USENIX Security '24 | Enabling Developers, Protecting Users: Investigating Harassment and Safety in VR | Abhinaya S.B., Aafaq Sabir, Anupam Das |
USENIX Security '24 | FaceObfuscator: Defending Deep Learning-based Privacy Attacks with Gradient Descent-resistant Features in Face Recognition | Shuaifan Jin, He Wang, Zhibo Wang, Feng Xiao, Jiahui Hu, Yuan He, Wenwen Zhang, Zhongjie Ba, Weijie Fang, Shuhong Yuan, Kui Ren |
USENIX Security '24 | ENG25519: Faster TLS 1.3 handshake using optimized X25519 and Ed25519 | Jipeng Zhang, Junhao Huang, Lirui Zhao, Donglong Chen, Çetin Kaya Koç |
USENIX Security '24 | "These results must be false": A usability evaluation of constant-time analysis tools | Marcel Fourné, Daniel De Almeida Braga, Jan Jancar, Mohamed Sabt, Peter Schwabe, Gilles Barthe, Pierre-Alain Fouque, Yasemin Acar |
USENIX Security '24 | Unbalanced Circuit-PSI from Oblivious Key-Value Retrieval | Meng Hao, Weiran Liu, Liqiang Peng, Hongwei Li, Cong Zhang, Hanxiao Chen, Tianwei Zhang |
USENIX Security '24 | Operation Mango: Scalable Discovery of Taint-Style Vulnerabilities in Binary Firmware Services | Wil Gibbs, Arvind S Raj, Jayakrishna Menon Vadayath, Hui Jun Tay, Justin Miller, Akshay Ajayan, Zion Leonahenahe Basque, Audrey Dutcher, Fangzhou Dong, Xavier Maso, Giovanni Vigna, Christopher Kruegel, Adam Doupé, Yan Shoshitaishvili, Ruoyu Wang |
USENIX Security '24 | Being Transparent is Merely the Beginning: Enforcing Purpose Limitation with Polynomial Approximation | Shuofeng Liu, Zihan Wang, Minhui Xue, Long Wang, Yuanchao Zhang, Guangdong Bai |
USENIX Security '24 | Devil in the Room: Triggering Audio Backdoors in the Physical World | Meng Chen, Xiangyu Xu, Li Lu, Zhongjie Ba, Feng Lin, Kui Ren |
USENIX Security '24 | FraudWhistler: A Resilient, Robust and Plug-and-play Adversarial Example Detection Method for Speaker Recognition | Kun Wang, Xiangyu Xu, Li Lu, Zhongjie Ba, Feng Lin, Kui Ren |
USENIX Security '24 | The Challenges of Bringing Cryptography from Research Papers to Products: Results from an Interview Study with Experts | Konstantin Fischer, Ivana Trummová, Phillip Gajland, Yasemin Acar, Sascha Fahl, Angela Sasse |
USENIX Security '24 | Why Aren't We Using Passkeys? Obstacles Companies Face Deploying FIDO2 Passwordless Authentication | Leona Lassak, Elleen Pan, Blase Ur, Maximilian Golla |
USENIX Security '24 | Key Recovery Attacks on Approximate Homomorphic Encryption with Non-Worst-Case Noise Flooding Countermeasures | Qian Guo, Denis Nabokov, Elias Suvanto, Thomas Johansson |
USENIX Security '24 | EaTVul: ChatGPT-based Evasion Attack Against Software Vulnerability Detection | Shigang Liu, Di Cao, Junae Kim, Tamas Abraham, Paul Montague, Seyit Camtepe, Jun Zhang, Yang Xiang |
USENIX Security '24 | AE-Morpher: Improve Physical Robustness of Adversarial Objects against LiDAR-based Detectors via Object Reconstruction | Shenchen Zhu, Yue Zhao, Kai Chen, Bo Wang, Hualong Ma, Cheng'an Wei |
USENIX Security '24 | Terrapin Attack: Breaking SSH Channel Integrity By Sequence Number Manipulation | Fabian Bäumer, Marcus Brinkmann, Jörg Schwenk |
USENIX Security '24 | A Mixed-Methods Study on User Experiences and Challenges of Recovery Codes for an End-to-End Encrypted Service | Sandra Höltervennhoff, Noah Wöhler, Arne Möhle, Marten Oltrogge, Yasemin Acar, Oliver Wiese, Sascha Fahl |
USENIX Security '24 | Learning with Semantics: Towards a Semantics-Aware Routing Anomaly Detection System | Yihao Chen, Qilei Yin, Qi Li, Zhuotao Liu, Ke Xu, Yi Xu, Mingwei Xu, Ziqian Liu, Jianping Wu |
USENIX Security '24 | MD-ML: Super Fast Privacy-Preserving Machine Learning for Malicious Security with a Dishonest Majority | Boshi Yuan, Shixuan Yang, Yongxiang Zhang, Ning Ding, Dawu Gu, Shi-Feng Sun |
OSDI '24 | Managing Memory Tiers with CXL in Virtualized Environments | Yuhong Zhong, Daniel S. Berger, Carl Waldspurger, Ryan Wee, Ishwar Agarwal, Rajat Agarwal, Frank Hady, Karthik Kumar, Mark D. Hill, Mosharaf Chowdhury, Asaf Cidon |
OSDI '24 | Llumnix: Dynamic Scheduling for Large Language Model Serving | Biao Sun, Ziming Huang, Hanyu Zhao, Wencong Xiao, Xinyi Zhang, Yong Li, Wei Lin |
OSDI '24 | Validating the eBPF Verifier via State Embedding | Hao Sun, Zhendong Su |
OSDI '24 | Fairness in Serving Large Language Models | Ying Sheng, Shiyi Cao, Dacheng Li, Banghua Zhu, Zhuohan Li, Danyang Zhuo, Joseph E. Gonzalez, Ion Stoica |
NSDI '24 | Horus: Granular In-Network Task Scheduler for Cloud Datacenters | Parham Yassini, Khaled Diab, Saeed Mahloujifar, Mohamed Hefeeda |
NSDI '24 | Sifter: An Inversion-Free and Large-Capacity Programmable Packet Scheduler | Peixuan Gao, Anthony Dalleggio, Jiajin Liu, Chen Peng, Yang Xu, H. Jonathan Chao |
NSDI '24 | Flow Scheduling with Imprecise Knowledge | Wenxin Li, Xin He, Yuan Liu, Keqiu Li, Kai Chen, Zhao Ge, Zewei Guan, Heng Qi, Song Zhang, Guyue Liu |