USENIX Security '24 | Practical Security Analysis of Zero-Knowledge Proof Circuits | Hongbo Wen, Jon Stephens, Yanju Chen, Kostas Ferles, Shankara Pailoor, Kyle Charbonnet, Isil Dillig, Yu Feng |
USENIX Security '24 | Hermes: Unlocking Security Analysis of Cellular Network Protocols by Synthesizing Finite State Machines from Natural Language Specifications | Abdullah Al Ishtiaq, Sarkar Snigdha Sarathi Das, Syed Md Mukit Rashid, Ali Ranjbar, Kai Tu, Tianwei Wu, Zhezheng Song, Weixuan Wang, Mujtahid Akon, Rui Zhang, Syed Rafiul Hussain |
USENIX Security '24 | Sync+Sync: A Covert Channel Built on fsync with Storage | Qisheng Jiang, Chundong Wang |
USENIX Security '24 | AutoFHE: Automated Adaption of CNNs for Efficient Evaluation over FHE | Wei Ao, Vishnu Naresh Boddeti |
USENIX Security '24 | SecurityNet: Assessing Machine Learning Vulnerabilities on Public Models | Boyang Zhang, Zheng Li, Ziqing Yang, Xinlei He, Michael Backes, Mario Fritz, Yang Zhang |
USENIX Security '24 | Why Aren't We Using Passkeys? Obstacles Companies Face Deploying FIDO2 Passwordless Authentication | Leona Lassak, Elleen Pan, Blase Ur, Maximilian Golla |
USENIX Security '24 | K-Waay: Fast and Deniable Post-Quantum X3DH without Ring Signatures | Daniel Collins, Loïs Huguenin-Dumittan, Ngoc Khanh Nguyen, Nicolas Rolin, Serge Vaudenay |
USENIX Security '24 | What IF Is Not Enough? Fixing Null Pointer Dereference With Contextual Check | Yunlong Xing, Shu Wang, Shiyu Sun, Xu He, Kun Sun, Qi Li |
USENIX Security '24 | Unveiling the Secrets without Data: Can Graph Neural Networks Be Exploited through Data-Free Model Extraction Attacks? | Yuanxin Zhuang, Chuan Shi, Mengmei Zhang, Jinghui Chen, Lingjuan Lyu, Pan Zhou, Lichao Sun |
USENIX Security '24 | CacheWarp: Software-based Fault Injection using Selective State Reset | Ruiyi Zhang, Lukas Gerlach, Daniel Weber, Lorenz Hetterich, Youheng Lü, Andreas Kogler, Michael Schwarz |
USENIX Security '24 | Yes, One-Bit-Flip Matters! Universal DNN Model Inference Depletion with Runtime Code Fault Injection | Shaofeng Li, Xinyu Wang, Minhui Xue, Haojin Zhu, Zhi Zhang, Yansong Gao, Wen Wu, Xuemin (Sherman) Shen |
USENIX Security '24 | Key Recovery Attacks on Approximate Homomorphic Encryption with Non-Worst-Case Noise Flooding Countermeasures | Qian Guo, Denis Nabokov, Elias Suvanto, Thomas Johansson |
USENIX Security '24 | Mudjacking: Patching Backdoor Vulnerabilities in Foundation Models | Hongbin Liu, Michael K. Reiter, Neil Zhenqiang Gong |
USENIX Security '24 | Does Online Anonymous Market Vendor Reputation Matter? | Alejandro Cuevas, Nicolas Christin |
USENIX Security '24 | SWOOSH: Efficient Lattice-Based Non-Interactive Key Exchange | Phillip Gajland, Bor de Kock, Miguel Quaresma, Giulio Malavolta, Peter Schwabe |
USENIX Security '24 | Machine Learning needs Better Randomness Standards: Randomised Smoothing and PRNG-based attacks | Pranav Dahiya, Ilia Shumailov, Ross Anderson |
USENIX Security '24 | Tossing in the Dark: Practical Bit-Flipping on Gray-box Deep Neural Networks for Runtime Trojan Injection | Zihao Wang, Di Tang, XiaoFeng Wang, Wei He, Zhaoyang Geng, Wenhao Wang |
USENIX Security '24 | Batch PIR and Labeled PSI with Oblivious Ciphertext Compression | Alexander Bienstock, Sarvar Patel, Joon Young Seo, Kevin Yeo |
USENIX Security '24 | Pixel Thief: Exploiting SVG Filter Leakage in Firefox and Chrome | Sioli O'Connell, Lishay Aben Sour, Ron Magen, Daniel Genkin, Yossi Oren, Hovav Shacham, Yuval Yarom |
USENIX Security '24 | ATTention Please! An Investigation of the App Tracking Transparency Permission | Reham Mohamed, Arjun Arunasalam, Habiba Farrukh, Jason Tong, Antonio Bianchi, Z. Berkay Celik |
USENIX Security '24 | Unpacking Privacy Labels: A Measurement and Developer Perspective on Google's Data Safety Section | Rishabh Khandelwal, Asmit Nayak, Paul Chung, Kassem Fawaz |
USENIX Security '24 | Accelerating Secure Collaborative Machine Learning with Protocol-Aware RDMA | Zhenghang Ren, Mingxuan Fan, Zilong Wang, Junxue Zhang, Chaoliang Zeng, Zhicong Huang, Cheng Hong, Kai Chen |
USENIX Security '24 | ABACuS: All-Bank Activation Counters for Scalable and Low Overhead RowHammer Mitigation | Ataberk Olgun, Yahya Can Tugrul, Nisa Bostanci, Ismail Emir Yuksel, Haocong Luo, Steve Rhyner, Abdullah Giray Yaglikci, Geraldo F. Oliveira, Onur Mutlu |
USENIX Security '24 | On Data Fabrication in Collaborative Vehicular Perception: Attacks and Countermeasures | Qingzhao Zhang, Shuowei Jin, Ruiyang Zhu, Jiachen Sun, Xumiao Zhang, Qi Alfred Chen, Z. Morley Mao |
USENIX Security '24 | Understanding the Security and Privacy Implications of Online Toxic Content on Refugees | Arjun Arunasalam, Habiba Farrukh, Eliz Tekcan, Z. Berkay Celik |