USENIX Security '24 | AttackGNN: Red-Teaming GNNs in Hardware Security Using Reinforcement Learning | Vasudev Gohil, Satwik Patnaik, Dileep Kalathil, Jeyavijayan Rajendran |
USENIX Security '24 | ABACuS: All-Bank Activation Counters for Scalable and Low Overhead RowHammer Mitigation | Ataberk Olgun, Yahya Can Tugrul, Nisa Bostanci, Ismail Emir Yuksel, Haocong Luo, Steve Rhyner, Abdullah Giray Yaglikci, Geraldo F. Oliveira, Onur Mutlu |
USENIX Security '24 | Automated Large-Scale Analysis of Cookie Notice Compliance | Ahmed Bouhoula, Karel Kubicek, Amit Zac, Carlos Cotrini, David Basin |
USENIX Security '24 | WEBRR: A Forensic System for Replaying and Investigating Web-Based Attacks in The Modern Web | Joey Allen, Zheng Yang, Feng Xiao, Matthew Landen, Roberto Perdisci, Wenke Lee |
USENIX Security '24 | Unleashing the Power of Type-Based Call Graph Construction by Using Regional Pointer Information | Yuandao Cai, Yibo Jin, Charles Zhang |
USENIX Security '24 | Go Go Gadget Hammer: Flipping Nested Pointers for Arbitrary Data Leakage | Youssef Tobah, Andrew Kwong, Ingab Kang, Daniel Genkin, Kang G. Shin |
USENIX Security '24 | Two Shuffles Make a RAM: Improved Constant Overhead Zero Knowledge RAM | Yibin Yang, David Heath |
USENIX Security '24 | Less is More: Revisiting the Gaussian Mechanism for Differential Privacy | Tianxi Ji, Pan Li |
USENIX Security '24 | Code is not Natural Language: Unlock the Power of Semantics-Oriented Graph Representation for Binary Code Similarity Detection | Haojie He, Xingwei Lin, Ziang Weng, Ruijie Zhao, Shuitao Gan, Libo Chen, Yuede Ji, Jiashui Wang, Zhi Xue |
USENIX Security '24 | SledgeHammer: Amplifying Rowhammer via Bank-level Parallelism | Ingab Kang, Walter Wang, Jason Kim, Stephan van Schaik, Youssef Tobah, Daniel Genkin, Andrew Kwong, Yuval Yarom |
USENIX Security '24 | Practical Security Analysis of Zero-Knowledge Proof Circuits | Hongbo Wen, Jon Stephens, Yanju Chen, Kostas Ferles, Shankara Pailoor, Kyle Charbonnet, Isil Dillig, Yu Feng |
USENIX Security '24 | What IF Is Not Enough? Fixing Null Pointer Dereference With Contextual Check | Yunlong Xing, Shu Wang, Shiyu Sun, Xu He, Kun Sun, Qi Li |
USENIX Security '24 | CacheWarp: Software-based Fault Injection using Selective State Reset | Ruiyi Zhang, Lukas Gerlach, Daniel Weber, Lorenz Hetterich, Youheng Lü, Andreas Kogler, Michael Schwarz |
USENIX Security '24 | Yes, One-Bit-Flip Matters! Universal DNN Model Inference Depletion with Runtime Code Fault Injection | Shaofeng Li, Xinyu Wang, Minhui Xue, Haojin Zhu, Zhi Zhang, Yansong Gao, Wen Wu, Xuemin (Sherman) Shen |
USENIX Security '24 | Tossing in the Dark: Practical Bit-Flipping on Gray-box Deep Neural Networks for Runtime Trojan Injection | Zihao Wang, Di Tang, XiaoFeng Wang, Wei He, Zhaoyang Geng, Wenhao Wang |
USENIX Security '24 | Towards Generic Database Management System Fuzzing | Yupeng Yang, Yongheng Chen, Rui Zhong, Jizhou Chen, Wenke Lee |
USENIX Security '24 | AI Psychiatry: Forensic Investigation of Deep Learning Networks in Memory Images | David Oygenblik, Carter Yagemann, Joseph Zhang, Arianna Mastali, Jeman Park, Brendan Saltaformaggio |
USENIX Security '24 | Don't Waste My Efforts: Pruning Redundant Sanitizer Checks by Developer-Implemented Type Checks | Yizhuo Zhai, Zhiyun Qian, Chengyu Song, Manu Sridharan, Trent Jaeger, Paul Yu, Srikanth V. Krishnamurthy |
USENIX Security '24 | Formalizing Soundness Proofs of Linear PCP SNARKs | Bolton Bailey, Andrew Miller |
USENIX Security '24 | DNN-GP: Diagnosing and Mitigating Model's Faults Using Latent Concepts | Shuo Wang, Hongsheng Hu, Jiamin Chang, Benjamin Zi Hao Zhao, Qi Alfred Chen, Minhui Xue |
USENIX Security '24 | Relation Mining Under Local Differential Privacy | Kai Dong, Zheng Zhang, Chuang Jia, Zhen Ling, Ming Yang, Junzhou Luo, Xinwen Fu |
USENIX Security '24 | HYPERPILL: Fuzzing for Hypervisor-bugs by Leveraging the Hardware Virtualization Interface | Alexander Bulekov, Qiang Liu, Manuel Egele, Mathias Payer |
USENIX Security '24 | DPAdapter: Improving Differentially Private Deep Learning through Noise Tolerance Pre-training | Zihao Wang, Rui Zhu, Dongruo Zhou, Zhikun Zhang, John Mitchell, Haixu Tang, XiaoFeng Wang |
USENIX Security '24 | Notus: Dynamic Proofs of Liabilities from Zero-knowledge RSA Accumulators | Jiajun Xin, Arman Haghighi, Xiangan Tian, Dimitrios Papadopoulos |
USENIX Security '24 | EVOKE: Efficient Revocation of Verifiable Credentials in IoT Networks | Carlo Mazzocca, Abbas Acar, Selcuk Uluagac, Rebecca Montanari |