USENIX Security '24 | VeriSimplePIR: Verifiability in SimplePIR at No Online Cost for Honest Servers | Leo de Castro, Keewoo Lee |
USENIX Security '24 | Trust Me If You Can – How Usable Is Trusted Types In Practice? | Sebastian Roth, Lea Gröber, Philipp Baus, Katharina Krombholz, Ben Stock |
USENIX Security '24 | "I just hated it and I want my money back": Data-driven Understanding of Mobile VPN Service Switching Preferences in The Wild | Rohit Raj, Mridul Newar, Mainack Mondal |
USENIX Security '24 | RECORD: A RECeption-Only Region Determination Attack on LEO Satellite Users | Eric Jedermann, Martin Strohmeier, Vincent Lenders, Jens Schmitt |
USENIX Security '24 | When Threads Meet Interrupts: Effective Static Detection of Interrupt-Based Deadlocks in Linux | Chengfeng Ye, Yuandao Cai, Charles Zhang |
USENIX Security '24 | On Data Fabrication in Collaborative Vehicular Perception: Attacks and Countermeasures | Qingzhao Zhang, Shuowei Jin, Ruiyang Zhu, Jiachen Sun, Xumiao Zhang, Qi Alfred Chen, Z. Morley Mao |
USENIX Security '24 | ENG25519: Faster TLS 1.3 handshake using optimized X25519 and Ed25519 | Jipeng Zhang, Junhao Huang, Lirui Zhao, Donglong Chen, Çetin Kaya Koç |
USENIX Security '24 | Enabling Developers, Protecting Users: Investigating Harassment and Safety in VR | Abhinaya S.B., Aafaq Sabir, Anupam Das |
USENIX Security '24 | Opportunistic Data Flow Integrity for Real-time Cyber-physical Systems Using Worst Case Execution Time Reservation | Yujie Wang, Ao Li, Jinwen Wang, Sanjoy Baruah, Ning Zhang |
USENIX Security '24 | With Great Power Come Great Side Channels: Statistical Timing Side-Channel Analyses with Bounded Type-1 Errors | Martin Dunsche, Marcel Maehren, Nurullah Erinola, Robert Merget, Nicolai Bissantz, Juraj Somorovsky, Jörg Schwenk |
USENIX Security '24 | "These results must be false": A usability evaluation of constant-time analysis tools | Marcel Fourné, Daniel De Almeida Braga, Jan Jancar, Mohamed Sabt, Peter Schwabe, Gilles Barthe, Pierre-Alain Fouque, Yasemin Acar |
USENIX Security '24 | Dancer in the Dark: Synthesizing and Evaluating Polyglots for Blind Cross-Site Scripting | Robin Kirchner, Jonas Möller, Marius Musch, David Klein, Konrad Rieck, Martin Johns |
USENIX Security '24 | Spider-Scents: Grey-box Database-aware Web Scanning for Stored XSS | Eric Olsson, Benjamin Eriksson, Adam Doupé, Andrei Sabelfeld |
USENIX Security '24 | False Claims against Model Ownership Resolution | Jian Liu, Rui Zhang, Sebastian Szyller, Kui Ren, N. Asokan |
USENIX Security '24 | A Friend's Eye is A Good Mirror: Synthesizing MCU Peripheral Models from Peripheral Drivers | Chongqing Lei, Zhen Ling, Yue Zhang, Yan Yang, Junzhou Luo, Xinwen Fu |
USENIX Security '24 | SoK: Security of Programmable Logic Controllers | Efrén López-Morales, Ulysse Planta, Carlos Rubio-Medrano, Ali Abbasi, Alvaro A. Cardenas |
USENIX Security '24 | Operation Mango: Scalable Discovery of Taint-Style Vulnerabilities in Binary Firmware Services | Wil Gibbs, Arvind S Raj, Jayakrishna Menon Vadayath, Hui Jun Tay, Justin Miller, Akshay Ajayan, Zion Leonahenahe Basque, Audrey Dutcher, Fangzhou Dong, Xavier Maso, Giovanni Vigna, Christopher Kruegel, Adam Doupé, Yan Shoshitaishvili, Ruoyu Wang |
USENIX Security '24 | FraudWhistler: A Resilient, Robust and Plug-and-play Adversarial Example Detection Method for Speaker Recognition | Kun Wang, Xiangyu Xu, Li Lu, Zhongjie Ba, Feng Lin, Kui Ren |
USENIX Security '24 | Terrapin Attack: Breaking SSH Channel Integrity By Sequence Number Manipulation | Fabian Bäumer, Marcus Brinkmann, Jörg Schwenk |
OSDI '24 | Managing Memory Tiers with CXL in Virtualized Environments | Yuhong Zhong, Daniel S. Berger, Carl Waldspurger, Ryan Wee, Ishwar Agarwal, Rajat Agarwal, Frank Hady, Karthik Kumar, Mark D. Hill, Mosharaf Chowdhury, Asaf Cidon |
OSDI '24 | Llumnix: Dynamic Scheduling for Large Language Model Serving | Biao Sun, Ziming Huang, Hanyu Zhao, Wencong Xiao, Xinyi Zhang, Yong Li, Wei Lin |
OSDI '24 | Validating the eBPF Verifier via State Embedding | Hao Sun, Zhendong Su |
OSDI '24 | Fairness in Serving Large Language Models | Ying Sheng, Shiyi Cao, Dacheng Li, Banghua Zhu, Zhuohan Li, Danyang Zhuo, Joseph E. Gonzalez, Ion Stoica |
NSDI '24 | Horus: Granular In-Network Task Scheduler for Cloud Datacenters | Parham Yassini, Khaled Diab, Saeed Mahloujifar, Mohamed Hefeeda |
NSDI '24 | Sifter: An Inversion-Free and Large-Capacity Programmable Packet Scheduler | Peixuan Gao, Anthony Dalleggio, Jiajin Liu, Chen Peng, Yang Xu, H. Jonathan Chao |