USENIX Security '24 | Unbalanced Circuit-PSI from Oblivious Key-Value Retrieval | Meng Hao, Weiran Liu, Liqiang Peng, Hongwei Li, Cong Zhang, Hanxiao Chen, Tianwei Zhang |
USENIX Security '24 | Being Transparent is Merely the Beginning: Enforcing Purpose Limitation with Polynomial Approximation | Shuofeng Liu, Zihan Wang, Minhui Xue, Long Wang, Yuanchao Zhang, Guangdong Bai |
USENIX Security '24 | Devil in the Room: Triggering Audio Backdoors in the Physical World | Meng Chen, Xiangyu Xu, Li Lu, Zhongjie Ba, Feng Lin, Kui Ren |
USENIX Security '24 | FraudWhistler: A Resilient, Robust and Plug-and-play Adversarial Example Detection Method for Speaker Recognition | Kun Wang, Xiangyu Xu, Li Lu, Zhongjie Ba, Feng Lin, Kui Ren |
USENIX Security '24 | DaCapo: Automatic Bootstrapping Management for Efficient Fully Homomorphic Encryption | Seonyoung Cheon, Yongwoo Lee, Dongkwan Kim, Ju Min Lee, Sunchul Jung, Taekyung Kim, Dongyoon Lee, Hanjun Kim |
USENIX Security '24 | The Unpatchables: Why Municipalities Persist in Running Vulnerable Hosts | Aksel Ethembabaoglu, Rolf van Wegberg, Yury Zhauniarovich, Michel van Eeten |
USENIX Security '24 | Why Aren't We Using Passkeys? Obstacles Companies Face Deploying FIDO2 Passwordless Authentication | Leona Lassak, Elleen Pan, Blase Ur, Maximilian Golla |
USENIX Security '24 | Key Recovery Attacks on Approximate Homomorphic Encryption with Non-Worst-Case Noise Flooding Countermeasures | Qian Guo, Denis Nabokov, Elias Suvanto, Thomas Johansson |
USENIX Security '24 | PINE: Efficient Verification of a Euclidean Norm Bound of a Secret-Shared Vector | Guy N. Rothblum, Eran Omri, Junye Chen, Kunal Talwar |
USENIX Security '24 | SoK (or SoLK?): On the Quantitative Study of Sociodemographic Factors and Computer Security Behaviors | Miranda Wei, Jaron Mink, Yael Eiger, Tadayoshi Kohno, Elissa M. Redmiles, Franziska Roesner |
USENIX Security '24 | EaTVul: ChatGPT-based Evasion Attack Against Software Vulnerability Detection | Shigang Liu, Di Cao, Junae Kim, Tamas Abraham, Paul Montague, Seyit Camtepe, Jun Zhang, Yang Xiang |
USENIX Security '24 | SoK: Security of Programmable Logic Controllers | Efrén López-Morales, Ulysse Planta, Carlos Rubio-Medrano, Ali Abbasi, Alvaro A. Cardenas |
USENIX Security '24 | A Friend's Eye is A Good Mirror: Synthesizing MCU Peripheral Models from Peripheral Drivers | Chongqing Lei, Zhen Ling, Yue Zhang, Yan Yang, Junzhou Luo, Xinwen Fu |
USENIX Security '24 | AE-Morpher: Improve Physical Robustness of Adversarial Objects against LiDAR-based Detectors via Object Reconstruction | Shenchen Zhu, Yue Zhao, Kai Chen, Bo Wang, Hualong Ma, Cheng'an Wei |
USENIX Security '24 | Terrapin Attack: Breaking SSH Channel Integrity By Sequence Number Manipulation | Fabian Bäumer, Marcus Brinkmann, Jörg Schwenk |
USENIX Security '24 | A Mixed-Methods Study on User Experiences and Challenges of Recovery Codes for an End-to-End Encrypted Service | Sandra Höltervennhoff, Noah Wöhler, Arne Möhle, Marten Oltrogge, Yasemin Acar, Oliver Wiese, Sascha Fahl |
USENIX Security '24 | Operation Mango: Scalable Discovery of Taint-Style Vulnerabilities in Binary Firmware Services | Wil Gibbs, Arvind S Raj, Jayakrishna Menon Vadayath, Hui Jun Tay, Justin Miller, Akshay Ajayan, Zion Leonahenahe Basque, Audrey Dutcher, Fangzhou Dong, Xavier Maso, Giovanni Vigna, Christopher Kruegel, Adam Doupé, Yan Shoshitaishvili, Ruoyu Wang |
USENIX Security '24 | The Challenges of Bringing Cryptography from Research Papers to Products: Results from an Interview Study with Experts | Konstantin Fischer, Ivana Trummová, Phillip Gajland, Yasemin Acar, Sascha Fahl, Angela Sasse |
USENIX Security '24 | Splitting the Difference on Adversarial Training | Matan Levi, Aryeh Kontorovich |
USENIX Security '23 | Tubes Among Us: Analog Attack on Automatic Speaker Identification | Shimaa Ahmed, Yash Wani, Ali Shahin Shamsabadi, Mohammad Yaghini, Ilia Shumailov, Nicolas Papernot, Kassem Fawaz |
USENIX Security '23 | Practical Asynchronous High-threshold Distributed Key Generation and Distributed Polynomial Sampling | Sourav Das, Zhuolun Xiang, Lefteris Kokoris-Kogias, Ling Ren |
USENIX Security '23 | Every Vote Counts: Ranking-Based Training of Federated Learning to Resist Poisoning Attacks | Hamid Mozaffari, Virat Shejwalkar, Amir Houmansadr |
USENIX Security '23 | Hidden Reality: Caution, Your Hand Gesture Inputs in the Immersive Virtual World are Visible to All! | Sindhu Reddy Kalathur Gopal, Diksha Shukla, James David Wheelock, Nitesh Saxena |
USENIX Security '23 | ARI: Attestation of Real-time Mission Execution Integrity | Jinwen Wang, Yujie Wang, Ao Li, Yang Xiao, Ruide Zhang, Wenjing Lou, Y. Thomas Hou, Ning Zhang |
USENIX Security '23 | Eos: Efficient Private Delegation of zkSNARK Provers | Alessandro Chiesa, Ryan Lehmkuhl, Pratyush Mishra, Yinuo Zhang |