| "What Keeps People Secure is That They Met The Security Team": Deconstructing Drivers And Goals of Organizational Security Awareness | USENIX Security '24 | Jonas Hielscher, Simon Parkin |
| Fast RS-IOP Multivariate Polynomial Commitments and Verifiable Secret Sharing | USENIX Security '24 | Zongyang Zhang, Weihan Li, Yanpei Guo, Kexin Shi, Sherman S. M. Chow, Ximeng Liu, Jin Dong |
| Rabbit-Mix: Robust Algebraic Anonymous Broadcast from Additive Bases | USENIX Security '24 | Chongwon Cho, Samuel Dittmer, Yuval Ishai, Steve Lu, Rafail Ostrovsky |
| Abuse Reporting for Metadata-Hiding Communication Based on Secret Sharing | USENIX Security '24 | Saba Eskandarian |
| PerfOMR: Oblivious Message Retrieval with Reduced Communication and Computation | USENIX Security '24 | Zeyu Liu, Eran Tromer, Yunhao Wang |
| Data Subjects' Reactions to Exercising Their Right of Access | USENIX Security '24 | Arthur Borem, Elleen Pan, Olufunmilola Obielodan, Aurelie Roubinowitz, Luca Dovichi, Michelle L. Mazurek, Blase Ur |
| Security and Privacy Software Creators' Perspectives on Unintended Consequences | USENIX Security '24 | Harshini Sri Ramulu, Helen Schmitt, Dominik Wermke, Yasemin Acar |
| Engaging Company Developers in Security Research Studies: A Comprehensive Literature Review and Quantitative Survey | USENIX Security '24 | Raphael Serafini, Stefan Albert Horstmann, Alena Naiakshina |
| It Doesn't Look Like Anything to Me: Using Diffusion Model to Subvert Visual Phishing Detectors | USENIX Security '24 | Qingying Hao, Nirav Diwan, Ying Yuan, Giovanni Apruzzese, Mauro Conti, Gang Wang |
| Athena: Analyzing and Quantifying Side Channels of Transport Layer Protocols | USENIX Security '24 | Feiyang Yu, Quan Zhou, Syed Rafiul Hussain, Danfeng Zhang |
| Remote Keylogging Attacks in Multi-user VR Applications | USENIX Security '24 | Zihao Su, Kunlin Cai, Reuben Beeler, Lukas Dresel, Allan Garcia, Ilya Grishchenko, Yuan Tian, Christopher Kruegel, Giovanni Vigna |
| SPF Beyond the Standard: Management and Operational Challenges in Practice and Practical Recommendations | USENIX Security '24 | Md. Ishtiaq Ashiq, Weitong Li, Tobias Fiebig, Taejoong Chung |
| Xplain: Analyzing Invisible Correlations in Model Explanation | USENIX Security '24 | Kavita Kumari, Alessandro Pegoraro, Hossein Fereidooni, Ahmad-Reza Sadeghi |
| SoK: Neural Network Extraction Through Physical Side Channels | USENIX Security '24 | |
| Unveiling the Hunter-Gatherers: Exploring Threat Hunting Practices and Challenges in Cyber Defense | USENIX Security '24 | Priyanka Badva, Kopo M. Ramokapane, Eleonora Pantano, Awais Rashid |
| Shaken, not Stirred - Automated Discovery of Subtle Attacks on Protocols using Mix-Nets | USENIX Security '24 | Jannik Dreier, Pascal Lafourcade, Dhekra Mahmoud |
| Adversarial Illusions in Multi-Modal Embeddings | USENIX Security '24 | Eugene Bagdasaryan, Rishi Jha, Vitaly Shmatikov, Tingwei Zhang |
| Verify your Labels! Trustworthy Predictions and Datasets via Confidence Scores | USENIX Security '24 | Torsten Krauß, Jasper Stang, Alexandra Dmitrienko |
| What Was Your Prompt? A Remote Keylogging Attack on AI Assistants | USENIX Security '24 | Roy Weiss, Daniel Ayzenshteyn, Yisroel Mirsky |
| Invisibility Cloak: Proactive Defense Against Visual Game Cheating | USENIX Security '24 | Chenxin Sun, Kai Ye, Liangcai Su, Jiayi Zhang, Chenxiong Qian |
| SpotProxy: Rediscovering the Cloud for Censorship Circumvention | USENIX Security '24 | Patrick Tser Jern Kon, Sina Kamali, Jinyu Pei, Diogo Barradas, Ang Chen, Micah Sherr, Moti Yung |
| CAMP: Compiler and Allocator-based Heap Memory Protection | USENIX Security '24 | Zhenpeng Lin, Zheng Yu, Ziyi Guo, Simone Campanoni, Peter Dinda, Xinyu Xing |
| SecurityNet: Assessing Machine Learning Vulnerabilities on Public Models | USENIX Security '24 | Boyang Zhang, Zheng Li, Ziqing Yang, Xinlei He, Michael Backes, Mario Fritz, Yang Zhang |
| Machine Learning needs Better Randomness Standards: Randomised Smoothing and PRNG-based attacks | USENIX Security '24 | Pranav Dahiya, Ilia Shumailov, Ross Anderson |
| Speculative Denial-of-Service Attacks In Ethereum | USENIX Security '24 | Aviv Yaish, Kaihua Qin, Liyi Zhou, Aviv Zohar, Arthur Gervais |