USENIX Security '24 | Voice App Developer Experiences with Alexa and Google Assistant: Juggling Risks, Liability, and Security | William Seymour, Noura Abdi, Kopo M. Ramokapane, Jide Edu, Guillermo Suarez-Tangil, Jose Such |
USENIX Security '24 | Cascade: CPU Fuzzing via Intricate Program Generation | Flavien Solt, Katharina Ceesay-Seitz, Kaveh Razavi |
USENIX Security '24 | ModelGuard: Information-Theoretic Defense Against Model Extraction Attacks | Minxue Tang, Anna Dai, Louis DiValentin, Aolin Ding, Amin Hass, Neil Zhenqiang Gong, Yiran Chen, Hai "Helen" Li |
USENIX Security '24 | Unveiling the Secrets without Data: Can Graph Neural Networks Be Exploited through Data-Free Model Extraction Attacks? | Yuanxin Zhuang, Chuan Shi, Mengmei Zhang, Jinghui Chen, Lingjuan Lyu, Pan Zhou, Lichao Sun |
USENIX Security '24 | ATTention Please! An Investigation of the App Tracking Transparency Permission | Reham Mohamed, Arjun Arunasalam, Habiba Farrukh, Jason Tong, Antonio Bianchi, Z. Berkay Celik |
USENIX Security '24 | SHiFT: Semi-hosted Fuzz Testing for Embedded Applications | Alejandro Mera, Changming Liu, Ruimin Sun, Engin Kirda, Long Lu |
USENIX Security '24 | Learning with Semantics: Towards a Semantics-Aware Routing Anomaly Detection System | Yihao Chen, Qilei Yin, Qi Li, Zhuotao Liu, Ke Xu, Yi Xu, Mingwei Xu, Ziqian Liu, Jianping Wu |
USENIX Security '24 | MultiFuzz: A Multi-Stream Fuzzer For Testing Monolithic Firmware | Michael Chesser, Surya Nepal, Damith C. Ranasinghe |
USENIX Security '24 | "There are rabbit holes I want to go down that I'm not allowed to go down": An Investigation of Security Expert Threat Modeling Practices for Medical Devices | Ronald E. Thompson, Madline McLaughlin, Carson Powers, Daniel Votipka |
USENIX Security '24 | Towards More Practical Threat Models in Artificial Intelligence Security | Kathrin Grosse, Lukas Bieringer, Tarek R. Besold, Alexandre M. Alahi |
USENIX Security '24 | From the Childhood Past: Views of Young Adults on Parental Sharing of Children's Photos | Tania Ghafourian, Nicholas Micallef, Sameer Patil |
USENIX Security '24 | WhisperFuzz: White-Box Fuzzing for Detecting and Locating Timing Vulnerabilities in Processors | Pallavi Borkar, Chen Chen, Mohamadreza Rostami, Nikhilesh Singh, Rahul Kande, Ahmad-Reza Sadeghi, Chester Rebeiro, Jeyavijayan Rajendran |
USENIX Security '24 | CellularLint: A Systematic Approach to Identify Inconsistent Behavior in Cellular Network Specifications | Mirza Masfiqur Rahman, Imtiaz Karim, Elisa Bertino |
USENIX Security '24 | A Decade of Privacy-Relevant Android App Reviews: Large Scale Trends | Omer Akgul, Sai Teja Peddinti, Nina Taft, Michelle L. Mazurek, Hamza Harkous, Animesh Srivastava, Benoit Seguin |
USENIX Security '24 | PIXELMOD: Improving Soft Moderation of Visual Misleading Information on Twitter | Pujan Paudel, Chen Ling, Jeremy Blackburn, Gianluca Stringhini |
USENIX Security '24 | DeepEclipse: How to Break White-Box DNN-Watermarking Schemes | Alessandro Pegoraro, Carlotta Segna, Kavita Kumari, Ahmad-Reza Sadeghi |
USENIX Security '24 | SoK: All You Need to Know About On-Device ML Model Extraction - The Gap Between Research and Practice | Tushar Nayan, Qiming Guo, Mohammed Al Duniawi, Marcus Botacin, Selcuk Uluagac, Ruimin Sun |
USENIX Security '24 | ClearStamp: A Human-Visible and Robust Model-Ownership Proof based on Transposed Model Training | Torsten Krauß, Jasper Stang, Alexandra Dmitrienko |
USENIX Security '24 | On Data Fabrication in Collaborative Vehicular Perception: Attacks and Countermeasures | Qingzhao Zhang, Shuowei Jin, Ruiyang Zhu, Jiachen Sun, Xumiao Zhang, Qi Alfred Chen, Z. Morley Mao |
USENIX Security '24 | RECORD: A RECeption-Only Region Determination Attack on LEO Satellite Users | Eric Jedermann, Martin Strohmeier, Vincent Lenders, Jens Schmitt |
USENIX Security '24 | FFXE: Dynamic Control Flow Graph Recovery for Embedded Firmware Binaries | Ryan Tsang, Doreen Joseph, Soheil Salehi, Prasant Mohapatra, Houman Homayoun |
USENIX Security '24 | Your Firmware Has Arrived: A Study of Firmware Update Vulnerabilities | Yuhao Wu, Jinwen Wang, Yujie Wang, Shixuan Zhai, Zihan Li, Yi He, Kun Sun, Qi Li, Ning Zhang |
USENIX Security '24 | Security and Privacy Analysis of Samsung's Crowd-Sourced Bluetooth Location Tracking System | Tingfeng Yu, James Henderson, Alwen Tiu, Thomas Haines |
USENIX Security '24 | A High Coverage Cybersecurity Scale Predictive of User Behavior | Yukiko Sawaya, Sarah Lu, Takamasa Isohara, Mahmood Sharif |
USENIX Security '24 | Quantifying Privacy Risks of Prompts in Visual Prompt Learning | Yixin Wu, Rui Wen, Michael Backes, Pascal Berrang, Mathias Humbert, Yun Shen, Yang Zhang |