| LaserAdv: Laser Adversarial Attacks on Speech Recognition Systems | USENIX Security '24 | Guoming Zhang, Xiaohui Ma, Huiting Zhang, Zhijie Xiang, Xiaoyu Ji, Yanni Yang, Xiuzhen Cheng, Pengfei Hu |
| O-Ring and K-Star: Efficient Multi-party Private Set Intersection | USENIX Security '24 | Mingli Wu, Tsz Hon Yuen, Kwan Yin Chan |
| Correction-based Defense Against Adversarial Video Attacks via Discretization-Enhanced Video Compressive Sensing | USENIX Security '24 | Wei Song, Cong Cong, Haonan Zhong, Jingling Xue |
| TYGR: Type Inference on Stripped Binaries using Graph Neural Networks | USENIX Security '24 | Chang Zhu, Ziyang Li, Anton Xue, Ati Priya Bajaj, Wil Gibbs, Yibo Liu, Rajeev Alur, Tiffany Bao, Hanjun Dai, Adam Doupé, Mayur Naik, Yan Shoshitaishvili, Ruoyu Wang, Aravind Machiry |
| BUDAlloc: Defeating Use-After-Free Bugs by Decoupling Virtual Address Management from Kernel | USENIX Security '24 | Junho Ahn, Jaehyeon Lee, Kanghyuk Lee, Wooseok Gwak, Minseong Hwang, Youngjin Kwon |
| LR-Miner: Static Race Detection in OS Kernels by Mining Locking Rules | USENIX Security '24 | Tuo Li, Jia-Ju Bai, Gui-Dong Han, Shi-Min Hu |
| Towards an Effective Method of ReDoS Detection for Non-backtracking Engines | USENIX Security '24 | Weihao Su, Hong Huang, Rongchen Li, Haiming Chen, Tingjian Ge |
| Guardians of the Galaxy: Content Moderation in the InterPlanetary File System | USENIX Security '24 | Saidu Sokoto, Leonhard Balduf, Dennis Trautwein, Yiluo Wei, Gareth Tyson, Ignacio Castro, Onur Ascigil, George Pavlou, Maciej Korczyński, Björn Scheuermann, Michał Król |
| Co-Designing a Mobile App for Bystander Privacy Protection in Jordanian Smart Homes: A Step Towards Addressing a Complex Privacy Landscape | USENIX Security '24 | Wael Albayaydh, Ivan Flechais |
| "Did They F***ing Consent to That?": Safer Digital Intimacy via Proactive Protection Against Image-Based Sexual Abuse | USENIX Security '24 | Lucy Qin, Vaughn Hamilton, Sharon Wang, Yigit Aydinalp, Marin Scarlett, Elissa M. Redmiles |
| Improving the Ability of Thermal Radiation Based Hardware Trojan Detection | USENIX Security '24 | Ting Su, Yaohua Wang, Shi Xu, Lusi Zhang, Simin Feng, Jialong Song, Yiming Liu, Yongkang Tang, Yang Zhang, Shaoqing Li, Yang Guo, Hengzhu Liu |
| VulSim: Leveraging Similarity of Multi-Dimensional Neighbor Embeddings for Vulnerability Detection | USENIX Security '24 | Samiha Shimmi, Ashiqur Rahman, Mohan Gadde, Hamed Okhravi, Mona Rahimi |
| Defects-in-Depth: Analyzing the Integration of Effective Defenses against One-Day Exploits in Android Kernels | USENIX Security '24 | Lukas Maar, Florian Draschbacher, Lukas Lamster, Stefan Mangard |
| On a Collision Course: Unveiling Wireless Attacks to the Aircraft Traffic Collision Avoidance System (TCAS) | USENIX Security '24 | Giacomo Longo, Martin Strohmeier, Enrico Russo, Alessio Merlo, Vincent Lenders |
| KnowPhish: Large Language Models Meet Multimodal Knowledge Graphs for Enhancing Reference-Based Phishing Detection | USENIX Security '24 | Yuexin Li, Chengyu Huang, Shumin Deng, Mei Lin Lock, Tri Cao, Nay Oo, Hoon Wei Lim, Bryan Hooi |
| Indirector: High-Precision Branch Target Injection Attacks Exploiting the Indirect Branch Predictor | USENIX Security '24 | Luyi Li, Hosein Yavarzadeh, Dean Tullsen |
| GHunter: Universal Prototype Pollution Gadgets in JavaScript Runtimes | USENIX Security '24 | Eric Cornelissen, Mikhail Shcherbakov, Musard Balliu |
| Landscape More Secure Than Portrait? Zooming Into the Directionality of Digital Images With Security Implications | USENIX Security '24 | Benedikt Lorch, Rainer Böhme |
| HIVE: A Hardware-assisted Isolated Execution Environment for eBPF on AArch64 | USENIX Security '24 | Peihua Zhang, Chenggang Wu, Xiangyu Meng, Yinqian Zhang, Mingfan Peng, Shiyang Zhang, Bing Hu, Mengyao Xie, Yuanming Lai, Yan Kang, Zhe Wang |
| "What do you want from theory alone?" Experimenting with Tight Auditing of Differentially Private Synthetic Data Generation | USENIX Security '24 | Meenatchi Sundaram Muthu Selva Annamalai, Georgi Ganev, Emiliano De Cristofaro |
| On the Criticality of Integrity Protection in 5G Fronthaul Networks | USENIX Security '24 | Jiarong Xing, Sophia Yoo, Xenofon Foukas, Daehyeok Kim, Michael K. Reiter |
| Divide and Surrender: Exploiting Variable Division Instruction Timing in HQC Key Recovery Attacks | USENIX Security '24 | Robin Leander Schröder, Stefan Gast, Qian Guo |
| Xplain: Analyzing Invisible Correlations in Model Explanation | USENIX Security '24 | Kavita Kumari, Alessandro Pegoraro, Hossein Fereidooni, Ahmad-Reza Sadeghi |
| A First Physical-World Trajectory Prediction Attack via LiDAR-induced Deceptions in Autonomous Driving | USENIX Security '24 | Yang Lou, Yi Zhu, Qun Song, Rui Tan, Chunming Qiao, Wei-Bin Lee, Jianping Wang |
| OptFuzz: Optimization Path Guided Fuzzing for JavaScript JIT Compilers | USENIX Security '24 | Jiming Wang, Yan Kang, Chenggang Wu, Yuhao Hu, Yue Sun, Jikai Ren, Yuanming Lai, Mengyao Xie, Charles Zhang, Tao Li, Zhe Wang |