USENIX Security '24 | "I'm not convinced that they don't collect more than is necessary": User-Controlled Data Minimization Design in Search Engines | Tanusree Sharma, Lin Kyi, Yang Wang, Asia J. Biega |
USENIX Security '24 | Penetration Vision through Virtual Reality Headsets: Identifying 360-degree Videos from Head Movements | Anh Nguyen, Xiaokuan Zhang, Zhisheng Yan |
USENIX Security '24 | SOAP: A Social Authentication Protocol | Felix Linker, David Basin |
USENIX Security '24 | Logic Gone Astray: A Security Analysis Framework for the Control Plane Protocols of 5G Basebands | Kai Tu, Abdullah Al Ishtiaq, Syed Md Mukit Rashid, Yilu Dong, Weixuan Wang, Tianwei Wu, Syed Rafiul Hussain |
USENIX Security '24 | "What Keeps People Secure is That They Met The Security Team": Deconstructing Drivers And Goals of Organizational Security Awareness | Jonas Hielscher, Simon Parkin |
USENIX Security '24 | Fast RS-IOP Multivariate Polynomial Commitments and Verifiable Secret Sharing | Zongyang Zhang, Weihan Li, Yanpei Guo, Kexin Shi, Sherman S. M. Chow, Ximeng Liu, Jin Dong |
USENIX Security '24 | Rabbit-Mix: Robust Algebraic Anonymous Broadcast from Additive Bases | Chongwon Cho, Samuel Dittmer, Yuval Ishai, Steve Lu, Rafail Ostrovsky |
USENIX Security '24 | Abuse Reporting for Metadata-Hiding Communication Based on Secret Sharing | Saba Eskandarian |
USENIX Security '24 | PerfOMR: Oblivious Message Retrieval with Reduced Communication and Computation | Zeyu Liu, Eran Tromer, Yunhao Wang |
USENIX Security '24 | Data Subjects' Reactions to Exercising Their Right of Access | Arthur Borem, Elleen Pan, Olufunmilola Obielodan, Aurelie Roubinowitz, Luca Dovichi, Michelle L. Mazurek, Blase Ur |
USENIX Security '24 | Security and Privacy Software Creators' Perspectives on Unintended Consequences | Harshini Sri Ramulu, Helen Schmitt, Dominik Wermke, Yasemin Acar |
USENIX Security '24 | CAMP: Compiler and Allocator-based Heap Memory Protection | Zhenpeng Lin, Zheng Yu, Ziyi Guo, Simone Campanoni, Peter Dinda, Xinyu Xing |
USENIX Security '24 | SecurityNet: Assessing Machine Learning Vulnerabilities on Public Models | Boyang Zhang, Zheng Li, Ziqing Yang, Xinlei He, Michael Backes, Mario Fritz, Yang Zhang |
USENIX Security '24 | Machine Learning needs Better Randomness Standards: Randomised Smoothing and PRNG-based attacks | Pranav Dahiya, Ilia Shumailov, Ross Anderson |
USENIX Security '24 | Speculative Denial-of-Service Attacks In Ethereum | Aviv Yaish, Kaihua Qin, Liyi Zhou, Aviv Zohar, Arthur Gervais |
USENIX Security '24 | VoltSchemer: Use Voltage Noise to Manipulate Your Wireless Charger | Zihao Zhan, Yirui Yang, Haoqi Shan, Hanqiu Wang, Yier Jin, Shuo Wang |
USENIX Security '24 | Stop, Don't Click Here Anymore: Boosting Website Fingerprinting By Considering Sets of Subpages | Asya Mitseva, Andriy Panchenko |
USENIX Security '24 | MetaSafe: Compiling for Protecting Smart Pointer Metadata to Ensure Safe Rust Integrity | Martin Kayondo, Inyoung Bang, Yeongjun Kwak, Hyungon Moon, Yunheung Paek |
USENIX Security '24 | DONAPI: Malicious NPM Packages Detector using Behavior Sequence Knowledge Mapping | Cheng Huang, Nannan Wang, Ziyan Wang, Siqi Sun, Lingzi Li, Junren Chen, Qianchong Zhao, Jiaxuan Han, Zhen Yang, Lei Shi |
USENIX Security '24 | VibSpeech: Exploring Practical Wideband Eavesdropping via Bandlimited Signal of Vibration-based Side Channel | Chao Wang, Feng Lin, Hao Yan, Tong Wu, Wenyao Xu, Kui Ren |
USENIX Security '24 | PatchCURE: Improving Certifiable Robustness, Model Utility, and Computation Efficiency of Adversarial Patch Defenses | Chong Xiang, Tong Wu, Sihui Dai, Jonathan Petit, Suman Jana, Prateek Mittal |
USENIX Security '24 | Fledging Will Continue Until Privacy Improves: Empirical Analysis of Google's Privacy-Preserving Targeted Advertising | Giuseppe Calderonio, Mir Masood Ali, Jason Polakis |
USENIX Security '24 | ZKSMT: A VM for Proving SMT Theorems in Zero Knowledge | Daniel Luick, John C. Kolesar, Timos Antonopoulos, William R. Harris, James Parker, Ruzica Piskac, Eran Tromer, Xiao Wang, Ning Luo |
USENIX Security '24 | HECKLER: Breaking Confidential VMs with Malicious Interrupts | Benedict Schlüter, Supraja Sridhara, Mark Kuhne, Andrin Bertschi, Shweta Shinde |
USENIX Security '24 | Scalable Zero-knowledge Proofs for Non-linear Functions in Machine Learning | Meng Hao, Hanxiao Chen, Hongwei Li, Chenkai Weng, Yuan Zhang, Haomiao Yang, Tianwei Zhang |