USENIX Security '24 | Unveiling the Secrets without Data: Can Graph Neural Networks Be Exploited through Data-Free Model Extraction Attacks? | Yuanxin Zhuang, Chuan Shi, Mengmei Zhang, Jinghui Chen, Lingjuan Lyu, Pan Zhou, Lichao Sun |
USENIX Security '24 | ATTention Please! An Investigation of the App Tracking Transparency Permission | Reham Mohamed, Arjun Arunasalam, Habiba Farrukh, Jason Tong, Antonio Bianchi, Z. Berkay Celik |
USENIX Security '24 | SHiFT: Semi-hosted Fuzz Testing for Embedded Applications | Alejandro Mera, Changming Liu, Ruimin Sun, Engin Kirda, Long Lu |
USENIX Security '24 | Learning with Semantics: Towards a Semantics-Aware Routing Anomaly Detection System | Yihao Chen, Qilei Yin, Qi Li, Zhuotao Liu, Ke Xu, Yi Xu, Mingwei Xu, Ziqian Liu, Jianping Wu |
USENIX Security '24 | MultiFuzz: A Multi-Stream Fuzzer For Testing Monolithic Firmware | Michael Chesser, Surya Nepal, Damith C. Ranasinghe |
USENIX Security '24 | "There are rabbit holes I want to go down that I'm not allowed to go down": An Investigation of Security Expert Threat Modeling Practices for Medical Devices | Ronald E. Thompson, Madline McLaughlin, Carson Powers, Daniel Votipka |
USENIX Security '24 | Towards More Practical Threat Models in Artificial Intelligence Security | Kathrin Grosse, Lukas Bieringer, Tarek R. Besold, Alexandre M. Alahi |
USENIX Security '24 | From the Childhood Past: Views of Young Adults on Parental Sharing of Children's Photos | Tania Ghafourian, Nicholas Micallef, Sameer Patil |
USENIX Security '24 | WhisperFuzz: White-Box Fuzzing for Detecting and Locating Timing Vulnerabilities in Processors | Pallavi Borkar, Chen Chen, Mohamadreza Rostami, Nikhilesh Singh, Rahul Kande, Ahmad-Reza Sadeghi, Chester Rebeiro, Jeyavijayan Rajendran |
USENIX Security '24 | CellularLint: A Systematic Approach to Identify Inconsistent Behavior in Cellular Network Specifications | Mirza Masfiqur Rahman, Imtiaz Karim, Elisa Bertino |
USENIX Security '24 | A Decade of Privacy-Relevant Android App Reviews: Large Scale Trends | Omer Akgul, Sai Teja Peddinti, Nina Taft, Michelle L. Mazurek, Hamza Harkous, Animesh Srivastava, Benoit Seguin |
USENIX Security '24 | PIXELMOD: Improving Soft Moderation of Visual Misleading Information on Twitter | Pujan Paudel, Chen Ling, Jeremy Blackburn, Gianluca Stringhini |
USENIX Security '24 | DeepEclipse: How to Break White-Box DNN-Watermarking Schemes | Alessandro Pegoraro, Carlotta Segna, Kavita Kumari, Ahmad-Reza Sadeghi |
USENIX Security '24 | SoK: All You Need to Know About On-Device ML Model Extraction - The Gap Between Research and Practice | Tushar Nayan, Qiming Guo, Mohammed Al Duniawi, Marcus Botacin, Selcuk Uluagac, Ruimin Sun |
USENIX Security '24 | ClearStamp: A Human-Visible and Robust Model-Ownership Proof based on Transposed Model Training | Torsten Krauß, Jasper Stang, Alexandra Dmitrienko |
USENIX Security '24 | On Data Fabrication in Collaborative Vehicular Perception: Attacks and Countermeasures | Qingzhao Zhang, Shuowei Jin, Ruiyang Zhu, Jiachen Sun, Xumiao Zhang, Qi Alfred Chen, Z. Morley Mao |
USENIX Security '24 | RECORD: A RECeption-Only Region Determination Attack on LEO Satellite Users | Eric Jedermann, Martin Strohmeier, Vincent Lenders, Jens Schmitt |
USENIX Security '24 | FFXE: Dynamic Control Flow Graph Recovery for Embedded Firmware Binaries | Ryan Tsang, Doreen Joseph, Soheil Salehi, Prasant Mohapatra, Houman Homayoun |
USENIX Security '24 | Your Firmware Has Arrived: A Study of Firmware Update Vulnerabilities | Yuhao Wu, Jinwen Wang, Yujie Wang, Shixuan Zhai, Zihan Li, Yi He, Kun Sun, Qi Li, Ning Zhang |
USENIX Security '24 | Security and Privacy Analysis of Samsung's Crowd-Sourced Bluetooth Location Tracking System | Tingfeng Yu, James Henderson, Alwen Tiu, Thomas Haines |
USENIX Security '24 | A High Coverage Cybersecurity Scale Predictive of User Behavior | Yukiko Sawaya, Sarah Lu, Takamasa Isohara, Mahmood Sharif |
USENIX Security '24 | Quantifying Privacy Risks of Prompts in Visual Prompt Learning | Yixin Wu, Rui Wen, Michael Backes, Pascal Berrang, Mathias Humbert, Yun Shen, Yang Zhang |
USENIX Security '24 | Is It a Trap? A Large-scale Empirical Study And Comprehensive Assessment of Online Automated Privacy Policy Generators for Mobile Apps | Shidong Pan, Dawen Zhang, Mark Staples, Zhenchang Xing, Jieshan Chen, Xiwei Xu, Thong Hoang |
USENIX Security '24 | Batch PIR and Labeled PSI with Oblivious Ciphertext Compression | Alexander Bienstock, Sarvar Patel, Joon Young Seo, Kevin Yeo |
USENIX Security '24 | PointerGuess: Targeted Password Guessing Model Using Pointer Mechanism | Kedong Xiu, Ding Wang |