| LaKey: Efficient Lattice-Based Distributed PRFs Enable Scalable Distributed Key Management | USENIX Security '24 | Matthias Geihs, Hart Montgomery |
| dp-promise: Differentially Private Diffusion Probabilistic Models for Image Synthesis | USENIX Security '24 | Haichen Wang, Shuchao Pang, Zhigang Lu, Yihang Rao, Yongbin Zhou, Minhui Xue |
| The Impact of Exposed Passwords on Honeyword Efficacy | USENIX Security '24 | Zonghao Huang, Lujo Bauer, Michael K. Reiter |
| PIXELMOD: Improving Soft Moderation of Visual Misleading Information on Twitter | USENIX Security '24 | Pujan Paudel, Chen Ling, Jeremy Blackburn, Gianluca Stringhini |
| Data Subjects' Reactions to Exercising Their Right of Access | USENIX Security '24 | Arthur Borem, Elleen Pan, Olufunmilola Obielodan, Aurelie Roubinowitz, Luca Dovichi, Michelle L. Mazurek, Blase Ur |
| GoFetch: Breaking Constant-Time Cryptographic Implementations Using Data Memory-Dependent Prefetchers | USENIX Security '24 | Boru Chen, Yingchen Wang, Pradyumna Shome, Christopher Fletcher, David Kohlbrenner, Riccardo Paccagnella, Daniel Genkin |
| SafeFetch: Practical Double-Fetch Protection with Kernel-Fetch Caching | USENIX Security '24 | Victor Duta, Mitchel Josephus Aloserij, Cristiano Giuffrida |
| SoK: The Good, The Bad, and The Unbalanced: Measuring Structural Limitations of Deepfake Media Datasets | USENIX Security '24 | Seth Layton, Tyler Tucker, Daniel Olszewski, Kevin Warren, Kevin Butler, Patrick Traynor |
| Don't Listen To Me: Understanding and Exploring Jailbreak Prompts of Large Language Models | USENIX Security '24 | Zhiyuan Yu, Xiaogeng Liu, Shunning Liang, Zach Cameron, Chaowei Xiao, Ning Zhang |
| SeaK: Rethinking the Design of a Secure Allocator for OS Kernel | USENIX Security '24 | Zicheng Wang, Yicheng Guang, Yueqi Chen, Zhenpeng Lin, Michael Le, Dang K Le, Dan Williams, Xinyu Xing, Zhongshu Gu, Hani Jamjoom |
| Operation Mango: Scalable Discovery of Taint-Style Vulnerabilities in Binary Firmware Services | USENIX Security '24 | Wil Gibbs, Arvind S Raj, Jayakrishna Menon Vadayath, Hui Jun Tay, Justin Miller, Akshay Ajayan, Zion Leonahenahe Basque, Audrey Dutcher, Fangzhou Dong, Xavier Maso, Giovanni Vigna, Christopher Kruegel, Adam Doupé, Yan Shoshitaishvili, Ruoyu Wang |
| Security and Privacy Software Creators' Perspectives on Unintended Consequences | USENIX Security '24 | Harshini Sri Ramulu, Helen Schmitt, Dominik Wermke, Yasemin Acar |
| Exploring digital security and privacy in relative poverty in Germany through qualitative interviews | USENIX Security '24 | Anastassija Kostan, Sara Olschar, Lucy Simko, Yasemin Acar |
| Enabling Contextual Soft Moderation on Social Media through Contrastive Textual Deviation | USENIX Security '24 | Pujan Paudel, Mohammad Hammas Saeed, Rebecca Auger, Chris Wells, Gianluca Stringhini |
| HECKLER: Breaking Confidential VMs with Malicious Interrupts | USENIX Security '24 | Benedict Schlüter, Supraja Sridhara, Mark Kuhne, Andrin Bertschi, Shweta Shinde |
| Snowflake, a censorship circumvention system using temporary WebRTC proxies | USENIX Security '24 | Cecylia Bocovich, Arlo Breault, David Fifield, Serene, Xiaokang Wang |
| MD-ML: Super Fast Privacy-Preserving Machine Learning for Malicious Security with a Dishonest Majority | USENIX Security '24 | Boshi Yuan, Shixuan Yang, Yongxiang Zhang, Ning Ding, Dawu Gu, Shi-Feng Sun |
| DeepEclipse: How to Break White-Box DNN-Watermarking Schemes | USENIX Security '24 | Alessandro Pegoraro, Carlotta Segna, Kavita Kumari, Ahmad-Reza Sadeghi |
| Large Language Models for Code Analysis: Do LLMs Really Do Their Job? | USENIX Security '24 | Chongzhou Fang, Ning Miao, Shaurya Srivastav, Jialin Liu, Ruoyu Zhang, Ruijie Fang, Asmita, Ryan Tsang, Najmeh Nazari, Han Wang, Houman Homayoun |
| Scalable Zero-knowledge Proofs for Non-linear Functions in Machine Learning | USENIX Security '24 | Meng Hao, Hanxiao Chen, Hongwei Li, Chenkai Weng, Yuan Zhang, Haomiao Yang, Tianwei Zhang |
| SoK: All You Need to Know About On-Device ML Model Extraction - The Gap Between Research and Practice | USENIX Security '24 | Tushar Nayan, Qiming Guo, Mohammed Al Duniawi, Marcus Botacin, Selcuk Uluagac, Ruimin Sun |
| AttackGNN: Red-Teaming GNNs in Hardware Security Using Reinforcement Learning | USENIX Security '24 | Vasudev Gohil, Satwik Patnaik, Dileep Kalathil, Jeyavijayan Rajendran |
| Being Transparent is Merely the Beginning: Enforcing Purpose Limitation with Polynomial Approximation | USENIX Security '24 | Shuofeng Liu, Zihan Wang, Minhui Xue, Long Wang, Yuanchao Zhang, Guangdong Bai |
| DARKFLEECE: Probing the Dark Side of Android Subscription Apps | USENIX Security '24 | Chang Yue, Chen Zhong, Kai Chen, Zhiyu Zhang, Yeonjoon Lee |
| Property Existence Inference against Generative Models | USENIX Security '24 | Lijin Wang, Jingjing Wang, Jie Wan, Lin Long, Ziqi Yang, Zhan Qin |