USENIX Security '24 | Wireless Signal Injection Attacks on VSAT Satellite Modems | Robin Bisping, Johannes Willbold, Martin Strohmeier, Vincent Lenders |
USENIX Security '24 | Devil in the Room: Triggering Audio Backdoors in the Physical World | Meng Chen, Xiangyu Xu, Li Lu, Zhongjie Ba, Feng Lin, Kui Ren |
USENIX Security '24 | With Great Power Come Great Side Channels: Statistical Timing Side-Channel Analyses with Bounded Type-1 Errors | Martin Dunsche, Marcel Maehren, Nurullah Erinola, Robert Merget, Nicolai Bissantz, Juraj Somorovsky, Jörg Schwenk |
USENIX Security '24 | "I chose to fight, be brave, and to deal with it": Threat Experiences and Security Practices of Pakistani Content Creators | Lea Gröber, Waleed Arshad, Angelica Goetzen, Elissa M. Redmiles, Maryam Mustafa, Katharina Krombholz |
USENIX Security '24 | SmartCookie: Blocking Large-Scale SYN Floods with a Split-Proxy Defense on Programmable Data Planes | Sophia Yoo, Xiaoqi Chen, Jennifer Rexford |
USENIX Security '24 | Ahoy SAILR! There is No Need to DREAM of C: A Compiler-Aware Structuring Algorithm for Binary Decompilation | Zion Leonahenahe Basque, Ati Priya Bajaj, Wil Gibbs, Jude O'Kain, Derron Miao, Tiffany Bao, Adam Doupé, Yan Shoshitaishvili, Ruoyu Wang |
USENIX Security '24 | D-Helix: A Generic Decompiler Testing Framework Using Symbolic Differentiation | Muqi Zou, Arslan Khan, Ruoyu Wu, Han Gao, Antonio Bianchi, Dave (Jing) Tian |
USENIX Security '24 | SWOOSH: Efficient Lattice-Based Non-Interactive Key Exchange | Phillip Gajland, Bor de Kock, Miguel Quaresma, Giulio Malavolta, Peter Schwabe |
USENIX Security '24 | Towards Privacy-Preserving Social-Media SDKs on Android | Haoran Lu, Yichen Liu, Xiaojing Liao, Luyi Xing |
USENIX Security '24 | DVa: Extracting Victims and Abuse Vectors from Android Accessibility Malware | Haichuan Xu, Mingxuan Yao, Runze Zhang, Mohamed Moustafa Dawoud, Jeman Park, Brendan Saltaformaggio |
USENIX Security '24 | SoK: State of the Krawlers – Evaluating the Effectiveness of Crawling Algorithms for Web Security Measurements | Aleksei Stafeev, Giancarlo Pellegrino |
USENIX Security '24 | Web Platform Threats: Automated Detection of Web Security Issues With WPT | Pedro Bernardo, Lorenzo Veronese, Valentino Dalla Valle, Stefano Calzavara, Marco Squarcina, Pedro Adão, Matteo Maffei |
USENIX Security '24 | Fuzzing BusyBox: Leveraging LLM and Crash Reuse for Embedded Bug Unearthing | Yaroslav Oliinyk, Michael Scott, Ryan Tsang, Chongzhou Fang, Houman Homayoun |
USENIX Security '24 | SoK: The Good, The Bad, and The Unbalanced: Measuring Structural Limitations of Deepfake Media Datasets | Seth Layton, Tyler Tucker, Daniel Olszewski, Kevin Warren, Kevin Butler, Patrick Traynor |
USENIX Security '24 | GoFetch: Breaking Constant-Time Cryptographic Implementations Using Data Memory-Dependent Prefetchers | Boru Chen, Yingchen Wang, Pradyumna Shome, Christopher Fletcher, David Kohlbrenner, Riccardo Paccagnella, Daniel Genkin |
USENIX Security '24 | CacheWarp: Software-based Fault Injection using Selective State Reset | Ruiyi Zhang, Lukas Gerlach, Daniel Weber, Lorenz Hetterich, Youheng Lü, Andreas Kogler, Michael Schwarz |
USENIX Security '24 | SeaK: Rethinking the Design of a Secure Allocator for OS Kernel | Zicheng Wang, Yicheng Guang, Yueqi Chen, Zhenpeng Lin, Michael Le, Dang K Le, Dan Williams, Xinyu Xing, Zhongshu Gu, Hani Jamjoom |
USENIX Security '24 | SafeFetch: Practical Double-Fetch Protection with Kernel-Fetch Caching | Victor Duta, Mitchel Josephus Aloserij, Cristiano Giuffrida |
USENIX Security '24 | Practical Data-Only Attack Generation | Brian Johannesmeyer, Asia Slowinska, Herbert Bos, Cristiano Giuffrida |
USENIX Security '24 | Two Shuffles Make a RAM: Improved Constant Overhead Zero Knowledge RAM | Yibin Yang, David Heath |
USENIX Security '24 | Notus: Dynamic Proofs of Liabilities from Zero-knowledge RSA Accumulators | Jiajun Xin, Arman Haghighi, Xiangan Tian, Dimitrios Papadopoulos |
USENIX Security '24 | ABACuS: All-Bank Activation Counters for Scalable and Low Overhead RowHammer Mitigation | Ataberk Olgun, Yahya Can Tugrul, Nisa Bostanci, Ismail Emir Yuksel, Haocong Luo, Steve Rhyner, Abdullah Giray Yaglikci, Geraldo F. Oliveira, Onur Mutlu |
USENIX Security '24 | SledgeHammer: Amplifying Rowhammer via Bank-level Parallelism | Ingab Kang, Walter Wang, Jason Kim, Stephan van Schaik, Youssef Tobah, Daniel Genkin, Andrew Kwong, Yuval Yarom |
USENIX Security '24 | AI Psychiatry: Forensic Investigation of Deep Learning Networks in Memory Images | David Oygenblik, Carter Yagemann, Joseph Zhang, Arianna Mastali, Jeman Park, Brendan Saltaformaggio |
USENIX Security '24 | Automated Large-Scale Analysis of Cookie Notice Compliance | Ahmed Bouhoula, Karel Kubicek, Amit Zac, Carlos Cotrini, David Basin |