| CalcuLatency: Leveraging Cross-Layer Network Latency Measurements to Detect Proxy-Enabled Abuse | USENIX Security '24 | Reethika Ramesh, Philipp Winter, Sam Korman, Roya Ensafi |
| 6Sense: Internet-Wide IPv6 Scanning and its Security Applications | USENIX Security '24 | Grant Williams, Mert Erdemir, Amanda Hsu, Shraddha Bhat, Abhishek Bhaskar, Frank Li, Paul Pearce |
| Intellectual Property Exposure: Subverting and Securing Intellectual Property Encapsulation in Texas Instruments Microcontrollers | USENIX Security '24 | Marton Bognar, Cas Magnus, Frank Piessens, Jo Van Bulck |
| An Interview Study on Third-Party Cyber Threat Hunting Processes in the U.S. Department of Homeland Security | USENIX Security '24 | William P. Maxam III, James C. Davis |
| GFWeb: Measuring the Great Firewall's Web Censorship at Scale | USENIX Security '24 | Nguyen Phong Hoang, Jakub Dalek, Masashi Crete-Nishihata, Nicolas Christin, Vinod Yegneswaran, Michalis Polychronakis, Nick Feamster |
| I/O-Efficient Dynamic Searchable Encryption meets Forward & Backward Privacy | USENIX Security '24 | Priyanka Mondal, Javad Ghareh Chamani, Ioannis Demertzis, Dimitrios Papadopoulos |
| Assessing Suspicious Emails with Banner Warnings Among Blind and Low-Vision Users in Realistic Settings | USENIX Security '24 | Filipo Sharevski, Aziz Zeidieh |
| d-DSE: Distinct Dynamic Searchable Encryption Resisting Volume Leakage in Encrypted Databases | USENIX Security '24 | Dongli Liu, Wei Wang, Peng Xu, Laurence T. Yang, Bo Luo, Kaitai Liang |
| "But they have overlooked a few things in Afghanistan:" An Analysis of the Integration of Biometric Voter Verification in the 2019 Afghan Presidential Elections | USENIX Security '24 | Kabir Panahi, Shawn Robertson, Yasemin Acar, Alexandru G. Bardas, Tadayoshi Kohno, Lucy Simko |
| Exploring digital security and privacy in relative poverty in Germany through qualitative interviews | USENIX Security '24 | Anastassija Kostan, Sara Olschar, Lucy Simko, Yasemin Acar |
| Snowflake, a censorship circumvention system using temporary WebRTC proxies | USENIX Security '24 | Cecylia Bocovich, Arlo Breault, David Fifield, Serene, Xiaokang Wang |
| MD-ML: Super Fast Privacy-Preserving Machine Learning for Malicious Security with a Dishonest Majority | USENIX Security '24 | Boshi Yuan, Shixuan Yang, Yongxiang Zhang, Ning Ding, Dawu Gu, Shi-Feng Sun |
| Property Existence Inference against Generative Models | USENIX Security '24 | Lijin Wang, Jingjing Wang, Jie Wan, Lin Long, Ziqi Yang, Zhan Qin |
| SymBisect: Accurate Bisection for Fuzzer-Exposed Vulnerabilities | USENIX Security '24 | Zheng Zhang, Yu Hao, Weiteng Chen, Xiaochen Zou, Xingyu Li, Haonan Li, Yizhuo Zhai, Billy Lau |
| Did the Neurons Read your Book? Document-level Membership Inference for Large Language Models | USENIX Security '24 | Matthieu Meeus, Shubham Jain, Marek Rei, Yves-Alexandre de Montjoye |
| OblivGNN: Oblivious Inference on Transductive and Inductive Graph Neural Network | USENIX Security '24 | Zhibo Xu, Shangqi Lai, Xiaoning Liu, Alsharif Abuadbba, Xingliang Yuan, Xun Yi |
| Invalidate+Compare: A Timer-Free GPU Cache Attack Primitive | USENIX Security '24 | Zhenkai Zhang, Kunbei Cai, Yanan Guo, Fan Yao, Xing Gao |
| MIST: Defending Against Membership Inference Attacks Through Membership-Invariant Subspace Training | USENIX Security '24 | Jiacheng Li, Ninghui Li, Bruno Ribeiro |
| MUSES: Efficient Multi-User Searchable Encrypted Database | USENIX Security '24 | Tung Le, Rouzbeh Behnia, Jorge Guajardo, Thang Hoang |
| Peep With A Mirror: Breaking The Integrity of Android App Sandboxing via Unprivileged Cache Side Channel | USENIX Security '24 | Yan Lin, Joshua Wong, Xiang Li, Haoyu Ma, Debin Gao |
| Toward Unbiased Multiple-Target Fuzzing with Path Diversity | USENIX Security '24 | Huanyao Rong, Wei You, XiaoFeng Wang, Tianhao Mao |
| Indirector: High-Precision Branch Target Injection Attacks Exploiting the Indirect Branch Predictor | USENIX Security '24 | Luyi Li, Hosein Yavarzadeh, Dean Tullsen |
| Data Coverage for Guided Fuzzing | USENIX Security '24 | Mingzhe Wang, Jie Liang, Chijin Zhou, Zhiyong Wu, Jingzhou Fu, Zhuo Su, Qing Liao, Bin Gu, Bodong Wu, Yu Jiang |
| Navigating Traumatic Stress Reactions During Computer Security Interventions | USENIX Security '24 | Lana Ramjit, Natalie Dolci, Francesca Rossi, Ryan Garcia, Thomas Ristenpart, Dana Cuomo |
| SnailLoad: Exploiting Remote Network Latency Measurements without JavaScript | USENIX Security '24 | Stefan Gast, Roland Czerny, Jonas Juffinger, Fabian Rauscher, Simone Franza, Daniel Gruss |