USENIX Security '24 | Automated Large-Scale Analysis of Cookie Notice Compliance | Ahmed Bouhoula, Karel Kubicek, Amit Zac, Carlos Cotrini, David Basin |
USENIX Security '24 | You Cannot Escape Me: Detecting Evasions of SIEM Rules in Enterprise Networks | Rafael Uetz, Marco Herzog, Louis Hackländer, Simon Schwarz, Martin Henze |
USENIX Security '24 | Can Virtual Reality Protect Users from Keystroke Inference Attacks? | Zhuolin Yang, Zain Sarwar, Iris Hwang, Ronik Bhaskar, Ben Y. Zhao, Haitao Zheng |
USENIX Security '24 | Neural Network Semantic Backdoor Detection and Mitigation: A Causality-Based Approach | Bing Sun, Jun Sun, Wayne Koh, Jie Shi |
USENIX Security '24 | Finding Traceability Attacks in the Bluetooth Low Energy Specification and Its Implementations | Jianliang Wu, Patrick Traynor, Dongyan Xu, Dave (Jing) Tian, Antonio Bianchi |
USENIX Security '24 | Devil in the Room: Triggering Audio Backdoors in the Physical World | Meng Chen, Xiangyu Xu, Li Lu, Zhongjie Ba, Feng Lin, Kui Ren |
USENIX Security '24 | Atropos: Effective Fuzzing of Web Applications for Server-Side Vulnerabilities | Emre Güler, Sergej Schumilo, Moritz Schloegel, Nils Bars, Philipp Görz, Xinyi Xu, Cemal Kaygusuz, Thorsten Holz |
USENIX Security '24 | FraudWhistler: A Resilient, Robust and Plug-and-play Adversarial Example Detection Method for Speaker Recognition | Kun Wang, Xiangyu Xu, Li Lu, Zhongjie Ba, Feng Lin, Kui Ren |
USENIX Security '24 | Dancer in the Dark: Synthesizing and Evaluating Polyglots for Blind Cross-Site Scripting | Robin Kirchner, Jonas Möller, Marius Musch, David Klein, Konrad Rieck, Martin Johns |
USENIX Security '24 | ResolverFuzz: Automated Discovery of DNS Resolver Vulnerabilities with Query-Response Fuzzing | Qifan Zhang, Xuesong Bai, Xiang Li, Haixin Duan, Qi Li, Zhou Li |
USENIX Security '24 | Ahoy SAILR! There is No Need to DREAM of C: A Compiler-Aware Structuring Algorithm for Binary Decompilation | Zion Leonahenahe Basque, Ati Priya Bajaj, Wil Gibbs, Jude O'Kain, Derron Miao, Tiffany Bao, Adam Doupé, Yan Shoshitaishvili, Ruoyu Wang |
USENIX Security '24 | Racing on the Negative Force: Efficient Vulnerability Root-Cause Analysis through Reinforcement Learning on Counterexamples | Dandan Xu, Di Tang, Yi Chen, XiaoFeng Wang, Kai Chen, Haixu Tang, Longxing Li |
USENIX Security '24 | WEBRR: A Forensic System for Replaying and Investigating Web-Based Attacks in The Modern Web | Joey Allen, Zheng Yang, Feng Xiao, Matthew Landen, Roberto Perdisci, Wenke Lee |
USENIX Security '24 | Unleashing the Power of Type-Based Call Graph Construction by Using Regional Pointer Information | Yuandao Cai, Yibo Jin, Charles Zhang |
USENIX Security '24 | The Effect of Design Patterns on (Present and Future) Cookie Consent Decisions | Nataliia Bielova, Laura Litvine, Anysia Nguyen, Mariam Chammat, Vincent Toubiana, Estelle Hary |
USENIX Security '24 | RECORD: A RECeption-Only Region Determination Attack on LEO Satellite Users | Eric Jedermann, Martin Strohmeier, Vincent Lenders, Jens Schmitt |
USENIX Security '24 | A Taxonomy of C Decompiler Fidelity Issues | Luke Dramko, Jeremy Lacomis, Edward J. Schwartz, Bogdan Vasilescu, Claire Le Goues |
USENIX Security '24 | CAMP: Compiler and Allocator-based Heap Memory Protection | Zhenpeng Lin, Zheng Yu, Ziyi Guo, Simone Campanoni, Peter Dinda, Xinyu Xing |
USENIX Security '24 | "Belt and suspenders" or "just red tape"?: Investigating Early Artifacts and User Perceptions of IoT App Security Certification | Prianka Mandal, Amit Seal Ami, Victor Olaiya, Sayyed Hadi Razmjo, Adwait Nadkarni |
USENIX Security '24 | Go Go Gadget Hammer: Flipping Nested Pointers for Arbitrary Data Leakage | Youssef Tobah, Andrew Kwong, Ingab Kang, Daniel Genkin, Kang G. Shin |
USENIX Security '24 | FFXE: Dynamic Control Flow Graph Recovery for Embedded Firmware Binaries | Ryan Tsang, Doreen Joseph, Soheil Salehi, Prasant Mohapatra, Houman Homayoun |
USENIX Security '24 | Your Firmware Has Arrived: A Study of Firmware Update Vulnerabilities | Yuhao Wu, Jinwen Wang, Yujie Wang, Shixuan Zhai, Zihan Li, Yi He, Kun Sun, Qi Li, Ning Zhang |
USENIX Security '24 | Opportunistic Data Flow Integrity for Real-time Cyber-physical Systems Using Worst Case Execution Time Reservation | Yujie Wang, Ao Li, Jinwen Wang, Sanjoy Baruah, Ning Zhang |
USENIX Security '24 | MAGIC: Detecting Advanced Persistent Threats via Masked Graph Representation Learning | Zian Jia, Yun Xiong, Yuhong Nan, Yao Zhang, Jinjing Zhao, Mi Wen |
USENIX Security '24 | Security and Privacy Analysis of Samsung's Crowd-Sourced Bluetooth Location Tracking System | Tingfeng Yu, James Henderson, Alwen Tiu, Thomas Haines |