USENIX Security '24 | ZenHammer: Rowhammer Attacks on AMD Zen-based Platforms | Patrick Jattke, Max Wipfli, Flavien Solt, Michele Marazzi, Matej Bölcskei, Kaveh Razavi |
USENIX Security '24 | Practical Data-Only Attack Generation | Brian Johannesmeyer, Asia Slowinska, Herbert Bos, Cristiano Giuffrida |
USENIX Security '24 | dp-promise: Differentially Private Diffusion Probabilistic Models for Image Synthesis | Haichen Wang, Shuchao Pang, Zhigang Lu, Yihang Rao, Yongbin Zhou, Minhui Xue |
USENIX Security '24 | GoFetch: Breaking Constant-Time Cryptographic Implementations Using Data Memory-Dependent Prefetchers | Boru Chen, Yingchen Wang, Pradyumna Shome, Christopher Fletcher, David Kohlbrenner, Riccardo Paccagnella, Daniel Genkin |
USENIX Security '24 | SafeFetch: Practical Double-Fetch Protection with Kernel-Fetch Caching | Victor Duta, Mitchel Josephus Aloserij, Cristiano Giuffrida |
USENIX Security '24 | SoK: The Good, The Bad, and The Unbalanced: Measuring Structural Limitations of Deepfake Media Datasets | Seth Layton, Tyler Tucker, Daniel Olszewski, Kevin Warren, Kevin Butler, Patrick Traynor |
USENIX Security '24 | SeaK: Rethinking the Design of a Secure Allocator for OS Kernel | Zicheng Wang, Yicheng Guang, Yueqi Chen, Zhenpeng Lin, Michael Le, Dang K Le, Dan Williams, Xinyu Xing, Zhongshu Gu, Hani Jamjoom |
USENIX Security '24 | DARKFLEECE: Probing the Dark Side of Android Subscription Apps | Chang Yue, Chen Zhong, Kai Chen, Zhiyu Zhang, Yeonjoon Lee |
USENIX Security '24 | Accelerating Secure Collaborative Machine Learning with Protocol-Aware RDMA | Zhenghang Ren, Mingxuan Fan, Zilong Wang, Junxue Zhang, Chaoliang Zeng, Zhicong Huang, Cheng Hong, Kai Chen |
USENIX Security '24 | Understanding How to Inform Blind and Low-Vision Users about Data Privacy through Privacy Question Answering Assistants | Yuanyuan Feng, Abhilasha Ravichander, Yaxing Yao, Shikun Zhang, Rex Chen |
USENIX Security '24 | Scalable Multi-Party Computation Protocols for Machine Learning in the Honest-Majority Setting | |
USENIX Security '24 | AutoFHE: Automated Adaption of CNNs for Efficient Evaluation over FHE | Wei Ao, Vishnu Naresh Boddeti |
USENIX Security '24 | SDFuzz: Target States Driven Directed Fuzzing | Penghui Li, Wei Meng, Chao Zhang |
USENIX Security '24 | FEASE: Fast and Expressive Asymmetric Searchable Encryption | Long Meng, Liqun Chen, Yangguang Tian, Mark Manulis, Suhui Liu |
USENIX Security '24 | Critical Code Guided Directed Greybox Fuzzing for Commits | Yi Xiang, Xuhong Zhang, Peiyu Liu, Shouling Ji, Hong Liang, Jiacheng Xu, Wenhai Wang |
USENIX Security '24 | A Linear Reconstruction Approach for Attribute Inference Attacks against Synthetic Data | Meenatchi Sundaram Muthu Selva Annamalai, Andrea Gadotti, Luc Rocher |
USENIX Security '24 | Fast and Private Inference of Deep Neural Networks by Co-designing Activation Functions | Abdulrahman Diaa, Lucas Fenaux, Thomas Humphries, Marian Dietz, Faezeh Ebrahimianghazani, Bailey Kacsmar, Xinda Li, Nils Lukas, Rasoul Akhavan Mahdavi, Simon Oya, Ehsan Amjadian, Florian Kerschbaum |
USENIX Security '24 | Query Recovery from Easy to Hard: Jigsaw Attack against SSE | Hao Nie, Wei Wang, Peng Xu, Xianglong Zhang, Laurence T. Yang, Kaitai Liang |
USENIX Security '24 | CalcuLatency: Leveraging Cross-Layer Network Latency Measurements to Detect Proxy-Enabled Abuse | Reethika Ramesh, Philipp Winter, Sam Korman, Roya Ensafi |
USENIX Security '24 | 6Sense: Internet-Wide IPv6 Scanning and its Security Applications | Grant Williams, Mert Erdemir, Amanda Hsu, Shraddha Bhat, Abhishek Bhaskar, Frank Li, Paul Pearce |
USENIX Security '24 | Intellectual Property Exposure: Subverting and Securing Intellectual Property Encapsulation in Texas Instruments Microcontrollers | Marton Bognar, Cas Magnus, Frank Piessens, Jo Van Bulck |
USENIX Security '24 | An Interview Study on Third-Party Cyber Threat Hunting Processes in the U.S. Department of Homeland Security | William P. Maxam III, James C. Davis |
USENIX Security '24 | Inference of Error Specifications and Bug Detection Using Structural Similarities | Niels Dossche, Bart Coppens |
USENIX Security '24 | GFWeb: Measuring the Great Firewall's Web Censorship at Scale | Nguyen Phong Hoang, Jakub Dalek, Masashi Crete-Nishihata, Nicolas Christin, Vinod Yegneswaran, Michalis Polychronakis, Nick Feamster |
USENIX Security '24 | I/O-Efficient Dynamic Searchable Encryption meets Forward & Backward Privacy | Priyanka Mondal, Javad Ghareh Chamani, Ioannis Demertzis, Dimitrios Papadopoulos |