| GuideEnricher: Protecting the Anonymity of Ethereum Mixing Service Users with Deep Reinforcement Learning | USENIX Security '24 | Ravindu De Silva, Wenbo Guo, Nicola Ruaro, Ilya Grishchenko, Christopher Kruegel, Giovanni Vigna |
| ChainReactor: Automated Privilege Escalation Chain Discovery via AI Planning | USENIX Security '24 | Giulio De Pasquale, Ilya Grishchenko, Riccardo Iesari, Gabriel Pizarro, Lorenzo Cavallaro, Christopher Kruegel, Giovanni Vigna |
| Max Attestation Matters: Making Honest Parties Lose Their Incentives in Ethereum PoS | USENIX Security '24 | Mingfei Zhang, Rujia Li, Sisi Duan |
| Using My Functions Should Follow My Checks: Understanding and Detecting Insecure OpenZeppelin Code in Smart Contracts | USENIX Security '24 | Han Liu, Daoyuan Wu, Yuqiang Sun, Haijun Wang, Kaixuan Li, Yang Liu, Yixiang Chen |
| Malla: Demystifying Real-world Large Language Model Integrated Malicious Services | USENIX Security '24 | Zilong Lin, Jian Cui, Xiaojing Liao, XiaoFeng Wang |
| Peep With A Mirror: Breaking The Integrity of Android App Sandboxing via Unprivileged Cache Side Channel | USENIX Security '24 | Yan Lin, Joshua Wong, Xiang Li, Haoyu Ma, Debin Gao |
| Demystifying the Security Implications in IoT Device Rental Services | USENIX Security '24 | Yi He, Yunchao Guan, Ruoyu Lun, Shangru Song, Zhihao Guo, Jianwei Zhuge, Jianjun Chen, Qiang Wei, Zehui Wu, Miao Yu, Hetian Shi, Qi Li |
| ChainPatrol: Balancing Attack Detection and Classification with Performance Overhead for Service Function Chains Using Virtual Trailers | USENIX Security '24 | Momen Oqaily, Hinddeep Purohit, Yosr Jarraya, Lingyu Wang, Boubakr Nour, Makan Pourzandi, Mourad Debbabi |
| Detecting and Mitigating Sampling Bias in Cybersecurity with Unlabeled Data | USENIX Security '24 | Saravanan Thirumuruganathan, Fatih Deniz, Issa Khalil, Ting Yu, Mohamed Nabeel, Mourad Ouzzani |
| Privacy-Preserving Data Aggregation with Public Verifiability Against Internal Adversaries | USENIX Security '24 | Marco Palazzo, Florine W. Dekker, Alessandro Brighente, Mauro Conti, Zekeriya Erkin |
| ACE: A Model Poisoning Attack on Contribution Evaluation Methods in Federated Learning | USENIX Security '24 | Zhangchen Xu, Fengqing Jiang, Luyao Niu, Jinyuan Jia, Bo Li, Radha Poovendran |
| Take a Step Further: Understanding Page Spray in Linux Kernel Exploitation | USENIX Security '24 | Ziyi Guo, Dang K Le, Zhenpeng Lin, Kyle Zeng, Ruoyu Wang, Tiffany Bao, Yan Shoshitaishvili, Adam Doupé, Xinyu Xing |
| InSpectre Gadget: Inspecting the Residual Attack Surface of Cross-privilege Spectre v2 | USENIX Security '24 | Sander Wiebing, Alvise de Faveri Tron, Herbert Bos, Cristiano Giuffrida |
| SCAVY: Automated Discovery of Memory Corruption Targets in Linux Kernel for Privilege Escalation | USENIX Security '24 | Erin Avllazagaj, Yonghwi Kwon, Tudor Dumitraș |
| CO3: Concolic Co-execution for Firmware | USENIX Security '24 | Changming Liu, Alejandro Mera, Engin Kirda, Meng Xu, Long Lu |
| Toward Unbiased Multiple-Target Fuzzing with Path Diversity | USENIX Security '24 | Huanyao Rong, Wei You, XiaoFeng Wang, Tianhao Mao |
| LLM-Fuzzer: Scaling Assessment of Large Language Model Jailbreaks | USENIX Security '24 | Jiahao Yu, Xingwei Lin, Zheng Yu, Xinyu Xing |
| Into the Dark: Unveiling Internal Site Search Abused for Black Hat SEO | USENIX Security '24 | Yunyi Zhang, Mingxuan Liu, Baojun Liu, Yiming Zhang, Haixin Duan, Min Zhang, Hui Jiang, Yanzhe Li, Fan Shi |
| Shesha: Multi-head Microarchitectural Leakage Discovery in new-generation Intel Processors | USENIX Security '24 | Anirban Chakraborty, Nimish Mishra, Debdeep Mukhopadhyay |
| Do You See How I Pose? Using Poses as an Implicit Authentication Factor for QR Code Payment | USENIX Security '24 | Chuxiong Wu, Qiang Zeng |
| PentestGPT: Evaluating and Harnessing Large Language Models for Automated Penetration Testing | USENIX Security '24 | Gelei Deng, Yi Liu, Víctor Mayoral-Vilches, Peng Liu, Yuekang Li, Yuan Xu, Tianwei Zhang, Yang Liu, Martin Pinzger, Stefan Rass |
| Can I Hear Your Face? Pervasive Attack on Voice Authentication Systems with a Single Face Image | USENIX Security '24 | Nan Jiang, Bangjie Sun, Terence Sim, Jun Han |
| A Wolf in Sheep's Clothing: Practical Black-box Adversarial Attacks for Evading Learning-based Windows Malware Detection in the Wild | USENIX Security '24 | Xiang Ling, Zhiyu Wu, Bin Wang, Wei Deng, Jingzheng Wu, Shouling Ji, Tianyue Luo, Yanjun Wu |
| GridSE: Towards Practical Secure Geographic Search via Prefix Symmetric Searchable Encryption | USENIX Security '24 | Ruoyang Guo, Jiarui Li, Shucheng Yu |
| Improving Indirect-Call Analysis in LLVM with Type and Data-Flow Co-Analysis | USENIX Security '24 | Dinghao Liu, Shouling Ji, Kangjie Lu, Qinming He |