USENIX Security '24 | Don't Waste My Efforts: Pruning Redundant Sanitizer Checks by Developer-Implemented Type Checks | Yizhuo Zhai, Zhiyun Qian, Chengyu Song, Manu Sridharan, Trent Jaeger, Paul Yu, Srikanth V. Krishnamurthy |
USENIX Security '24 | CacheWarp: Software-based Fault Injection using Selective State Reset | Ruiyi Zhang, Lukas Gerlach, Daniel Weber, Lorenz Hetterich, Youheng Lü, Andreas Kogler, Michael Schwarz |
USENIX Security '24 | D-Helix: A Generic Decompiler Testing Framework Using Symbolic Differentiation | Muqi Zou, Arslan Khan, Ruoyu Wu, Han Gao, Antonio Bianchi, Dave (Jing) Tian |
USENIX Security '24 | Hermes: Unlocking Security Analysis of Cellular Network Protocols by Synthesizing Finite State Machines from Natural Language Specifications | Abdullah Al Ishtiaq, Sarkar Snigdha Sarathi Das, Syed Md Mukit Rashid, Ali Ranjbar, Kai Tu, Tianwei Wu, Zhezheng Song, Weixuan Wang, Mujtahid Akon, Rui Zhang, Syed Rafiul Hussain |
USENIX Security '24 | Understanding the Security and Privacy Implications of Online Toxic Content on Refugees | Arjun Arunasalam, Habiba Farrukh, Eliz Tekcan, Z. Berkay Celik |
USENIX Security '24 | AutoFHE: Automated Adaption of CNNs for Efficient Evaluation over FHE | Wei Ao, Vishnu Naresh Boddeti |
USENIX Security '24 | The Effect of Design Patterns on (Present and Future) Cookie Consent Decisions | Nataliia Bielova, Laura Litvine, Anysia Nguyen, Mariam Chammat, Vincent Toubiana, Estelle Hary |
USENIX Security '24 | Snowflake, a censorship circumvention system using temporary WebRTC proxies | Cecylia Bocovich, Arlo Breault, David Fifield, Xiaokang Wang |
USENIX Security '24 | Intellectual Property Exposure: Subverting and Securing Intellectual Property Encapsulation in Texas Instruments Microcontrollers | Marton Bognar, Cas Magnus, Frank Piessens, Jo Van Bulck |
USENIX Security '24 | Data Subjects' Reactions to Exercising Their Right of Access | Arthur Borem, Elleen Pan, Olufunmilola Obielodan, Aurelie Roubinowitz, Luca Dovichi, Michelle L. Mazurek, Blase Ur |
USENIX Security '24 | Fledging Will Continue Until Privacy Improves: Empirical Analysis of Google's Privacy-Preserving Targeted Advertising | Giuseppe Calderonio, Mir Masood Ali, Jason Polakis |
USENIX Security '24 | Learning with Semantics: Towards a Semantics-Aware Routing Anomaly Detection System | Yihao Chen, Qilei Yin, Qi Li, Zhuotao Liu, Ke Xu, Yi Xu, Mingwei Xu, Ziqian Liu, Jianping Wu |
USENIX Security '24 | PURE: Payments with UWB RElay-protection | Daniele Coppola, Giovanni Camurati, Claudio Anliker, Xenia Hofmeier, Patrick Schaller, David Basin, Srdjan Capkun |
USENIX Security '24 | Does Online Anonymous Market Vendor Reputation Matter? | Alejandro Cuevas, Nicolas Christin |
USENIX Security '24 | Machine Learning needs Better Randomness Standards: Randomised Smoothing and PRNG-based attacks | Pranav Dahiya, Ilia Shumailov, Ross Anderson |
USENIX Security '24 | Exploring Covert Third-party Identifiers through External Storage in the Android New Era | Zikan Dong, Tianming Liu, Jiapeng Deng, Li Li, Minghui Yang, Meng Wang, Guosheng Xu, Guoai Xu |
USENIX Security '24 | "I chose to fight, be brave, and to deal with it": Threat Experiences and Security Practices of Pakistani Content Creators | Lea Gröber, Waleed Arshad, Angelica Goetzen, Elissa M. Redmiles, Maryam Mustafa, Katharina Krombholz |
USENIX Security '24 | MD-ML: Super Fast Privacy-Preserving Machine Learning for Malicious Security with a Dishonest Majority | Boshi Yuan, Shixuan Yang, Yongxiang Zhang, Ning Ding, Dawu Gu, Shi-Feng Sun |
OSDI '24 | Managing Memory Tiers with CXL in Virtualized Environments | Yuhong Zhong, Daniel S. Berger, Carl Waldspurger, Ryan Wee, Ishwar Agarwal, Rajat Agarwal, Frank Hady, Karthik Kumar, Mark D. Hill, Mosharaf Chowdhury, Asaf Cidon |
OSDI '24 | Llumnix: Dynamic Scheduling for Large Language Model Serving | Biao Sun, Ziming Huang, Hanyu Zhao, Wencong Xiao, Xinyi Zhang, Yong Li, Wei Lin |
OSDI '24 | Validating the eBPF Verifier via State Embedding | Hao Sun, Zhendong Su |
OSDI '24 | Fairness in Serving Large Language Models | Ying Sheng, Shiyi Cao, Dacheng Li, Banghua Zhu, Zhuohan Li, Danyang Zhuo, Joseph E. Gonzalez, Ion Stoica |
NSDI '24 | Horus: Granular In-Network Task Scheduler for Cloud Datacenters | Parham Yassini, Khaled Diab, Saeed Mahloujifar, Mohamed Hefeeda |
NSDI '24 | Sifter: An Inversion-Free and Large-Capacity Programmable Packet Scheduler | Peixuan Gao, Anthony Dalleggio, Jiajin Liu, Chen Peng, Yang Xu, H. Jonathan Chao |
NSDI '24 | Flow Scheduling with Imprecise Knowledge | Wenxin Li, Xin He, Yuan Liu, Keqiu Li, Kai Chen, Zhao Ge, Zewei Guan, Heng Qi, Song Zhang, Guyue Liu |