| Bridging Barriers: A Survey of Challenges and Priorities in the Censorship Circumvention Landscape | USENIX Security '24 | Diwen Xue, Anna Ablove, Reethika Ramesh, Grace Kwak Danciu, Roya Ensafi |
| A Flushing Attack on the DNS Cache | USENIX Security '24 | Yehuda Afek, Anat Bremler-Barr, Shoham Danino, Yuval Shavitt |
| Exploring ChatGPT's Capabilities on Vulnerability Management | USENIX Security '24 | Peiyu Liu, Junming Liu, Lirong Fu, Kangjie Lu, Yifan Xia, Xuhong Zhang, Wenzhi Chen, Haiqin Weng, Shouling Ji, Wenhai Wang |
| Large Language Models for Code Analysis: Do LLMs Really Do Their Job? | USENIX Security '24 | Chongzhou Fang, Ning Miao, Shaurya Srivastav, Jialin Liu, Ruoyu Zhang, Ruijie Fang, Asmita, Ryan Tsang, Najmeh Nazari, Han Wang, Houman Homayoun |
| PentestGPT: Evaluating and Harnessing Large Language Models for Automated Penetration Testing | USENIX Security '24 | Gelei Deng, Yi Liu, Víctor Mayoral-Vilches, Peng Liu, Yuekang Li, Yuan Xu, Tianwei Zhang, Yang Liu, Martin Pinzger, Stefan Rass |
| OptFuzz: Optimization Path Guided Fuzzing for JavaScript JIT Compilers | USENIX Security '24 | Jiming Wang, Yan Kang, Chenggang Wu, Yuhao Hu, Yue Sun, Jikai Ren, Yuanming Lai, Mengyao Xie, Charles Zhang, Tao Li, Zhe Wang |
| Can Virtual Reality Protect Users from Keystroke Inference Attacks? | USENIX Security '24 | Zhuolin Yang, Zain Sarwar, Iris Hwang, Ronik Bhaskar, Ben Y. Zhao, Haitao Zheng |
| Neural Network Semantic Backdoor Detection and Mitigation: A Causality-Based Approach | USENIX Security '24 | Bing Sun, Jun Sun, Wayne Koh, Jie Shi |
| The Effect of Design Patterns on (Present and Future) Cookie Consent Decisions | USENIX Security '24 | Nataliia Bielova, Laura Litvine, Anysia Nguyen, Mariam Chammat, Vincent Toubiana, Estelle Hary |
| ACAI: Protecting Accelerator Execution with Arm Confidential Computing Architecture | USENIX Security '24 | Supraja Sridhara, Andrin Bertschi, Benedict Schlüter, Mark Kuhne, Fabio Aliberti, Shweta Shinde |
| How WEIRD is Usable Privacy and Security Research? | USENIX Security '24 | Ayako A. Hasegawa, Daisuke Inoue, Mitsuaki Akiyama |
| NetShaper: A Differentially Private Network Side-Channel Mitigation System | USENIX Security '24 | Amir Sabzi, Rut Vora, Swati Goswami, Margo Seltzer, Mathias Lécuyer, Aastha Mehta |
| Dissecting Privacy Perspectives of Websites Around the World: "Aceptar Todo, Alle Akzeptieren, Accept All..." | USENIX Security '24 | Aysun Ogut, Berke Turanlioglu, Doruk Can Metiner, Albert Levi, Cemal Yilmaz, Orcun Cetin, Selcuk Uluagac |
| Sync+Sync: A Covert Channel Built on fsync with Storage | USENIX Security '24 | Qisheng Jiang, Chundong Wang |
| Mudjacking: Patching Backdoor Vulnerabilities in Foundation Models | USENIX Security '24 | Hongbin Liu, Michael K. Reiter, Neil Zhenqiang Gong |
| Pixel Thief: Exploiting SVG Filter Leakage in Firefox and Chrome | USENIX Security '24 | Sioli O'Connell, Lishay Aben Sour, Ron Magen, Daniel Genkin, Yossi Oren, Hovav Shacham, Yuval Yarom |
| Unpacking Privacy Labels: A Measurement and Developer Perspective on Google's Data Safety Section | USENIX Security '24 | Rishabh Khandelwal, Asmit Nayak, Paul Chung, Kassem Fawaz |
| That Doesn't Go There: Attacks on Shared State in Multi-User Augmented Reality Applications | USENIX Security '24 | Carter Slocum, Yicheng Zhang, Erfan Shayegani, Pedram Zaree, Nael Abu-Ghazaleh, Jiasi Chen |
| On the Difficulty of Defending Contrastive Learning against Backdoor Attacks | USENIX Security '24 | Changjiang Li, Ren Pang, Bochuan Cao, Zhaohan Xi, Jinghui Chen, Shouling Ji, Ting Wang |
| More Simplicity for Trainers, More Opportunity for Attackers: Black-Box Attacks on Speaker Recognition Systems by Inferring Feature Extractor | USENIX Security '24 | Yunjie Ge, Pinji Chen, Qian Wang, Lingchen Zhao, Ningping Mou, Peipei Jiang, Cong Wang, Qi Li, Chao Shen |
| Transferability of White-box Perturbations: Query-Efficient Adversarial Attacks against Commercial DNN Services | USENIX Security '24 | Meng Shen, Changyue Li, Qi Li, Hao Lu, Liehuang Zhu, Ke Xu |
| "I'm not convinced that they don't collect more than is necessary": User-Controlled Data Minimization Design in Search Engines | USENIX Security '24 | Tanusree Sharma, Lin Kyi, Yang Wang, Asia J. Biega |
| Penetration Vision through Virtual Reality Headsets: Identifying 360-degree Videos from Head Movements | USENIX Security '24 | Anh Nguyen, Xiaokuan Zhang, Zhisheng Yan |
| SOAP: A Social Authentication Protocol | USENIX Security '24 | Felix Linker, David Basin |
| Logic Gone Astray: A Security Analysis Framework for the Control Plane Protocols of 5G Basebands | USENIX Security '24 | Kai Tu, Abdullah Al Ishtiaq, Syed Md Mukit Rashid, Yilu Dong, Weixuan Wang, Tianwei Wu, Syed Rafiul Hussain |