USENIX Security '24 | CalcuLatency: Leveraging Cross-Layer Network Latency Measurements to Detect Proxy-Enabled Abuse | Reethika Ramesh, Philipp Winter, Sam Korman, Roya Ensafi |
USENIX Security '24 | 6Sense: Internet-Wide IPv6 Scanning and its Security Applications | Grant Williams, Mert Erdemir, Amanda Hsu, Shraddha Bhat, Abhishek Bhaskar, Frank Li, Paul Pearce |
USENIX Security '24 | An Interview Study on Third-Party Cyber Threat Hunting Processes in the U.S. Department of Homeland Security | William P. Maxam III, James C. Davis |
USENIX Security '24 | I/O-Efficient Dynamic Searchable Encryption meets Forward & Backward Privacy | Priyanka Mondal, Javad Ghareh Chamani, Ioannis Demertzis, Dimitrios Papadopoulos |
USENIX Security '24 | Assessing Suspicious Emails with Banner Warnings Among Blind and Low-Vision Users in Realistic Settings | Filipo Sharevski, Aziz Zeidieh |
USENIX Security '24 | Lightweight Authentication of Web Data via Garble-Then-Prove | |
USENIX Security '24 | Exploring digital security and privacy in relative poverty in Germany through qualitative interviews | Anastassija Kostan, Sara Olschar, Lucy Simko, Yasemin Acar |
USENIX Security '24 | Property Existence Inference against Generative Models | Lijin Wang, Jingjing Wang, Jie Wan, Lin Long, Ziqi Yang, Zhan Qin |
USENIX Security '24 | Can Virtual Reality Protect Users from Keystroke Inference Attacks? | Zhuolin Yang, Zain Sarwar, Iris Hwang, Ronik Bhaskar, Ben Y. Zhao, Haitao Zheng |
USENIX Security '24 | Neural Network Semantic Backdoor Detection and Mitigation: A Causality-Based Approach | Bing Sun, Jun Sun, Wayne Koh, Jie Shi |
USENIX Security '24 | When the User Is Inside the User Interface: An Empirical Study of UI Security Properties in Augmented Reality | Kaiming Cheng, Arkaprabha Bhattacharya, Michelle Lin, Jaewook Lee, Aroosh Kumar, Jeffery F. Tian, Tadayoshi Kohno, Franziska Roesner |
USENIX Security '24 | ACAI: Protecting Accelerator Execution with Arm Confidential Computing Architecture | Supraja Sridhara, Andrin Bertschi, Benedict Schlüter, Mark Kuhne, Fabio Aliberti, Shweta Shinde |
USENIX Security '24 | NetShaper: A Differentially Private Network Side-Channel Mitigation System | Amir Sabzi, Rut Vora, Swati Goswami, Margo Seltzer, Mathias Lécuyer, Aastha Mehta |
USENIX Security '24 | Dissecting Privacy Perspectives of Websites Around the World: "Aceptar Todo, Alle Akzeptieren, Accept All..." | Aysun Ogut, Berke Turanlioglu, Doruk Can Metiner, Albert Levi, Cemal Yilmaz, Orcun Cetin, Selcuk Uluagac |
USENIX Security '24 | Fingerprinting Obfuscated Proxy Traffic with Encapsulated TLS Handshakes | Diwen Xue, Michalis Kallitsis, Amir Houmansadr, Roya Ensafi |
USENIX Security '24 | Mudjacking: Patching Backdoor Vulnerabilities in Foundation Models | Hongbin Liu, Michael K. Reiter, Neil Zhenqiang Gong |
USENIX Security '24 | Pixel Thief: Exploiting SVG Filter Leakage in Firefox and Chrome | Sioli O'Connell, Lishay Aben Sour, Ron Magen, Daniel Genkin, Yossi Oren, Hovav Shacham, Yuval Yarom |
USENIX Security '24 | Unpacking Privacy Labels: A Measurement and Developer Perspective on Google's Data Safety Section | Rishabh Khandelwal, Asmit Nayak, Paul Chung, Kassem Fawaz |
USENIX Security '24 | Speculative Denial-of-Service Attacks In Ethereum | Aviv Yaish, Kaihua Qin, Liyi Zhou, Aviv Zohar, Arthur Gervais |
USENIX Security '24 | That Doesn't Go There: Attacks on Shared State in Multi-User Augmented Reality Applications | Carter Slocum, Yicheng Zhang, Erfan Shayegani, Pedram Zaree, Nael Abu-Ghazaleh, Jiasi Chen |
USENIX Security '24 | On the Difficulty of Defending Contrastive Learning against Backdoor Attacks | Changjiang Li, Ren Pang, Bochuan Cao, Zhaohan Xi, Jinghui Chen, Shouling Ji, Ting Wang |
USENIX Security '24 | More Simplicity for Trainers, More Opportunity for Attackers: Black-Box Attacks on Speaker Recognition Systems by Inferring Feature Extractor | Yunjie Ge, Pinji Chen, Qian Wang, Lingchen Zhao, Ningping Mou, Peipei Jiang, Cong Wang, Qi Li, Chao Shen |
USENIX Security '24 | Transferability of White-box Perturbations: Query-Efficient Adversarial Attacks against Commercial DNN Services | Meng Shen, Changyue Li, Qi Li, Hao Lu, Liehuang Zhu, Ke Xu |
USENIX Security '24 | "I'm not convinced that they don't collect more than is necessary": User-Controlled Data Minimization Design in Search Engines | Tanusree Sharma, Lin Kyi, Yang Wang, Asia J. Biega |
USENIX Security '24 | Penetration Vision through Virtual Reality Headsets: Identifying 360-degree Videos from Head Movements | Anh Nguyen, Xiaokuan Zhang, Zhisheng Yan |