| The Power of Words: Generating PowerShell Attacks from Natural Language | WOOT '24 | Pietro Liguori, Christian Marescalco, Roberto Natella, Vittorio Orbinato, Luciano Pianese |
| WhatsApp with privacy? Privacy issues with IM E2EE in the Multi-device setting | WOOT '24 | Tal A. Be'ery |
| MakeShift: Security Analysis of Shimano Di2 Wireless Gear Shifting in Bicycles | WOOT '24 | Maryam Motallebighomi, Earlence Fernandes, Aanjhan Ranganathan |
| SoK: Where’s the “up”?! A Comprehensive (bottom-up) Study on the Security of Arm Cortex-M Systems | WOOT '24 | Xi Tan, Zheyuan Ma, Sandro Pinto, Le Guan, Ning Zhang, Jun Xu, Zhiqiang Lin, Hongxin Hu, Ziming Zhao |
| Engineering a backdoored bitcoin wallet | WOOT '24 | Adam Scott, Sean Andersen |
| SOK: 3D Printer Firmware Attacks on Fused Filament Fabrication | WOOT '24 | Muhammad Haris Rais, Muhammad Ahsan, Irfan Ahmed |
| SoK: On the Effectiveness of Control-Flow Integrity in Practice | WOOT '24 | Lucas Becker, Matthias Hollick, Jiska Classen |
| Amplifying Threats: The Role of Multi-Sender Coordination in SMS-Timing-Based Location Inference Attacks | WOOT '24 | Evangelos Bitsikas, Theodor Schnitzler, Christina Pöpper, Aanjhan Ranganathan |
| Achilles Heel in Secure Boot: Breaking RSA Authentication and Bitstream Recovery from Zynq-7000 SoC | WOOT '24 | Prasanna Ravi, Arpan Jati, Shivam Bhasin |
| Reflecting on Twenty Years of Usable Privacy and Security | SOUPS 2024 | Lorrie Faith Cranor, Simson Garfinkel, Robert Biddle, Mary Ellen Zurko |
| SymBisect: Accurate Bisection for Fuzzer-Exposed Vulnerabilities | USENIX Security '24 | Zheng Zhang, Yu Hao, Weiteng Chen, Xiaochen Zou, Xingyu Li, Haonan Li, Yizhuo Zhai, Billy Lau |
| SLUBStick: Arbitrary Memory Writes through Practical Software Cross-Cache Attacks within the Linux Kernel | USENIX Security '24 | Lukas Maar, Stefan Gast, Martin Unterguggenberger, Mathias Oberhuber, Stefan Mangard |
| PrivImage: Differentially Private Synthetic Image Generation using Diffusion Models with Semantic-Aware Pretraining | USENIX Security '24 | Kecen Li, Chen Gong, Zhixiang Li, Yuzhong Zhao, Xinwen Hou, Tianhao Wang |
| 00SEVen – Re-enabling Virtual Machine Forensics: Introspecting Confidential VMs Using Privileged in-VM Agents | USENIX Security '24 | Fabian Schwarz, Christian Rossow |
| ShadowBound: Efficient Heap Memory Protection Through Advanced Metadata Management and Customized Compiler Optimization | USENIX Security '24 | Zheng Yu, Ganxiang Yang, Xinyu Xing |
| GraphGuard: Private Time-Constrained Pattern Detection Over Streaming Graphs in the Cloud | USENIX Security '24 | Songlei Wang, Yifeng Zheng, Xiaohua Jia |
| Adversary is on the Road: Attacks on Visual SLAM using Unnoticeable Adversarial Patch | USENIX Security '24 | Baodong Chen, Wei Wang, Pascal Sikorski, Ting Zhu |
| PhishDecloaker: Detecting CAPTCHA-cloaked Phishing Websites via Hybrid Vision-based Interactive Models | USENIX Security '24 | Xiwen Teoh, Yun Lin, Ruofan Liu, Zhiyong Huang, Jin Song Dong |
| zkCross: A Novel Architecture for Cross-Chain Privacy-Preserving Auditing | USENIX Security '24 | Yihao Guo, Minghui Xu, Xiuzhen Cheng, Dongxiao Yu, Wangjie Qiu, Gang Qu, Weibing Wang, Mingming Song |
| MicGuard: A Comprehensive Detection System against Out-of-band Injection Attacks for Different Level Microphone-based Devices | USENIX Security '24 | Tiantian Liu, Feng Lin, Zhongjie Ba, Li Lu, Zhan Qin, Kui Ren |
| Simulated Stress: A Case Study of the Effects of a Simulated Phishing Campaign on Employees' Perception, Stress and Self-Efficacy | USENIX Security '24 | Markus Schöps, Marco Gutfleisch, Eric Wolter, M. Angela Sasse |
| Exploring ChatGPT's Capabilities on Vulnerability Management | USENIX Security '24 | Peiyu Liu, Junming Liu, Lirong Fu, Kangjie Lu, Yifan Xia, Xuhong Zhang, Wenzhi Chen, Haiqin Weng, Shouling Ji, Wenhai Wang |
| Gradients Look Alike: Sensitivity is Often Overestimated in DP-SGD | USENIX Security '24 | Anvith Thudi, Hengrui Jia, Casey Meehan, Ilia Shumailov, Nicolas Papernot |
| SAIN: Improving ICS Attack Detection Sensitivity via State-Aware Invariants | USENIX Security '24 | Syed Ghazanfar Abbas, Muslum Ozgur Ozmen, Abdulellah Alsaheel, Arslan Khan, Z. Berkay Celik, Dongyan Xu |
| Voodoo: Memory Tagging, Authenticated Encryption, and Error Correction through MAGIC | USENIX Security '24 | Lukas Lamster, Martin Unterguggenberger, David Schrammel, Stefan Mangard |