USENIX Security '24 | Splitting the Difference on Adversarial Training | Matan Levi, Aryeh Kontorovich |
USENIX Security '24 | VoltSchemer: Use Voltage Noise to Manipulate Your Wireless Charger | Zihao Zhan, Yirui Yang, Haoqi Shan, Hanqiu Wang, Yier Jin, Shuo Wang |
USENIX Security '24 | OPTIKS: An Optimized Key Transparency System | Julia Len, Melissa Chase, Esha Ghosh, Kim Laine, Radames Cruz Moreno |
USENIX Security '24 | VibSpeech: Exploring Practical Wideband Eavesdropping via Bandlimited Signal of Vibration-based Side Channel | Chao Wang, Feng Lin, Hao Yan, Tong Wu, Wenyao Xu, Kui Ren |
USENIX Security '24 | LaKey: Efficient Lattice-Based Distributed PRFs Enable Scalable Distributed Key Management | Matthias Geihs, Hart Montgomery |
USENIX Security '24 | ATTention Please! An Investigation of the App Tracking Transparency Permission | Reham Mohamed, Arjun Arunasalam, Habiba Farrukh, Jason Tong, Antonio Bianchi, Z. Berkay Celik |
USENIX Security '24 | Smudged Fingerprints: Characterizing and Improving the Performance of Web Application Fingerprinting | Brian Kondracki, Nick Nikiforakis |
USENIX Security '24 | DeepEclipse: How to Break White-Box DNN-Watermarking Schemes | Alessandro Pegoraro, Carlotta Segna, Kavita Kumari, Ahmad-Reza Sadeghi |
USENIX Security '24 | A High Coverage Cybersecurity Scale Predictive of User Behavior | Yukiko Sawaya, Sarah Lu, Takamasa Isohara, Mahmood Sharif |
USENIX Security '24 | Batch PIR and Labeled PSI with Oblivious Ciphertext Compression | Alexander Bienstock, Sarvar Patel, Joon Young Seo, Kevin Yeo |
USENIX Security '24 | iHunter: Hunting Privacy Violations at Scale in the Software Supply Chain on iOS | Dexin Liu, Yue Xiao, Chaoqi Zhang, Kaitao Xie, Xiaolong Bai, Shikun Zhang, Luyi Xing |
USENIX Security '24 | Single Pass Client-Preprocessing Private Information Retrieval | Arthur Lazzaretti, Charalampos Papamanthou |
USENIX Security '24 | Abandon All Hope Ye Who Enter Here: A Dynamic, Longitudinal Investigation of Android's Data Safety Section | Ioannis Arkalakis, Michalis Diamantaris, Serafeim Moustakas, Sotiris Ioannidis, Jason Polakis, Panagiotis Ilia |
USENIX Security '24 | Pixel+ and Pixel++: Compact and Efficient Forward-Secure Multi-Signatures for PoS Blockchain Consensus | Jianghong Wei, Guohua Tian, Ding Wang, Fuchun Guo, Willy Susilo, Xiaofeng Chen |
USENIX Security '24 | DaCapo: Automatic Bootstrapping Management for Efficient Fully Homomorphic Encryption | Seonyoung Cheon, Yongwoo Lee, Dongkwan Kim, Ju Min Lee, Sunchul Jung, Taekyung Kim, Dongyoon Lee, Hanjun Kim |
USENIX Security '24 | The Unpatchables: Why Municipalities Persist in Running Vulnerable Hosts | Aksel Ethembabaoglu, Rolf van Wegberg, Yury Zhauniarovich, Michel van Eeten |
USENIX Security '24 | Hijacking Attacks against Neural Network by Analyzing Training Data | Yunjie Ge, Qian Wang, Huayang Huang, Qi Li, Cong Wang, Chao Shen, Lingchen Zhao, Peipei Jiang, Zheng Fang, Shenyi Zhang |
USENIX Security '24 | PINE: Efficient Verification of a Euclidean Norm Bound of a Secret-Shared Vector | Guy N. Rothblum, Eran Omri, Junye Chen, Kunal Talwar |
USENIX Security '24 | VOGUES: Validation of Object Guise using Estimated Components | Raymond Muller, Yanmao Man, Ming Li, Ryan Gerdes, Jonathan Petit, Z. Berkay Celik |
USENIX Security '24 | FaceObfuscator: Defending Deep Learning-based Privacy Attacks with Gradient Descent-resistant Features in Face Recognition | Shuaifan Jin, He Wang, Zhibo Wang, Feng Xiao, Jiahui Hu, Yuan He, Wenwen Zhang, Zhongjie Ba, Weijie Fang, Shuhong Yuan, Kui Ren |
USENIX Security '24 | AE-Morpher: Improve Physical Robustness of Adversarial Objects against LiDAR-based Detectors via Object Reconstruction | Shenchen Zhu, Yue Zhao, Kai Chen, Bo Wang, Hualong Ma, Cheng'an Wei |
USENIX Security '24 | A Mixed-Methods Study on User Experiences and Challenges of Recovery Codes for an End-to-End Encrypted Service | Sandra Höltervennhoff, Noah Wöhler, Arne Möhle, Marten Oltrogge, Yasemin Acar, Oliver Wiese, Sascha Fahl |
USENIX Security '24 | Rise of Inspectron: Automated Black-box Auditing of Cross-platform Electron Apps | Mir Masood Ali, Mohammad Ghasemisharif, Chris Kanich, Jason Polakis |
USENIX Security '24 | SpecLFB: Eliminating Cache Side Channels in Speculative Executions | Xiaoyu Cheng, Fei Tong, Hongyu Wang, Zhe Zhou, Fang Jiang, Yuxing Mao |
USENIX Security '24 | K-Waay: Fast and Deniable Post-Quantum X3DH without Ring Signatures | Daniel Collins, Loïs Huguenin-Dumittan, Ngoc Khanh Nguyen, Nicolas Rolin, Serge Vaudenay |