USENIX Security '24 | Loopy Hell(ow): Infinite Traffic Loops at the Application Layer | Yepeng Pan, Anna Ascheman, Christian Rossow |
USENIX Security '24 | Racing for TLS Certificate Validation: A Hijacker's Guide to the Android TLS Galaxy | Sajjad Pourali, Xiufen Yu, Lianying Zhao, Mohammad Mannan, Amr Youssef |
USENIX Security '24 | A Binary-level Thread Sanitizer or Why Sanitizing on the Binary Level is Hard | Joschua Schilling, Andreas Wendler, Philipp Görz, Nils Bars, Moritz Schloegel, Thorsten Holz |
USENIX Security '24 | "I feel physically safe but not politically safe": Understanding the Digital Threats and Safety Practices of OnlyFans Creators | Ananta Soneji, Vaughn Hamilton, Adam Doupé, Allison McDonald, Elissa M. Redmiles |
USENIX Security '24 | dp-promise: Differentially Private Diffusion Probabilistic Models for Image Synthesis | Haichen Wang, Shuchao Pang, Zhigang Lu, Yihang Rao, Yongbin Zhou, Minhui Xue |
USENIX Security '24 | SeaK: Rethinking the Design of a Secure Allocator for OS Kernel | Zicheng Wang, Yicheng Guang, Yueqi Chen, Zhenpeng Lin, Michael Le, Dang K Le, Dan Williams, Xinyu Xing, Zhongshu Gu, Hani Jamjoom |
USENIX Security '24 | Practical Security Analysis of Zero-Knowledge Proof Circuits | Hongbo Wen, Jon Stephens, Yanju Chen, Kostas Ferles, Shankara Pailoor, Kyle Charbonnet, Isil Dillig, Yu Feng |
USENIX Security '24 | What IF Is Not Enough? Fixing Null Pointer Dereference With Contextual Check | Yunlong Xing, Shu Wang, Shiyu Sun, Xu He, Kun Sun, Qi Li |
USENIX Security '24 | DVa: Extracting Victims and Abuse Vectors from Android Accessibility Malware | Haichuan Xu, Mingxuan Yao, Runze Zhang, Mohamed Moustafa Dawoud, Jeman Park, Brendan Saltaformaggio |
USENIX Security '24 | Two Shuffles Make a RAM: Improved Constant Overhead Zero Knowledge RAM | Yibin Yang, David Heath |
USENIX Security '24 | Towards Generic Database Management System Fuzzing | Yupeng Yang, Yongheng Chen, Rui Zhong, Jizhou Chen, Wenke Lee |
USENIX Security '24 | Don't Waste My Efforts: Pruning Redundant Sanitizer Checks by Developer-Implemented Type Checks | Yizhuo Zhai, Zhiyun Qian, Chengyu Song, Manu Sridharan, Trent Jaeger, Paul Yu, Srikanth V. Krishnamurthy |
USENIX Security '24 | CacheWarp: Software-based Fault Injection using Selective State Reset | Ruiyi Zhang, Lukas Gerlach, Daniel Weber, Lorenz Hetterich, Youheng Lü, Andreas Kogler, Michael Schwarz |
USENIX Security '24 | D-Helix: A Generic Decompiler Testing Framework Using Symbolic Differentiation | Muqi Zou, Arslan Khan, Ruoyu Wu, Han Gao, Antonio Bianchi, Dave (Jing) Tian |
USENIX Security '24 | Hermes: Unlocking Security Analysis of Cellular Network Protocols by Synthesizing Finite State Machines from Natural Language Specifications | Abdullah Al Ishtiaq, Sarkar Snigdha Sarathi Das, Syed Md Mukit Rashid, Ali Ranjbar, Kai Tu, Tianwei Wu, Zhezheng Song, Weixuan Wang, Mujtahid Akon, Rui Zhang, Syed Rafiul Hussain |
USENIX Security '24 | Understanding the Security and Privacy Implications of Online Toxic Content on Refugees | Arjun Arunasalam, Habiba Farrukh, Eliz Tekcan, Z. Berkay Celik |
USENIX Security '24 | AutoFHE: Automated Adaption of CNNs for Efficient Evaluation over FHE | Wei Ao, Vishnu Naresh Boddeti |
USENIX Security '24 | The Effect of Design Patterns on (Present and Future) Cookie Consent Decisions | Nataliia Bielova, Laura Litvine, Anysia Nguyen, Mariam Chammat, Vincent Toubiana, Estelle Hary |
USENIX Security '24 | Snowflake, a censorship circumvention system using temporary WebRTC proxies | Cecylia Bocovich, Arlo Breault, David Fifield, Xiaokang Wang |
USENIX Security '24 | Intellectual Property Exposure: Subverting and Securing Intellectual Property Encapsulation in Texas Instruments Microcontrollers | Marton Bognar, Cas Magnus, Frank Piessens, Jo Van Bulck |
USENIX Security '24 | Data Subjects' Reactions to Exercising Their Right of Access | Arthur Borem, Elleen Pan, Olufunmilola Obielodan, Aurelie Roubinowitz, Luca Dovichi, Michelle L. Mazurek, Blase Ur |
USENIX Security '24 | Fledging Will Continue Until Privacy Improves: Empirical Analysis of Google's Privacy-Preserving Targeted Advertising | Giuseppe Calderonio, Mir Masood Ali, Jason Polakis |
USENIX Security '24 | Learning with Semantics: Towards a Semantics-Aware Routing Anomaly Detection System | Yihao Chen, Qilei Yin, Qi Li, Zhuotao Liu, Ke Xu, Yi Xu, Mingwei Xu, Ziqian Liu, Jianping Wu |
USENIX Security '24 | PURE: Payments with UWB RElay-protection | Daniele Coppola, Giovanni Camurati, Claudio Anliker, Xenia Hofmeier, Patrick Schaller, David Basin, Srdjan Capkun |
USENIX Security '24 | Does Online Anonymous Market Vendor Reputation Matter? | Alejandro Cuevas, Nicolas Christin |