USENIX Security '24 | Unbalanced Circuit-PSI from Oblivious Key-Value Retrieval | Meng Hao, Weiran Liu, Liqiang Peng, Hongwei Li, Cong Zhang, Hanxiao Chen, Tianwei Zhang |
USENIX Security '24 | Being Transparent is Merely the Beginning: Enforcing Purpose Limitation with Polynomial Approximation | Shuofeng Liu, Zihan Wang, Minhui Xue, Long Wang, Yuanchao Zhang, Guangdong Bai |
USENIX Security '24 | Devil in the Room: Triggering Audio Backdoors in the Physical World | Meng Chen, Xiangyu Xu, Li Lu, Zhongjie Ba, Feng Lin, Kui Ren |
USENIX Security '24 | FraudWhistler: A Resilient, Robust and Plug-and-play Adversarial Example Detection Method for Speaker Recognition | Kun Wang, Xiangyu Xu, Li Lu, Zhongjie Ba, Feng Lin, Kui Ren |
USENIX Security '24 | DaCapo: Automatic Bootstrapping Management for Efficient Fully Homomorphic Encryption | Seonyoung Cheon, Yongwoo Lee, Dongkwan Kim, Ju Min Lee, Sunchul Jung, Taekyung Kim, Dongyoon Lee, Hanjun Kim |
USENIX Security '24 | The Unpatchables: Why Municipalities Persist in Running Vulnerable Hosts | Aksel Ethembabaoglu, Rolf van Wegberg, Yury Zhauniarovich, Michel van Eeten |
USENIX Security '24 | Why Aren't We Using Passkeys? Obstacles Companies Face Deploying FIDO2 Passwordless Authentication | Leona Lassak, Elleen Pan, Blase Ur, Maximilian Golla |
USENIX Security '24 | Key Recovery Attacks on Approximate Homomorphic Encryption with Non-Worst-Case Noise Flooding Countermeasures | Qian Guo, Denis Nabokov, Elias Suvanto, Thomas Johansson |
USENIX Security '24 | PINE: Efficient Verification of a Euclidean Norm Bound of a Secret-Shared Vector | Guy N. Rothblum, Eran Omri, Junye Chen, Kunal Talwar |
USENIX Security '24 | SoK (or SoLK?): On the Quantitative Study of Sociodemographic Factors and Computer Security Behaviors | Miranda Wei, Jaron Mink, Yael Eiger, Tadayoshi Kohno, Elissa M. Redmiles, Franziska Roesner |
USENIX Security '24 | EaTVul: ChatGPT-based Evasion Attack Against Software Vulnerability Detection | Shigang Liu, Di Cao, Junae Kim, Tamas Abraham, Paul Montague, Seyit Camtepe, Jun Zhang, Yang Xiang |
USENIX Security '24 | SoK: Security of Programmable Logic Controllers | Efrén López-Morales, Ulysse Planta, Carlos Rubio-Medrano, Ali Abbasi, Alvaro A. Cardenas |
USENIX Security '24 | A Friend's Eye is A Good Mirror: Synthesizing MCU Peripheral Models from Peripheral Drivers | Chongqing Lei, Zhen Ling, Yue Zhang, Yan Yang, Junzhou Luo, Xinwen Fu |
USENIX Security '24 | AE-Morpher: Improve Physical Robustness of Adversarial Objects against LiDAR-based Detectors via Object Reconstruction | Shenchen Zhu, Yue Zhao, Kai Chen, Bo Wang, Hualong Ma, Cheng'an Wei |
USENIX Security '24 | Terrapin Attack: Breaking SSH Channel Integrity By Sequence Number Manipulation | Fabian Bäumer, Marcus Brinkmann, Jörg Schwenk |
USENIX Security '24 | A Mixed-Methods Study on User Experiences and Challenges of Recovery Codes for an End-to-End Encrypted Service | Sandra Höltervennhoff, Noah Wöhler, Arne Möhle, Marten Oltrogge, Yasemin Acar, Oliver Wiese, Sascha Fahl |
USENIX Security '24 | Operation Mango: Scalable Discovery of Taint-Style Vulnerabilities in Binary Firmware Services | Wil Gibbs, Arvind S Raj, Jayakrishna Menon Vadayath, Hui Jun Tay, Justin Miller, Akshay Ajayan, Zion Leonahenahe Basque, Audrey Dutcher, Fangzhou Dong, Xavier Maso, Giovanni Vigna, Christopher Kruegel, Adam Doupé, Yan Shoshitaishvili, Ruoyu Wang |
USENIX Security '24 | The Challenges of Bringing Cryptography from Research Papers to Products: Results from an Interview Study with Experts | Konstantin Fischer, Ivana Trummová, Phillip Gajland, Yasemin Acar, Sascha Fahl, Angela Sasse |
USENIX Security '24 | Splitting the Difference on Adversarial Training | Matan Levi, Aryeh Kontorovich |
OSDI '24 | Managing Memory Tiers with CXL in Virtualized Environments | Yuhong Zhong, Daniel S. Berger, Carl Waldspurger, Ryan Wee, Ishwar Agarwal, Rajat Agarwal, Frank Hady, Karthik Kumar, Mark D. Hill, Mosharaf Chowdhury, Asaf Cidon |
OSDI '24 | Llumnix: Dynamic Scheduling for Large Language Model Serving | Biao Sun, Ziming Huang, Hanyu Zhao, Wencong Xiao, Xinyi Zhang, Yong Li, Wei Lin |
OSDI '24 | Validating the eBPF Verifier via State Embedding | Hao Sun, Zhendong Su |
OSDI '24 | Fairness in Serving Large Language Models | Ying Sheng, Shiyi Cao, Dacheng Li, Banghua Zhu, Zhuohan Li, Danyang Zhuo, Joseph E. Gonzalez, Ion Stoica |
NSDI '24 | Horus: Granular In-Network Task Scheduler for Cloud Datacenters | Parham Yassini, Khaled Diab, Saeed Mahloujifar, Mohamed Hefeeda |
NSDI '24 | Sifter: An Inversion-Free and Large-Capacity Programmable Packet Scheduler | Peixuan Gao, Anthony Dalleggio, Jiajin Liu, Chen Peng, Yang Xu, H. Jonathan Chao |