USENIX Security '24 | Machine Learning needs Better Randomness Standards: Randomised Smoothing and PRNG-based attacks | Pranav Dahiya, Ilia Shumailov, Ross Anderson |
USENIX Security '24 | PatchCURE: Improving Certifiable Robustness, Model Utility, and Computation Efficiency of Adversarial Patch Defenses | Chong Xiang, Tong Wu, Sihui Dai, Jonathan Petit, Suman Jana, Prateek Mittal |
USENIX Security '24 | Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs | Sebastian Angel, Eleftherios Ioannidis, Elizabeth Margolin, Srinath Setty, Jess Woods |
USENIX Security '24 | ZKSMT: A VM for Proving SMT Theorems in Zero Knowledge | Daniel Luick, John C. Kolesar, Timos Antonopoulos, William R. Harris, James Parker, Ruzica Piskac, Eran Tromer, Xiao Wang, Ning Luo |
USENIX Security '24 | Enabling Contextual Soft Moderation on Social Media through Contrastive Textual Deviation | Pujan Paudel, Mohammad Hammas Saeed, Rebecca Auger, Chris Wells, Gianluca Stringhini |
USENIX Security '24 | PURE: Payments with UWB RElay-protection | Daniele Coppola, Giovanni Camurati, Claudio Anliker, Xenia Hofmeier, Patrick Schaller, David Basin, Srdjan Capkun |
USENIX Security '24 | Arcanum: Detecting and Evaluating the Privacy Risks of Browser Extensions on Web Pages and Web Content | Qinge Xie, Manoj Vignesh Kasi Murali, Paul Pearce, Frank Li |
USENIX Security '24 | Don't Listen To Me: Understanding and Exploring Jailbreak Prompts of Large Language Models | Zhiyuan Yu, Xiaogeng Liu, Shunning Liang, Zach Cameron, Chaowei Xiao, Ning Zhang |
USENIX Security '24 | From the Childhood Past: Views of Young Adults on Parental Sharing of Children's Photos | Tania Ghafourian, Nicholas Micallef, Sameer Patil |
USENIX Security '24 | PIXELMOD: Improving Soft Moderation of Visual Misleading Information on Twitter | Pujan Paudel, Chen Ling, Jeremy Blackburn, Gianluca Stringhini |
USENIX Security '24 | CellularLint: A Systematic Approach to Identify Inconsistent Behavior in Cellular Network Specifications | Mirza Masfiqur Rahman, Imtiaz Karim, Elisa Bertino |
USENIX Security '24 | SoK: All You Need to Know About On-Device ML Model Extraction - The Gap Between Research and Practice | Tushar Nayan, Qiming Guo, Mohammed Al Duniawi, Marcus Botacin, Selcuk Uluagac, Ruimin Sun |
USENIX Security '24 | ModelGuard: Information-Theoretic Defense Against Model Extraction Attacks | Minxue Tang, Anna Dai, Louis DiValentin, Aolin Ding, Amin Hass, Neil Zhenqiang Gong, Yiran Chen, Hai "Helen" Li |
USENIX Security '24 | Cascade: CPU Fuzzing via Intricate Program Generation | Flavien Solt, Katharina Ceesay-Seitz, Kaveh Razavi |
USENIX Security '24 | MultiFuzz: A Multi-Stream Fuzzer For Testing Monolithic Firmware | Michael Chesser, Surya Nepal, Damith C. Ranasinghe |
USENIX Security '24 | Moderating Illicit Online Image Promotion for Unsafe User Generated Content Games Using Large Vision-Language Models | Keyan Guo, Ayush Utkarsh, Wenbo Ding, Isabelle Ondracek, Ziming Zhao, Guo Freeman, Nishant Vishwamitra, Hongxin Hu |
USENIX Security '24 | VeriSimplePIR: Verifiability in SimplePIR at No Online Cost for Honest Servers | Leo de Castro, Keewoo Lee |
USENIX Security '24 | Trust Me If You Can – How Usable Is Trusted Types In Practice? | Sebastian Roth, Lea Gröber, Philipp Baus, Katharina Krombholz, Ben Stock |
USENIX Security '24 | "I just hated it and I want my money back": Data-driven Understanding of Mobile VPN Service Switching Preferences in The Wild | Rohit Raj, Mridul Newar, Mainack Mondal |
USENIX Security '24 | When Threads Meet Interrupts: Effective Static Detection of Interrupt-Based Deadlocks in Linux | Chengfeng Ye, Yuandao Cai, Charles Zhang |
USENIX Security '24 | Enabling Developers, Protecting Users: Investigating Harassment and Safety in VR | Abhinaya S.B., Aafaq Sabir, Anupam Das |
USENIX Security '24 | With Great Power Come Great Side Channels: Statistical Timing Side-Channel Analyses with Bounded Type-1 Errors | Martin Dunsche, Marcel Maehren, Nurullah Erinola, Robert Merget, Nicolai Bissantz, Juraj Somorovsky, Jörg Schwenk |
USENIX Security '24 | "These results must be false": A usability evaluation of constant-time analysis tools | Marcel Fourné, Daniel De Almeida Braga, Jan Jancar, Mohamed Sabt, Peter Schwabe, Gilles Barthe, Pierre-Alain Fouque, Yasemin Acar |
USENIX Security '24 | Spider-Scents: Grey-box Database-aware Web Scanning for Stored XSS | Eric Olsson, Benjamin Eriksson, Adam Doupé, Andrei Sabelfeld |
USENIX Security '24 | False Claims against Model Ownership Resolution | Jian Liu, Rui Zhang, Sebastian Szyller, Kui Ren, N. Asokan |