| Sprints: Intermittent Blockchain PoW Mining | USENIX Security '24 | Michael Mirkin, Lulu Zhou, Ittay Eyal, Fan Zhang |
| TAPFixer: Automatic Detection and Repair of Home Automation Vulnerabilities based on Negated-property Reasoning | USENIX Security '24 | Yinbo Yu, Yuanqi Xu, Kepu Huang, Jiajia Liu |
| Tickets or Privacy? Understand the Ecosystem of Chinese Ticket Grabbing Apps | USENIX Security '24 | Yijing Liu, Yiming Zhang, Baojun Liu, Haixin Duan, Qiang Li, Mingxuan Liu, Ruixuan Li, Jia Yao |
| Secure Account Recovery for a Privacy-Preserving Web Service | USENIX Security '24 | |
| REMARK-LLM: A Robust and Efficient Watermarking Framework for Generative Large Language Models | USENIX Security '24 | Ruisi Zhang, Shehzeen Samarah Hussain, Paarth Neekhara, Farinaz Koushanfar |
| MIST: Defending Against Membership Inference Attacks Through Membership-Invariant Subspace Training | USENIX Security '24 | Jiacheng Li, Ninghui Li, Bruno Ribeiro |
| π-Jack: Physical-World Adversarial Attack on Monocular Depth Estimation with Perspective Hijacking | USENIX Security '24 | Tianyue Zheng, Jingzhi Hu, Rui Tan, Yinqian Zhang, Ying He, Jun Luo |
| Lurking in the shadows: Unveiling Stealthy Backdoor Attacks against Personalized Federated Learning | USENIX Security '24 | Xiaoting Lyu, Yufei Han, Wei Wang, Jingkai Liu, Yongsheng Zhu, Guangquan Xu, Jiqiang Liu, Xiangliang Zhang |
| Pandawan: Quantifying Progress in Linux-based Firmware Rehosting | USENIX Security '24 | Ioannis Angelakopoulos, Gianluca Stringhini, Manuel Egele |
| Reconstructing training data from document understanding models | USENIX Security '24 | Jérémie Dentan, Arnaud Paran, Aymen Shabou |
| Leveraging Semantic Relations in Code and Data to Enhance Taint Analysis of Embedded Systems | USENIX Security '24 | Jiaxu Zhao, Yuekang Li, Yanyan Zou, Zhaohui Liang, Yang Xiao, Yeting Li, Bingwei Peng, Nanyu Zhong, Xinyi Wang, Wei Wang, Wei Huo |
| Near-Optimal Constrained Padding for Object Retrievals with Dependencies | USENIX Security '24 | Pranay Jain, Andrew C. Reed, Michael K. Reiter |
| MUSES: Efficient Multi-User Searchable Encrypted Database | USENIX Security '24 | Tung Le, Rouzbeh Behnia, Jorge Guajardo, Thang Hoang |
| Remote Keylogging Attacks in Multi-user VR Applications | USENIX Security '24 | Zihao Su, Kunlin Cai, Reuben Beeler, Lukas Dresel, Allan Garcia, Ilya Grishchenko, Yuan Tian, Christopher Kruegel, Giovanni Vigna |
| GPU Memory Exploitation for Fun and Profit | USENIX Security '24 | Yanan Guo, Zhenkai Zhang, Jun Yang |
| You Can Obfuscate, but You Cannot Hide: CrossPoint Attacks against Network Topology Obfuscation | USENIX Security '24 | Xuanbo Huang, Kaiping Xue, Lutong Chen, Mingrui Ai, Huancheng Zhou, Bo Luo, Guofei Gu, Qibin Sun |
| SymFit: Making the Common (Concrete) Case Fast for Binary-Code Concolic Execution | USENIX Security '24 | Zhenxiao Qi, Jie Hu, Zhaoqi Xiao, Heng Yin |
| Improving ML-based Binary Function Similarity Detection by Assessing and Deprioritizing Control Flow Graph Features | USENIX Security '24 | Jialai Wang, Chao Zhang, Longfei Chen, Yi Rong, Yuxiao Wu, Hao Wang, Wende Tan, Qi Li, Zongpeng Li |
| Biosignal Authentication Considered Harmful Today | USENIX Security '24 | Veena Krish, Nicola Paoletti, Milad Kazemi, Scott Smolka, Amir Rahmati |
| All Your Tokens are Belong to Us: Demystifying Address Verification Vulnerabilities in Solidity Smart Contracts | USENIX Security '24 | Tianle Sun, Ningyu He, Jiang Xiao, Yinliang Yue, Xiapu Luo, Haoyu Wang |
| Mempool Privacy via Batched Threshold Encryption: Attacks and Defenses | USENIX Security '24 | Arka Rai Choudhuri, Sanjam Garg, Julien Piet, Guru-Vamsi Policharla |
| SPF Beyond the Standard: Management and Operational Challenges in Practice and Practical Recommendations | USENIX Security '24 | Md. Ishtiaq Ashiq, Weitong Li, Tobias Fiebig, Taejoong Chung |
| Investigating Moderation Challenges to Combating Hate and Harassment: The Case of Mod-Admin Power Dynamics and Feature Misuse on Reddit | USENIX Security '24 | Madiha Tabassum, Alana Mackey, Ashley Schuett, Ada Lerner |
| Understanding Ethereum Mempool Security under Asymmetric DoS by Symbolized Stateful Fuzzing | USENIX Security '24 | Yibo Wang, Yuzhe Tang, Kai Li, Wanning Ding, Zhihua Yang |
| Efficient Privacy Auditing in Federated Learning | USENIX Security '24 | Hongyan Chang, Brandon Edwards, Anindya S. Paul, Reza Shokri |