USENIX Security '24 | An Interview Study on Third-Party Cyber Threat Hunting Processes in the U.S. Department of Homeland Security | William P. Maxam III, James C. Davis |
USENIX Security '24 | GFWeb: Measuring the Great Firewall's Web Censorship at Scale | Nguyen Phong Hoang, Jakub Dalek, Masashi Crete-Nishihata, Nicolas Christin, Vinod Yegneswaran, Michalis Polychronakis, Nick Feamster |
USENIX Security '24 | I/O-Efficient Dynamic Searchable Encryption meets Forward & Backward Privacy | Priyanka Mondal, Javad Ghareh Chamani, Ioannis Demertzis, Dimitrios Papadopoulos |
USENIX Security '24 | Assessing Suspicious Emails with Banner Warnings Among Blind and Low-Vision Users in Realistic Settings | Filipo Sharevski, Aziz Zeidieh |
USENIX Security '24 | d-DSE: Distinct Dynamic Searchable Encryption Resisting Volume Leakage in Encrypted Databases | Dongli Liu, Wei Wang, Peng Xu, Laurence T. Yang, Bo Luo, Kaitai Liang |
USENIX Security '24 | Exploring digital security and privacy in relative poverty in Germany through qualitative interviews | Anastassija Kostan, Sara Olschar, Lucy Simko, Yasemin Acar |
USENIX Security '24 | Snowflake, a censorship circumvention system using temporary WebRTC proxies | Cecylia Bocovich, Arlo Breault, David Fifield, Xiaokang Wang |
USENIX Security '24 | MD-ML: Super Fast Privacy-Preserving Machine Learning for Malicious Security with a Dishonest Majority | Boshi Yuan, Shixuan Yang, Yongxiang Zhang, Ning Ding, Dawu Gu, Shi-Feng Sun |
USENIX Security '24 | Property Existence Inference against Generative Models | Lijin Wang, Jingjing Wang, Jie Wan, Lin Long, Ziqi Yang, Zhan Qin |
USENIX Security '24 | Large Language Models for Code Analysis: Do LLMs Really Do Their Job? | Chongzhou Fang, Ning Miao, Shaurya Srivastav, Jialin Liu, Ruoyu Zhang, Ruijie Fang, Ryan Tsang, Najmeh Nazari, Han Wang, Houman Homayoun |
USENIX Security '24 | Can Virtual Reality Protect Users from Keystroke Inference Attacks? | Zhuolin Yang, Zain Sarwar, Iris Hwang, Ronik Bhaskar, Ben Y. Zhao, Haitao Zheng |
USENIX Security '24 | Neural Network Semantic Backdoor Detection and Mitigation: A Causality-Based Approach | Bing Sun, Jun Sun, Wayne Koh, Jie Shi |
USENIX Security '24 | The Effect of Design Patterns on (Present and Future) Cookie Consent Decisions | Nataliia Bielova, Laura Litvine, Anysia Nguyen, Mariam Chammat, Vincent Toubiana, Estelle Hary |
USENIX Security '24 | ACAI: Protecting Accelerator Execution with Arm Confidential Computing Architecture | Supraja Sridhara, Andrin Bertschi, Benedict Schlüter, Mark Kuhne, Fabio Aliberti, Shweta Shinde |
USENIX Security '24 | How WEIRD is Usable Privacy and Security Research? | Ayako A. Hasegawa, Daisuke Inoue, Mitsuaki Akiyama |
USENIX Security '24 | NetShaper: A Differentially Private Network Side-Channel Mitigation System | Amir Sabzi, Rut Vora, Swati Goswami, Margo Seltzer, Mathias Lécuyer, Aastha Mehta |
USENIX Security '24 | Dissecting Privacy Perspectives of Websites Around the World: "Aceptar Todo, Alle Akzeptieren, Accept All..." | Aysun Ogut, Berke Turanlioglu, Doruk Can Metiner, Albert Levi, Cemal Yilmaz, Orcun Cetin, Selcuk Uluagac |
USENIX Security '24 | Sync+Sync: A Covert Channel Built on fsync with Storage | Qisheng Jiang, Chundong Wang |
USENIX Security '24 | Mudjacking: Patching Backdoor Vulnerabilities in Foundation Models | Hongbin Liu, Michael K. Reiter, Neil Zhenqiang Gong |
USENIX Security '24 | Pixel Thief: Exploiting SVG Filter Leakage in Firefox and Chrome | Sioli O'Connell, Lishay Aben Sour, Ron Magen, Daniel Genkin, Yossi Oren, Hovav Shacham, Yuval Yarom |
USENIX Security '24 | Unpacking Privacy Labels: A Measurement and Developer Perspective on Google's Data Safety Section | Rishabh Khandelwal, Asmit Nayak, Paul Chung, Kassem Fawaz |
USENIX Security '24 | That Doesn't Go There: Attacks on Shared State in Multi-User Augmented Reality Applications | Carter Slocum, Yicheng Zhang, Erfan Shayegani, Pedram Zaree, Nael Abu-Ghazaleh, Jiasi Chen |
USENIX Security '24 | On the Difficulty of Defending Contrastive Learning against Backdoor Attacks | Changjiang Li, Ren Pang, Bochuan Cao, Zhaohan Xi, Jinghui Chen, Shouling Ji, Ting Wang |
USENIX Security '24 | More Simplicity for Trainers, More Opportunity for Attackers: Black-Box Attacks on Speaker Recognition Systems by Inferring Feature Extractor | Yunjie Ge, Pinji Chen, Qian Wang, Lingchen Zhao, Ningping Mou, Peipei Jiang, Cong Wang, Qi Li, Chao Shen |
USENIX Security '24 | Transferability of White-box Perturbations: Query-Efficient Adversarial Attacks against Commercial DNN Services | Meng Shen, Changyue Li, Qi Li, Hao Lu, Liehuang Zhu, Ke Xu |