| Formalizing and Benchmarking Prompt Injection Attacks and Defenses | USENIX Security '24 | Yupei Liu, Yuqi Jia, Runpeng Geng, Jinyuan Jia, Neil Zhenqiang Gong |
| Cost-effective Attack Forensics by Recording and Correlating File System Changes | USENIX Security '24 | Le Yu, Yapeng Ye, Zhuo Zhang, Xiangyu Zhang |
| True Attacks, Attack Attempts, or Benign Triggers? An Empirical Measurement of Network Alerts in a Security Operations Center | USENIX Security '24 | Limin Yang, Zhi Chen, Chenkai Wang, Zhenning Zhang, Sushruth Booma, Phuong Cao, Constantin Adam, Alexander Withers, Zbigniew Kalbarczyk, Ravishankar K. Iyer, Gang Wang |
| Secure Account Recovery for a Privacy-Preserving Web Service | USENIX Security '24 | |
| REMARK-LLM: A Robust and Efficient Watermarking Framework for Generative Large Language Models | USENIX Security '24 | Ruisi Zhang, Shehzeen Samarah Hussain, Paarth Neekhara, Farinaz Koushanfar |
| Detecting and Mitigating Sampling Bias in Cybersecurity with Unlabeled Data | USENIX Security '24 | Saravanan Thirumuruganathan, Fatih Deniz, Issa Khalil, Ting Yu, Mohamed Nabeel, Mourad Ouzzani |
| Into the Dark: Unveiling Internal Site Search Abused for Black Hat SEO | USENIX Security '24 | Yunyi Zhang, Mingxuan Liu, Baojun Liu, Yiming Zhang, Haixin Duan, Min Zhang, Hui Jiang, Yanzhe Li, Fan Shi |
| Guardians of the Galaxy: Content Moderation in the InterPlanetary File System | USENIX Security '24 | Saidu Sokoto, Leonhard Balduf, Dennis Trautwein, Yiluo Wei, Gareth Tyson, Ignacio Castro, Onur Ascigil, George Pavlou, Maciej Korczyński, Björn Scheuermann, Michał Król |
| VulSim: Leveraging Similarity of Multi-Dimensional Neighbor Embeddings for Vulnerability Detection | USENIX Security '24 | Samiha Shimmi, Ashiqur Rahman, Mohan Gadde, Hamed Okhravi, Mona Rahimi |
| Holding Secrets Accountable: Auditing Privacy-Preserving Machine Learning | USENIX Security '24 | |
| ORANalyst: Systematic Testing Framework for Open RAN Implementations | USENIX Security '24 | Tianchang Yang, Syed Md Mukit Rashid, Ali Ranjbar, Gang Tan, Syed Rafiul Hussain |
| FIRE: Combining Multi-Stage Filtering with Taint Analysis for Scalable Recurring Vulnerability Detection | USENIX Security '24 | Siyue Feng, Yueming Wu, Wenjie Xue, Sikui Pan, Deqing Zou, Yang Liu, Hai Jin |
| Instruction Backdoor Attacks Against Customized LLMs | USENIX Security '24 | Rui Zhang, Hongwei Li, Rui Wen, Wenbo Jiang, Yuan Zhang, Michael Backes, Yun Shen, Yang Zhang |
| An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities against Strong Detection | USENIX Security '24 | Shenao Yan, Shen Wang, Yue Duan, Hanbin Hong, Kiho Lee, Doowon Kim, Yuan Hong |
| Accelerating Secure Collaborative Machine Learning with Protocol-Aware RDMA | USENIX Security '24 | Zhenghang Ren, Mingxuan Fan, Zilong Wang, Junxue Zhang, Chaoliang Zeng, Zhicong Huang, Cheng Hong, Kai Chen |
| When the User Is Inside the User Interface: An Empirical Study of UI Security Properties in Augmented Reality | USENIX Security '24 | Kaiming Cheng, Arkaprabha Bhattacharya, Michelle Lin, Jaewook Lee, Aroosh Kumar, Jeffery F. Tian, Tadayoshi Kohno, Franziska Roesner |
| Understanding How to Inform Blind and Low-Vision Users about Data Privacy through Privacy Question Answering Assistants | USENIX Security '24 | Yuanyuan Feng, Abhilasha Ravichander, Yaxing Yao, Shikun Zhang, Rex Chen |
| Fingerprinting Obfuscated Proxy Traffic with Encapsulated TLS Handshakes | USENIX Security '24 | Diwen Xue, Michalis Kallitsis, Amir Houmansadr, Roya Ensafi |
| AutoFHE: Automated Adaption of CNNs for Efficient Evaluation over FHE | USENIX Security '24 | Wei Ao, Vishnu Naresh Boddeti |
| SDFuzz: Target States Driven Directed Fuzzing | USENIX Security '24 | Penghui Li, Wei Meng, Chao Zhang |
| FEASE: Fast and Expressive Asymmetric Searchable Encryption | USENIX Security '24 | Long Meng, Liqun Chen, Yangguang Tian, Mark Manulis, Suhui Liu |
| Critical Code Guided Directed Greybox Fuzzing for Commits | USENIX Security '24 | Yi Xiang, Xuhong Zhang, Peiyu Liu, Shouling Ji, Hong Liang, Jiacheng Xu, Wenhai Wang |
| A Linear Reconstruction Approach for Attribute Inference Attacks against Synthetic Data | USENIX Security '24 | Meenatchi Sundaram Muthu Selva Annamalai, Andrea Gadotti, Luc Rocher |
| Fast and Private Inference of Deep Neural Networks by Co-designing Activation Functions | USENIX Security '24 | Abdulrahman Diaa, Lucas Fenaux, Thomas Humphries, Marian Dietz, Faezeh Ebrahimianghazani, Bailey Kacsmar, Xinda Li, Nils Lukas, Rasoul Akhavan Mahdavi, Simon Oya, Ehsan Amjadian, Florian Kerschbaum |
| Query Recovery from Easy to Hard: Jigsaw Attack against SSE | USENIX Security '24 | Hao Nie, Wei Wang, Peng Xu, Xianglong Zhang, Laurence T. Yang, Kaitai Liang |