USENIX Security '24 | Single Pass Client-Preprocessing Private Information Retrieval | Arthur Lazzaretti, Charalampos Papamanthou |
USENIX Security '24 | WhisperFuzz: White-Box Fuzzing for Detecting and Locating Timing Vulnerabilities in Processors | Pallavi Borkar, Chen Chen, Mohamadreza Rostami, Nikhilesh Singh, Rahul Kande, Ahmad-Reza Sadeghi, Chester Rebeiro, Jeyavijayan Rajendran |
USENIX Security '24 | GhostRace: Exploiting and Mitigating Speculative Race Conditions | Hany Ragab, Andrea Mambretti, Anil Kurmus, Cristiano Giuffrida |
USENIX Security '24 | A NEW HOPE: Contextual Privacy Policies for Mobile Applications and An Approach Toward Automated Generation | Shidong Pan, Zhen Tao, Thong Hoang, Dawen Zhang, Tianshi Li, Zhenchang Xing, Xiwei Xu, Mark Staples, Thierry Rakotoarivelo, David Lo |
USENIX Security '24 | Abandon All Hope Ye Who Enter Here: A Dynamic, Longitudinal Investigation of Android's Data Safety Section | Ioannis Arkalakis, Michalis Diamantaris, Serafeim Moustakas, Sotiris Ioannidis, Jason Polakis, Panagiotis Ilia |
USENIX Security '24 | Pixel+ and Pixel++: Compact and Efficient Forward-Secure Multi-Signatures for PoS Blockchain Consensus | Jianghong Wei, Guohua Tian, Ding Wang, Fuchun Guo, Willy Susilo, Xiaofeng Chen |
USENIX Security '24 | When Threads Meet Interrupts: Effective Static Detection of Interrupt-Based Deadlocks in Linux | Chengfeng Ye, Yuandao Cai, Charles Zhang |
USENIX Security '24 | Wireless Signal Injection Attacks on VSAT Satellite Modems | Robin Bisping, Johannes Willbold, Martin Strohmeier, Vincent Lenders |
USENIX Security '24 | Prompt Stealing Attacks Against Text-to-Image Generation Models | Xinyue Shen, Yiting Qu, Michael Backes, Yang Zhang |
USENIX Security '24 | Trust Me If You Can – How Usable Is Trusted Types In Practice? | Sebastian Roth, Lea Gröber, Philipp Baus, Katharina Krombholz, Ben Stock |
USENIX Security '24 | On Data Fabrication in Collaborative Vehicular Perception: Attacks and Countermeasures | Qingzhao Zhang, Shuowei Jin, Ruiyang Zhu, Jiachen Sun, Xumiao Zhang, Qi Alfred Chen, Z. Morley Mao |
USENIX Security '24 | Dancer in the Dark: Synthesizing and Evaluating Polyglots for Blind Cross-Site Scripting | Robin Kirchner, Jonas Möller, Marius Musch, David Klein, Konrad Rieck, Martin Johns |
USENIX Security '24 | Opportunistic Data Flow Integrity for Real-time Cyber-physical Systems Using Worst Case Execution Time Reservation | Yujie Wang, Ao Li, Jinwen Wang, Sanjoy Baruah, Ning Zhang |
USENIX Security '24 | Spider-Scents: Grey-box Database-aware Web Scanning for Stored XSS | Eric Olsson, Benjamin Eriksson, Adam Doupé, Andrei Sabelfeld |
USENIX Security '24 | DaCapo: Automatic Bootstrapping Management for Efficient Fully Homomorphic Encryption | Seonyoung Cheon, Yongwoo Lee, Dongkwan Kim, Ju Min Lee, Sunchul Jung, Taekyung Kim, Dongyoon Lee, Hanjun Kim |
USENIX Security '24 | The Unpatchables: Why Municipalities Persist in Running Vulnerable Hosts | Aksel Ethembabaoglu, Rolf van Wegberg, Yury Zhauniarovich, Michel van Eeten |
USENIX Security '24 | Hijacking Attacks against Neural Network by Analyzing Training Data | Yunjie Ge, Qian Wang, Huayang Huang, Qi Li, Cong Wang, Chao Shen, Lingchen Zhao, Peipei Jiang, Zheng Fang, Shenyi Zhang |
USENIX Security '24 | PINE: Efficient Verification of a Euclidean Norm Bound of a Secret-Shared Vector | Guy N. Rothblum, Eran Omri, Junye Chen, Kunal Talwar |
USENIX Security '24 | SoK (or SoLK?): On the Quantitative Study of Sociodemographic Factors and Computer Security Behaviors | Miranda Wei, Jaron Mink, Yael Eiger, Tadayoshi Kohno, Elissa M. Redmiles, Franziska Roesner |
USENIX Security '24 | How Does a Deep Learning Model Architecture Impact Its Privacy? A Comprehensive Study of Privacy Attacks on CNNs and Transformers | Guangsheng Zhang, Bo Liu, Huan Tian, Tianqing Zhu, Ming Ding, Wanlei Zhou |
USENIX Security '24 | SoK: Security of Programmable Logic Controllers | Efrén López-Morales, Ulysse Planta, Carlos Rubio-Medrano, Ali Abbasi, Alvaro A. Cardenas |
USENIX Security '24 | A Friend's Eye is A Good Mirror: Synthesizing MCU Peripheral Models from Peripheral Drivers | Chongqing Lei, Zhen Ling, Yue Zhang, Yan Yang, Junzhou Luo, Xinwen Fu |
USENIX Security '24 | False Claims against Model Ownership Resolution | Jian Liu, Rui Zhang, Sebastian Szyller, Kui Ren, N. Asokan |
USENIX Security '24 | VOGUES: Validation of Object Guise using Estimated Components | Raymond Muller, Yanmao Man, Ming Li, Ryan Gerdes, Jonathan Petit, Z. Berkay Celik |
USENIX Security '24 | With Great Power Come Great Side Channels: Statistical Timing Side-Channel Analyses with Bounded Type-1 Errors | Martin Dunsche, Marcel Maehren, Nurullah Erinola, Robert Merget, Nicolai Bissantz, Juraj Somorovsky, Jörg Schwenk |