USENIX Security '24 | That Doesn't Go There: Attacks on Shared State in Multi-User Augmented Reality Applications | Carter Slocum, Yicheng Zhang, Erfan Shayegani, Pedram Zaree, Nael Abu-Ghazaleh, Jiasi Chen |
USENIX Security '24 | On the Difficulty of Defending Contrastive Learning against Backdoor Attacks | Changjiang Li, Ren Pang, Bochuan Cao, Zhaohan Xi, Jinghui Chen, Shouling Ji, Ting Wang |
USENIX Security '24 | More Simplicity for Trainers, More Opportunity for Attackers: Black-Box Attacks on Speaker Recognition Systems by Inferring Feature Extractor | Yunjie Ge, Pinji Chen, Qian Wang, Lingchen Zhao, Ningping Mou, Peipei Jiang, Cong Wang, Qi Li, Chao Shen |
USENIX Security '24 | Transferability of White-box Perturbations: Query-Efficient Adversarial Attacks against Commercial DNN Services | Meng Shen, Changyue Li, Qi Li, Hao Lu, Liehuang Zhu, Ke Xu |
USENIX Security '24 | "I'm not convinced that they don't collect more than is necessary": User-Controlled Data Minimization Design in Search Engines | Tanusree Sharma, Lin Kyi, Yang Wang, Asia J. Biega |
USENIX Security '24 | Penetration Vision through Virtual Reality Headsets: Identifying 360-degree Videos from Head Movements | Anh Nguyen, Xiaokuan Zhang, Zhisheng Yan |
USENIX Security '24 | SOAP: A Social Authentication Protocol | Felix Linker, David Basin |
USENIX Security '24 | Logic Gone Astray: A Security Analysis Framework for the Control Plane Protocols of 5G Basebands | Kai Tu, Abdullah Al Ishtiaq, Syed Md Mukit Rashid, Yilu Dong, Weixuan Wang, Tianwei Wu, Syed Rafiul Hussain |
USENIX Security '24 | "What Keeps People Secure is That They Met The Security Team": Deconstructing Drivers And Goals of Organizational Security Awareness | Jonas Hielscher, Simon Parkin |
USENIX Security '24 | Fast RS-IOP Multivariate Polynomial Commitments and Verifiable Secret Sharing | Zongyang Zhang, Weihan Li, Yanpei Guo, Kexin Shi, Sherman S. M. Chow, Ximeng Liu, Jin Dong |
USENIX Security '24 | Rabbit-Mix: Robust Algebraic Anonymous Broadcast from Additive Bases | Chongwon Cho, Samuel Dittmer, Yuval Ishai, Steve Lu, Rafail Ostrovsky |
USENIX Security '24 | Abuse Reporting for Metadata-Hiding Communication Based on Secret Sharing | Saba Eskandarian |
USENIX Security '24 | PerfOMR: Oblivious Message Retrieval with Reduced Communication and Computation | Zeyu Liu, Eran Tromer, Yunhao Wang |
USENIX Security '24 | Security and Privacy Software Creators' Perspectives on Unintended Consequences | Harshini Sri Ramulu, Helen Schmitt, Dominik Wermke, Yasemin Acar |
USENIX Security '24 | HECKLER: Breaking Confidential VMs with Malicious Interrupts | Benedict Schlüter, Supraja Sridhara, Mark Kuhne, Andrin Bertschi, Shweta Shinde |
USENIX Security '24 | Racing on the Negative Force: Efficient Vulnerability Root-Cause Analysis through Reinforcement Learning on Counterexamples | Dandan Xu, Di Tang, Yi Chen, XiaoFeng Wang, Kai Chen, Haixu Tang, Longxing Li |
USENIX Security '24 | CAMP: Compiler and Allocator-based Heap Memory Protection | Zhenpeng Lin, Zheng Yu, Ziyi Guo, Simone Campanoni, Peter Dinda, Xinyu Xing |
USENIX Security '24 | Splitting the Difference on Adversarial Training | Matan Levi, Aryeh Kontorovich |
USENIX Security '24 | SecurityNet: Assessing Machine Learning Vulnerabilities on Public Models | Boyang Zhang, Zheng Li, Ziqing Yang, Xinlei He, Michael Backes, Mario Fritz, Yang Zhang |
USENIX Security '24 | VoltSchemer: Use Voltage Noise to Manipulate Your Wireless Charger | Zihao Zhan, Yirui Yang, Haoqi Shan, Hanqiu Wang, Yier Jin, Shuo Wang |
USENIX Security '24 | OPTIKS: An Optimized Key Transparency System | Julia Len, Melissa Chase, Esha Ghosh, Kim Laine, Radames Cruz Moreno |
USENIX Security '24 | Stop, Don't Click Here Anymore: Boosting Website Fingerprinting By Considering Sets of Subpages | Asya Mitseva, Andriy Panchenko |
USENIX Security '24 | MetaSafe: Compiling for Protecting Smart Pointer Metadata to Ensure Safe Rust Integrity | Martin Kayondo, Inyoung Bang, Yeongjun Kwak, Hyungon Moon, Yunheung Paek |
USENIX Security '24 | DONAPI: Malicious NPM Packages Detector using Behavior Sequence Knowledge Mapping | Cheng Huang, Nannan Wang, Ziyan Wang, Siqi Sun, Lingzi Li, Junren Chen, Qianchong Zhao, Jiaxuan Han, Zhen Yang, Lei Shi |
USENIX Security '24 | VibSpeech: Exploring Practical Wideband Eavesdropping via Bandlimited Signal of Vibration-based Side Channel | Chao Wang, Feng Lin, Hao Yan, Tong Wu, Wenyao Xu, Kui Ren |