USENIX Security '24 | D-Helix: A Generic Decompiler Testing Framework Using Symbolic Differentiation | Muqi Zou, Arslan Khan, Ruoyu Wu, Han Gao, Antonio Bianchi, Dave (Jing) Tian |
USENIX Security '24 | SWOOSH: Efficient Lattice-Based Non-Interactive Key Exchange | Phillip Gajland, Bor de Kock, Miguel Quaresma, Giulio Malavolta, Peter Schwabe |
USENIX Security '24 | Towards Privacy-Preserving Social-Media SDKs on Android | Haoran Lu, Yichen Liu, Xiaojing Liao, Luyi Xing |
USENIX Security '24 | DVa: Extracting Victims and Abuse Vectors from Android Accessibility Malware | Haichuan Xu, Mingxuan Yao, Runze Zhang, Mohamed Moustafa Dawoud, Jeman Park, Brendan Saltaformaggio |
USENIX Security '24 | SoK: State of the Krawlers – Evaluating the Effectiveness of Crawling Algorithms for Web Security Measurements | Aleksei Stafeev, Giancarlo Pellegrino |
USENIX Security '24 | Web Platform Threats: Automated Detection of Web Security Issues With WPT | Pedro Bernardo, Lorenzo Veronese, Valentino Dalla Valle, Stefano Calzavara, Marco Squarcina, Pedro Adão, Matteo Maffei |
USENIX Security '24 | Fuzzing BusyBox: Leveraging LLM and Crash Reuse for Embedded Bug Unearthing | Yaroslav Oliinyk, Michael Scott, Ryan Tsang, Chongzhou Fang, Houman Homayoun |
USENIX Security '24 | SoK: The Good, The Bad, and The Unbalanced: Measuring Structural Limitations of Deepfake Media Datasets | Seth Layton, Tyler Tucker, Daniel Olszewski, Kevin Warren, Kevin Butler, Patrick Traynor |
USENIX Security '24 | GoFetch: Breaking Constant-Time Cryptographic Implementations Using Data Memory-Dependent Prefetchers | Boru Chen, Yingchen Wang, Pradyumna Shome, Christopher Fletcher, David Kohlbrenner, Riccardo Paccagnella, Daniel Genkin |
USENIX Security '24 | CacheWarp: Software-based Fault Injection using Selective State Reset | Ruiyi Zhang, Lukas Gerlach, Daniel Weber, Lorenz Hetterich, Youheng Lü, Andreas Kogler, Michael Schwarz |
USENIX Security '24 | SeaK: Rethinking the Design of a Secure Allocator for OS Kernel | Zicheng Wang, Yicheng Guang, Yueqi Chen, Zhenpeng Lin, Michael Le, Dang K Le, Dan Williams, Xinyu Xing, Zhongshu Gu, Hani Jamjoom |
USENIX Security '24 | SafeFetch: Practical Double-Fetch Protection with Kernel-Fetch Caching | Victor Duta, Mitchel Josephus Aloserij, Cristiano Giuffrida |
USENIX Security '24 | Practical Data-Only Attack Generation | Brian Johannesmeyer, Asia Slowinska, Herbert Bos, Cristiano Giuffrida |
USENIX Security '24 | Two Shuffles Make a RAM: Improved Constant Overhead Zero Knowledge RAM | Yibin Yang, David Heath |
USENIX Security '24 | Notus: Dynamic Proofs of Liabilities from Zero-knowledge RSA Accumulators | Jiajun Xin, Arman Haghighi, Xiangan Tian, Dimitrios Papadopoulos |
USENIX Security '24 | ABACuS: All-Bank Activation Counters for Scalable and Low Overhead RowHammer Mitigation | Ataberk Olgun, Yahya Can Tugrul, Nisa Bostanci, Ismail Emir Yuksel, Haocong Luo, Steve Rhyner, Abdullah Giray Yaglikci, Geraldo F. Oliveira, Onur Mutlu |
USENIX Security '24 | SledgeHammer: Amplifying Rowhammer via Bank-level Parallelism | Ingab Kang, Walter Wang, Jason Kim, Stephan van Schaik, Youssef Tobah, Daniel Genkin, Andrew Kwong, Yuval Yarom |
USENIX Security '24 | AI Psychiatry: Forensic Investigation of Deep Learning Networks in Memory Images | David Oygenblik, Carter Yagemann, Joseph Zhang, Arianna Mastali, Jeman Park, Brendan Saltaformaggio |
USENIX Security '24 | Automated Large-Scale Analysis of Cookie Notice Compliance | Ahmed Bouhoula, Karel Kubicek, Amit Zac, Carlos Cotrini, David Basin |
USENIX Security '24 | Code is not Natural Language: Unlock the Power of Semantics-Oriented Graph Representation for Binary Code Similarity Detection | Haojie He, Xingwei Lin, Ziang Weng, Ruijie Zhao, Shuitao Gan, Libo Chen, Yuede Ji, Jiashui Wang, Zhi Xue |
USENIX Security '24 | Inference of Error Specifications and Bug Detection Using Structural Similarities | Niels Dossche, Bart Coppens |
USENIX Security '24 | Scalable Multi-Party Computation Protocols for Machine Learning in the Honest-Majority Setting | |
USENIX Security '24 | The Challenges of Bringing Cryptography from Research Papers to Products: Results from an Interview Study with Experts | Konstantin Fischer, Ivana Trummová, Phillip Gajland, Yasemin Acar, Sascha Fahl, Angela Sasse |
USENIX Security '24 | "These results must be false": A usability evaluation of constant-time analysis tools | Marcel Fourné, Daniel De Almeida Braga, Jan Jancar, Mohamed Sabt, Peter Schwabe, Gilles Barthe, Pierre-Alain Fouque, Yasemin Acar |
USENIX Security '24 | From the Childhood Past: Views of Young Adults on Parental Sharing of Children's Photos | Tania Ghafourian, Nicholas Micallef, Sameer Patil |