USENIX Security '24 | Arcanum: Detecting and Evaluating the Privacy Risks of Browser Extensions on Web Pages and Web Content | Qinge Xie, Manoj Vignesh Kasi Murali, Paul Pearce, Frank Li |
USENIX Security '24 | Towards More Practical Threat Models in Artificial Intelligence Security | Kathrin Grosse, Lukas Bieringer, Tarek R. Besold, Alexandre M. Alahi |
USENIX Security '24 | From the Childhood Past: Views of Young Adults on Parental Sharing of Children's Photos | Tania Ghafourian, Nicholas Micallef, Sameer Patil |
USENIX Security '24 | Smudged Fingerprints: Characterizing and Improving the Performance of Web Application Fingerprinting | Brian Kondracki, Nick Nikiforakis |
USENIX Security '24 | CellularLint: A Systematic Approach to Identify Inconsistent Behavior in Cellular Network Specifications | Mirza Masfiqur Rahman, Imtiaz Karim, Elisa Bertino |
USENIX Security '24 | A Decade of Privacy-Relevant Android App Reviews: Large Scale Trends | Omer Akgul, Sai Teja Peddinti, Nina Taft, Michelle L. Mazurek, Hamza Harkous, Animesh Srivastava, Benoit Seguin |
USENIX Security '24 | PURE: Payments with UWB RElay-protection | Daniele Coppola, Giovanni Camurati, Claudio Anliker, Xenia Hofmeier, Patrick Schaller, David Basin, Srdjan Capkun |
USENIX Security '24 | PIXELMOD: Improving Soft Moderation of Visual Misleading Information on Twitter | Pujan Paudel, Chen Ling, Jeremy Blackburn, Gianluca Stringhini |
USENIX Security '24 | Don't Listen To Me: Understanding and Exploring Jailbreak Prompts of Large Language Models | Zhiyuan Yu, Xiaogeng Liu, Shunning Liang, Zach Cameron, Chaowei Xiao, Ning Zhang |
USENIX Security '24 | DeepEclipse: How to Break White-Box DNN-Watermarking Schemes | Alessandro Pegoraro, Carlotta Segna, Kavita Kumari, Ahmad-Reza Sadeghi |
USENIX Security '24 | SoK: All You Need to Know About On-Device ML Model Extraction - The Gap Between Research and Practice | Tushar Nayan, Qiming Guo, Mohammed Al Duniawi, Marcus Botacin, Selcuk Uluagac, Ruimin Sun |
USENIX Security '24 | ClearStamp: A Human-Visible and Robust Model-Ownership Proof based on Transposed Model Training | Torsten Krauß, Jasper Stang, Alexandra Dmitrienko |
USENIX Security '24 | RECORD: A RECeption-Only Region Determination Attack on LEO Satellite Users | Eric Jedermann, Martin Strohmeier, Vincent Lenders, Jens Schmitt |
USENIX Security '24 | FFXE: Dynamic Control Flow Graph Recovery for Embedded Firmware Binaries | Ryan Tsang, Doreen Joseph, Soheil Salehi, Prasant Mohapatra, Houman Homayoun |
USENIX Security '24 | Your Firmware Has Arrived: A Study of Firmware Update Vulnerabilities | Yuhao Wu, Jinwen Wang, Yujie Wang, Shixuan Zhai, Zihan Li, Yi He, Kun Sun, Qi Li, Ning Zhang |
USENIX Security '24 | Security and Privacy Analysis of Samsung's Crowd-Sourced Bluetooth Location Tracking System | Tingfeng Yu, James Henderson, Alwen Tiu, Thomas Haines |
USENIX Security '24 | A High Coverage Cybersecurity Scale Predictive of User Behavior | Yukiko Sawaya, Sarah Lu, Takamasa Isohara, Mahmood Sharif |
USENIX Security '24 | Quantifying Privacy Risks of Prompts in Visual Prompt Learning | Yixin Wu, Rui Wen, Michael Backes, Pascal Berrang, Mathias Humbert, Yun Shen, Yang Zhang |
USENIX Security '24 | Is It a Trap? A Large-scale Empirical Study And Comprehensive Assessment of Online Automated Privacy Policy Generators for Mobile Apps | Shidong Pan, Dawen Zhang, Mark Staples, Zhenchang Xing, Jieshan Chen, Xiwei Xu, Thong Hoang |
USENIX Security '24 | VeriSimplePIR: Verifiability in SimplePIR at No Online Cost for Honest Servers | Leo de Castro, Keewoo Lee |
USENIX Security '24 | Batch PIR and Labeled PSI with Oblivious Ciphertext Compression | Alexander Bienstock, Sarvar Patel, Joon Young Seo, Kevin Yeo |
USENIX Security '24 | PointerGuess: Targeted Password Guessing Model Using Pointer Mechanism | Kedong Xiu, Ding Wang |
USENIX Security '24 | "I just hated it and I want my money back": Data-driven Understanding of Mobile VPN Service Switching Preferences in The Wild | Rohit Raj, Mridul Newar, Mainack Mondal |
USENIX Security '24 | iHunter: Hunting Privacy Violations at Scale in the Software Supply Chain on iOS | Dexin Liu, Yue Xiao, Chaoqi Zhang, Kaitao Xie, Xiaolong Bai, Shikun Zhang, Luyi Xing |
USENIX Security '24 | CDN Cannon: Exploiting CDN Back-to-Origin Strategies for Amplification Attacks | Ziyu Lin, Zhiwei Lin, Ximeng Liu, Jianjun Chen, Run Guo, Cheng Chen, Shaodong Xiao |