USENIX Security '24 | Understanding the Security and Privacy Implications of Online Toxic Content on Refugees | Arjun Arunasalam, Habiba Farrukh, Eliz Tekcan, Z. Berkay Celik |
USENIX Security '24 | Finding Traceability Attacks in the Bluetooth Low Energy Specification and Its Implementations | Jianliang Wu, Patrick Traynor, Dongyan Xu, Dave (Jing) Tian, Antonio Bianchi |
USENIX Security '24 | Atropos: Effective Fuzzing of Web Applications for Server-Side Vulnerabilities | Emre Güler, Sergej Schumilo, Moritz Schloegel, Nils Bars, Philipp Görz, Xinyi Xu, Cemal Kaygusuz, Thorsten Holz |
USENIX Security '24 | ResolverFuzz: Automated Discovery of DNS Resolver Vulnerabilities with Query-Response Fuzzing | Qifan Zhang, Xuesong Bai, Xiang Li, Haixin Duan, Qi Li, Zhou Li |
USENIX Security '24 | Racing on the Negative Force: Efficient Vulnerability Root-Cause Analysis through Reinforcement Learning on Counterexamples | Dandan Xu, Di Tang, Yi Chen, XiaoFeng Wang, Kai Chen, Haixu Tang, Longxing Li |
USENIX Security '24 | Exploring Covert Third-party Identifiers through External Storage in the Android New Era | Zikan Dong, Tianming Liu, Jiapeng Deng, Li Li, Minghui Yang, Meng Wang, Guosheng Xu, Guoai Xu |
USENIX Security '24 | Hermes: Unlocking Security Analysis of Cellular Network Protocols by Synthesizing Finite State Machines from Natural Language Specifications | Abdullah Al Ishtiaq, Sarkar Snigdha Sarathi Das, Syed Md Mukit Rashid, Ali Ranjbar, Kai Tu, Tianwei Wu, Zhezheng Song, Weixuan Wang, Mujtahid Akon, Rui Zhang, Syed Rafiul Hussain |
USENIX Security '24 | Closed-Form Bounds for DP-SGD against Record-level Inference Attacks | Giovanni Cherubin, Boris Köpf, Andrew Paverd, Shruti Tople, Lukas Wutschitz, Santiago Zanella-Béguelin |
USENIX Security '24 | Does Online Anonymous Market Vendor Reputation Matter? | Alejandro Cuevas, Nicolas Christin |
USENIX Security '24 | OPTIKS: An Optimized Key Transparency System | Julia Len, Melissa Chase, Esha Ghosh, Kim Laine, Radames Cruz Moreno |
USENIX Security '24 | Arcanum: Detecting and Evaluating the Privacy Risks of Browser Extensions on Web Pages and Web Content | Qinge Xie, Manoj Vignesh Kasi Murali, Paul Pearce, Frank Li |
USENIX Security '24 | Smudged Fingerprints: Characterizing and Improving the Performance of Web Application Fingerprinting | Brian Kondracki, Nick Nikiforakis |
USENIX Security '24 | PURE: Payments with UWB RElay-protection | Daniele Coppola, Giovanni Camurati, Claudio Anliker, Xenia Hofmeier, Patrick Schaller, David Basin, Srdjan Capkun |
USENIX Security '24 | LaKey: Efficient Lattice-Based Distributed PRFs Enable Scalable Distributed Key Management | Matthias Geihs, Hart Montgomery |
USENIX Security '24 | Don't Listen To Me: Understanding and Exploring Jailbreak Prompts of Large Language Models | Zhiyuan Yu, Xiaogeng Liu, Shunning Liang, Zach Cameron, Chaowei Xiao, Ning Zhang |
USENIX Security '24 | Enabling Contextual Soft Moderation on Social Media through Contrastive Textual Deviation | Pujan Paudel, Mohammad Hammas Saeed, Rebecca Auger, Chris Wells, Gianluca Stringhini |
USENIX Security '24 | Ahoy SAILR! There is No Need to DREAM of C: A Compiler-Aware Structuring Algorithm for Binary Decompilation | Zion Leonahenahe Basque, Ati Priya Bajaj, Wil Gibbs, Jude O'Kain, Derron Miao, Tiffany Bao, Adam Doupé, Yan Shoshitaishvili, Ruoyu Wang |
USENIX Security '24 | Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs | Sebastian Angel, Eleftherios Ioannidis, Elizabeth Margolin, Srinath Setty, Jess Woods |
USENIX Security '24 | You Cannot Escape Me: Detecting Evasions of SIEM Rules in Enterprise Networks | Rafael Uetz, Marco Herzog, Louis Hackländer, Simon Schwarz, Martin Henze |
USENIX Security '24 | "Belt and suspenders" or "just red tape"?: Investigating Early Artifacts and User Perceptions of IoT App Security Certification | Prianka Mandal, Amit Seal Ami, Victor Olaiya, Sayyed Hadi Razmjo, Adwait Nadkarni |
USENIX Security '24 | MAGIC: Detecting Advanced Persistent Threats via Masked Graph Representation Learning | Zian Jia, Yun Xiong, Yuhong Nan, Yao Zhang, Jinjing Zhao, Mi Wen |
USENIX Security '24 | "I Don't Know If We're Doing Good. I Don't Know If We're Doing Bad": Investigating How Practitioners Scope, Motivate, and Conduct Privacy Work When Developing AI Products | Hao-Ping (Hank) Lee, Lan Gao, Stephanie Yang, Jodi Forlizzi, Sauvik Das |
USENIX Security '24 | Voice App Developer Experiences with Alexa and Google Assistant: Juggling Risks, Liability, and Security | William Seymour, Noura Abdi, Kopo M. Ramokapane, Jide Edu, Guillermo Suarez-Tangil, Jose Such |
USENIX Security '24 | Cascade: CPU Fuzzing via Intricate Program Generation | Flavien Solt, Katharina Ceesay-Seitz, Kaveh Razavi |
USENIX Security '24 | ModelGuard: Information-Theoretic Defense Against Model Extraction Attacks | Minxue Tang, Anna Dai, Louis DiValentin, Aolin Ding, Amin Hass, Neil Zhenqiang Gong, Yiran Chen, Hai "Helen" Li |