USENIX Security '24 | Unpacking Privacy Labels: A Measurement and Developer Perspective on Google's Data Safety Section | Rishabh Khandelwal, Asmit Nayak, Paul Chung, Kassem Fawaz |
USENIX Security '24 | On the Difficulty of Defending Contrastive Learning against Backdoor Attacks | Changjiang Li, Ren Pang, Bochuan Cao, Zhaohan Xi, Jinghui Chen, Shouling Ji, Ting Wang |
USENIX Security '24 | More Simplicity for Trainers, More Opportunity for Attackers: Black-Box Attacks on Speaker Recognition Systems by Inferring Feature Extractor | Yunjie Ge, Pinji Chen, Qian Wang, Lingchen Zhao, Ningping Mou, Peipei Jiang, Cong Wang, Qi Li, Chao Shen |
USENIX Security '24 | Transferability of White-box Perturbations: Query-Efficient Adversarial Attacks against Commercial DNN Services | Meng Shen, Changyue Li, Qi Li, Hao Lu, Liehuang Zhu, Ke Xu |
USENIX Security '24 | Penetration Vision through Virtual Reality Headsets: Identifying 360-degree Videos from Head Movements | Anh Nguyen, Xiaokuan Zhang, Zhisheng Yan |
USENIX Security '24 | Rabbit-Mix: Robust Algebraic Anonymous Broadcast from Additive Bases | Chongwon Cho, Samuel Dittmer, Yuval Ishai, Steve Lu, Rafail Ostrovsky |
USENIX Security '24 | Splitting the Difference on Adversarial Training | Matan Levi, Aryeh Kontorovich |
USENIX Security '24 | VoltSchemer: Use Voltage Noise to Manipulate Your Wireless Charger | Zihao Zhan, Yirui Yang, Haoqi Shan, Hanqiu Wang, Yier Jin, Shuo Wang |
USENIX Security '24 | OPTIKS: An Optimized Key Transparency System | Julia Len, Melissa Chase, Esha Ghosh, Kim Laine, Radames Cruz Moreno |
USENIX Security '24 | VibSpeech: Exploring Practical Wideband Eavesdropping via Bandlimited Signal of Vibration-based Side Channel | Chao Wang, Feng Lin, Hao Yan, Tong Wu, Wenyao Xu, Kui Ren |
USENIX Security '24 | LaKey: Efficient Lattice-Based Distributed PRFs Enable Scalable Distributed Key Management | Matthias Geihs, Hart Montgomery |
USENIX Security '24 | Finding Traceability Attacks in the Bluetooth Low Energy Specification and Its Implementations | Jianliang Wu, Patrick Traynor, Dongyan Xu, Dave (Jing) Tian, Antonio Bianchi |
USENIX Security '24 | ATTention Please! An Investigation of the App Tracking Transparency Permission | Reham Mohamed, Arjun Arunasalam, Habiba Farrukh, Jason Tong, Antonio Bianchi, Z. Berkay Celik |
USENIX Security '24 | MultiFuzz: A Multi-Stream Fuzzer For Testing Monolithic Firmware | Michael Chesser, Surya Nepal, Damith C. Ranasinghe |
USENIX Security '24 | Smudged Fingerprints: Characterizing and Improving the Performance of Web Application Fingerprinting | Brian Kondracki, Nick Nikiforakis |
USENIX Security '24 | PIXELMOD: Improving Soft Moderation of Visual Misleading Information on Twitter | Pujan Paudel, Chen Ling, Jeremy Blackburn, Gianluca Stringhini |
USENIX Security '24 | DeepEclipse: How to Break White-Box DNN-Watermarking Schemes | Alessandro Pegoraro, Carlotta Segna, Kavita Kumari, Ahmad-Reza Sadeghi |
USENIX Security '24 | Your Firmware Has Arrived: A Study of Firmware Update Vulnerabilities | Yuhao Wu, Jinwen Wang, Yujie Wang, Shixuan Zhai, Zihan Li, Yi He, Kun Sun, Qi Li, Ning Zhang |
USENIX Security '24 | A High Coverage Cybersecurity Scale Predictive of User Behavior | Yukiko Sawaya, Sarah Lu, Takamasa Isohara, Mahmood Sharif |
USENIX Security '24 | VeriSimplePIR: Verifiability in SimplePIR at No Online Cost for Honest Servers | Leo de Castro, Keewoo Lee |
USENIX Security '24 | Batch PIR and Labeled PSI with Oblivious Ciphertext Compression | Alexander Bienstock, Sarvar Patel, Joon Young Seo, Kevin Yeo |
USENIX Security '24 | iHunter: Hunting Privacy Violations at Scale in the Software Supply Chain on iOS | Dexin Liu, Yue Xiao, Chaoqi Zhang, Kaitao Xie, Xiaolong Bai, Shikun Zhang, Luyi Xing |
USENIX Security '24 | Single Pass Client-Preprocessing Private Information Retrieval | Arthur Lazzaretti, Charalampos Papamanthou |
USENIX Security '24 | WhisperFuzz: White-Box Fuzzing for Detecting and Locating Timing Vulnerabilities in Processors | Pallavi Borkar, Chen Chen, Mohamadreza Rostami, Nikhilesh Singh, Rahul Kande, Ahmad-Reza Sadeghi, Chester Rebeiro, Jeyavijayan Rajendran |
USENIX Security '24 | Abandon All Hope Ye Who Enter Here: A Dynamic, Longitudinal Investigation of Android's Data Safety Section | Ioannis Arkalakis, Michalis Diamantaris, Serafeim Moustakas, Sotiris Ioannidis, Jason Polakis, Panagiotis Ilia |