nested Pointers for Arbitrary Data Leakage | USENIX Security '24 | Youssef Tobah, Andrew Kwong, Ingab Kang, Daniel Genkin, Kang G. Shin |
| Two Shuffles Make a RAM: Improved Constant Overhead Zero Knowledge RAM | USENIX Security '24 | Yibin Yang, David Heath |
| Scalable Multi-Party Computation Protocols for Machine Learning in the Honest-Majority Setting | USENIX Security '24 | |
| Code is not Natural Language: Unlock the Power of Semantics-Oriented Graph Representation for Binary Code Similarity Detection | USENIX Security '24 | Haojie He, Xingwei Lin, Ziang Weng, Ruijie Zhao, Shuitao Gan, Libo Chen, Yuede Ji, Jiashui Wang, Zhi Xue |
| SledgeHammer: Amplifying Rowhammer via Bank-level Parallelism | USENIX Security '24 | Ingab Kang, Walter Wang, Jason Kim, Stephan van Schaik, Youssef Tobah, Daniel Genkin, Andrew Kwong, Yuval Yarom |
| Practical Security Analysis of Zero-Knowledge Proof Circuits | USENIX Security '24 | Hongbo Wen, Jon Stephens, Yanju Chen, Kostas Ferles, Shankara Pailoor, Kyle Charbonnet, Isil Dillig, Yu Feng |
| AI Psychiatry: Forensic Investigation of Deep Learning Networks in Memory Images | USENIX Security '24 | David Oygenblik, Carter Yagemann, Joseph Zhang, Arianna Mastali, Jeman Park, Brendan Saltaformaggio |
| Don't Waste My Efforts: Pruning Redundant Sanitizer Checks by Developer-Implemented Type Checks | USENIX Security '24 | Yizhuo Zhai, Zhiyun Qian, Chengyu Song, Manu Sridharan, Trent Jaeger, Paul Yu, Srikanth V. Krishnamurthy |
| Formalizing Soundness Proofs of Linear PCP SNARKs | USENIX Security '24 | Bolton Bailey, Andrew Miller |
| Inference of Error Specifications and Bug Detection Using Structural Similarities | USENIX Security '24 | Niels Dossche, Bart Coppens |
| Notus: Dynamic Proofs of Liabilities from Zero-knowledge RSA Accumulators | USENIX Security '24 | Jiajun Xin, Arman Haghighi, Xiangan Tian, Dimitrios Papadopoulos |
| A Binary-level Thread Sanitizer or Why Sanitizing on the Binary Level is Hard | USENIX Security '24 | Joschua Schilling, Andreas Wendler, Philipp Görz, Nils Bars, Moritz Schloegel, Thorsten Holz |
| ZenHammer: Rowhammer Attacks on AMD Zen-based Platforms | USENIX Security '24 | Patrick Jattke, Max Wipfli, Flavien Solt, Michele Marazzi, Matej Bölcskei, Kaveh Razavi |
| DARKFLEECE: Probing the Dark Side of Android Subscription Apps | USENIX Security '24 | Chang Yue, Chen Zhong, Kai Chen, Zhiyu Zhang, Yeonjoon Lee |
| 00SEVen – Re-enabling Virtual Machine Forensics: Introspecting Confidential VMs Using Privileged in-VM Agents | USENIX Security '24 | Fabian Schwarz, Christian Rossow |