USENIX Security '24 | On the Difficulty of Defending Contrastive Learning against Backdoor Attacks | Changjiang Li, Ren Pang, Bochuan Cao, Zhaohan Xi, Jinghui Chen, Shouling Ji, Ting Wang |
USENIX Security '24 | More Simplicity for Trainers, More Opportunity for Attackers: Black-Box Attacks on Speaker Recognition Systems by Inferring Feature Extractor | Yunjie Ge, Pinji Chen, Qian Wang, Lingchen Zhao, Ningping Mou, Peipei Jiang, Cong Wang, Qi Li, Chao Shen |
USENIX Security '24 | Transferability of White-box Perturbations: Query-Efficient Adversarial Attacks against Commercial DNN Services | Meng Shen, Changyue Li, Qi Li, Hao Lu, Liehuang Zhu, Ke Xu |
USENIX Security '24 | "I'm not convinced that they don't collect more than is necessary": User-Controlled Data Minimization Design in Search Engines | Tanusree Sharma, Lin Kyi, Yang Wang, Asia J. Biega |
USENIX Security '24 | Penetration Vision through Virtual Reality Headsets: Identifying 360-degree Videos from Head Movements | Anh Nguyen, Xiaokuan Zhang, Zhisheng Yan |
USENIX Security '24 | SOAP: A Social Authentication Protocol | Felix Linker, David Basin |
USENIX Security '24 | Logic Gone Astray: A Security Analysis Framework for the Control Plane Protocols of 5G Basebands | Kai Tu, Abdullah Al Ishtiaq, Syed Md Mukit Rashid, Yilu Dong, Weixuan Wang, Tianwei Wu, Syed Rafiul Hussain |
USENIX Security '24 | "What Keeps People Secure is That They Met The Security Team": Deconstructing Drivers And Goals of Organizational Security Awareness | Jonas Hielscher, Simon Parkin |
USENIX Security '24 | Fast RS-IOP Multivariate Polynomial Commitments and Verifiable Secret Sharing | Zongyang Zhang, Weihan Li, Yanpei Guo, Kexin Shi, Sherman S. M. Chow, Ximeng Liu, Jin Dong |
USENIX Security '24 | Rabbit-Mix: Robust Algebraic Anonymous Broadcast from Additive Bases | Chongwon Cho, Samuel Dittmer, Yuval Ishai, Steve Lu, Rafail Ostrovsky |
USENIX Security '24 | Abuse Reporting for Metadata-Hiding Communication Based on Secret Sharing | Saba Eskandarian |
USENIX Security '24 | PerfOMR: Oblivious Message Retrieval with Reduced Communication and Computation | Zeyu Liu, Eran Tromer, Yunhao Wang |
USENIX Security '24 | Data Subjects' Reactions to Exercising Their Right of Access | Arthur Borem, Elleen Pan, Olufunmilola Obielodan, Aurelie Roubinowitz, Luca Dovichi, Michelle L. Mazurek, Blase Ur |
USENIX Security '24 | Security and Privacy Software Creators' Perspectives on Unintended Consequences | Harshini Sri Ramulu, Helen Schmitt, Dominik Wermke, Yasemin Acar |
USENIX Security '24 | CAMP: Compiler and Allocator-based Heap Memory Protection | Zhenpeng Lin, Zheng Yu, Ziyi Guo, Simone Campanoni, Peter Dinda, Xinyu Xing |
USENIX Security '24 | SecurityNet: Assessing Machine Learning Vulnerabilities on Public Models | Boyang Zhang, Zheng Li, Ziqing Yang, Xinlei He, Michael Backes, Mario Fritz, Yang Zhang |
USENIX Security '24 | Machine Learning needs Better Randomness Standards: Randomised Smoothing and PRNG-based attacks | Pranav Dahiya, Ilia Shumailov, Ross Anderson |
USENIX Security '24 | Speculative Denial-of-Service Attacks In Ethereum | Aviv Yaish, Kaihua Qin, Liyi Zhou, Aviv Zohar, Arthur Gervais |
USENIX Security '24 | VoltSchemer: Use Voltage Noise to Manipulate Your Wireless Charger | Zihao Zhan, Yirui Yang, Haoqi Shan, Hanqiu Wang, Yier Jin, Shuo Wang |
USENIX Security '24 | Stop, Don't Click Here Anymore: Boosting Website Fingerprinting By Considering Sets of Subpages | Asya Mitseva, Andriy Panchenko |
USENIX Security '24 | MetaSafe: Compiling for Protecting Smart Pointer Metadata to Ensure Safe Rust Integrity | Martin Kayondo, Inyoung Bang, Yeongjun Kwak, Hyungon Moon, Yunheung Paek |
USENIX Security '24 | DONAPI: Malicious NPM Packages Detector using Behavior Sequence Knowledge Mapping | Cheng Huang, Nannan Wang, Ziyan Wang, Siqi Sun, Lingzi Li, Junren Chen, Qianchong Zhao, Jiaxuan Han, Zhen Yang, Lei Shi |
USENIX Security '24 | VibSpeech: Exploring Practical Wideband Eavesdropping via Bandlimited Signal of Vibration-based Side Channel | Chao Wang, Feng Lin, Hao Yan, Tong Wu, Wenyao Xu, Kui Ren |
USENIX Security '24 | PatchCURE: Improving Certifiable Robustness, Model Utility, and Computation Efficiency of Adversarial Patch Defenses | Chong Xiang, Tong Wu, Sihui Dai, Jonathan Petit, Suman Jana, Prateek Mittal |
USENIX Security '24 | Fledging Will Continue Until Privacy Improves: Empirical Analysis of Google's Privacy-Preserving Targeted Advertising | Giuseppe Calderonio, Mir Masood Ali, Jason Polakis |