USENIX Security '24 | What IF Is Not Enough? Fixing Null Pointer Dereference With Contextual Check | Yunlong Xing, Shu Wang, Shiyu Sun, Xu He, Kun Sun, Qi Li |
USENIX Security '24 | Towards Generic Database Management System Fuzzing | Yupeng Yang, Yongheng Chen, Rui Zhong, Jizhou Chen, Wenke Lee |
USENIX Security '24 | Don't Waste My Efforts: Pruning Redundant Sanitizer Checks by Developer-Implemented Type Checks | Yizhuo Zhai, Zhiyun Qian, Chengyu Song, Manu Sridharan, Trent Jaeger, Paul Yu, Srikanth V. Krishnamurthy |
USENIX Security '24 | Hermes: Unlocking Security Analysis of Cellular Network Protocols by Synthesizing Finite State Machines from Natural Language Specifications | Abdullah Al Ishtiaq, Sarkar Snigdha Sarathi Das, Syed Md Mukit Rashid, Ali Ranjbar, Kai Tu, Tianwei Wu, Zhezheng Song, Weixuan Wang, Mujtahid Akon, Rui Zhang, Syed Rafiul Hussain |
USENIX Security '24 | Understanding the Security and Privacy Implications of Online Toxic Content on Refugees | Arjun Arunasalam, Habiba Farrukh, Eliz Tekcan, Z. Berkay Celik |
USENIX Security '24 | AutoFHE: Automated Adaption of CNNs for Efficient Evaluation over FHE | Wei Ao, Vishnu Naresh Boddeti |
USENIX Security '24 | The Effect of Design Patterns on (Present and Future) Cookie Consent Decisions | Nataliia Bielova, Laura Litvine, Anysia Nguyen, Mariam Chammat, Vincent Toubiana, Estelle Hary |
USENIX Security '24 | Snowflake, a censorship circumvention system using temporary WebRTC proxies | Cecylia Bocovich, Arlo Breault, David Fifield, Xiaokang Wang |
USENIX Security '24 | Data Subjects' Reactions to Exercising Their Right of Access | Arthur Borem, Elleen Pan, Olufunmilola Obielodan, Aurelie Roubinowitz, Luca Dovichi, Michelle L. Mazurek, Blase Ur |
USENIX Security '24 | Fledging Will Continue Until Privacy Improves: Empirical Analysis of Google's Privacy-Preserving Targeted Advertising | Giuseppe Calderonio, Mir Masood Ali, Jason Polakis |
USENIX Security '24 | Learning with Semantics: Towards a Semantics-Aware Routing Anomaly Detection System | Yihao Chen, Qilei Yin, Qi Li, Zhuotao Liu, Ke Xu, Yi Xu, Mingwei Xu, Ziqian Liu, Jianping Wu |
USENIX Security '24 | Does Online Anonymous Market Vendor Reputation Matter? | Alejandro Cuevas, Nicolas Christin |
USENIX Security '24 | Exploring Covert Third-party Identifiers through External Storage in the Android New Era | Zikan Dong, Tianming Liu, Jiapeng Deng, Li Li, Minghui Yang, Meng Wang, Guosheng Xu, Guoai Xu |
USENIX Security '24 | Atropos: Effective Fuzzing of Web Applications for Server-Side Vulnerabilities | Emre Güler, Sergej Schumilo, Moritz Schloegel, Nils Bars, Philipp Görz, Xinyi Xu, Cemal Kaygusuz, Thorsten Holz |
USENIX Security '24 | Scalable Zero-knowledge Proofs for Non-linear Functions in Machine Learning | Meng Hao, Hanxiao Chen, Hongwei Li, Chenkai Weng, Yuan Zhang, Haomiao Yang, Tianwei Zhang |
USENIX Security '24 | How WEIRD is Usable Privacy and Security Research? | Ayako A. Hasegawa, Daisuke Inoue, Mitsuaki Akiyama |
USENIX Security '24 | "What Keeps People Secure is That They Met The Security Team": Deconstructing Drivers And Goals of Organizational Security Awareness | Jonas Hielscher, Simon Parkin |
USENIX Security '24 | DONAPI: Malicious NPM Packages Detector using Behavior Sequence Knowledge Mapping | Cheng Huang, Nannan Wang, Ziyan Wang, Siqi Sun, Lingzi Li, Junren Chen, Qianchong Zhao, Jiaxuan Han, Zhen Yang, Lei Shi |
USENIX Security '24 | GFWeb: Measuring the Great Firewall's Web Censorship at Scale | Nguyen Phong Hoang, Jakub Dalek, Masashi Crete-Nishihata, Nicolas Christin, Vinod Yegneswaran, Michalis Polychronakis, Nick Feamster |
USENIX Security '24 | Sync+Sync: A Covert Channel Built on fsync with Storage | Qisheng Jiang, Chundong Wang |
USENIX Security '24 | SDFuzz: Target States Driven Directed Fuzzing | Penghui Li, Wei Meng, Chao Zhang |
USENIX Security '24 | SOAP: A Social Authentication Protocol | Felix Linker, David Basin |
USENIX Security '24 | Stop, Don't Click Here Anymore: Boosting Website Fingerprinting By Considering Sets of Subpages | Asya Mitseva, Andriy Panchenko |
USENIX Security '24 | Dissecting Privacy Perspectives of Websites Around the World: "Aceptar Todo, Alle Akzeptieren, Accept All..." | Aysun Ogut, Berke Turanlioglu, Doruk Can Metiner, Albert Levi, Cemal Yilmaz, Orcun Cetin, Selcuk Uluagac |
USENIX Security '24 | CalcuLatency: Leveraging Cross-Layer Network Latency Measurements to Detect Proxy-Enabled Abuse | Reethika Ramesh, Philipp Winter, Sam Korman, Roya Ensafi |