| PURL: Safe and Effective Sanitization of Link Decoration | USENIX Security '24 | Shaoor Munir, Patrick Lee, Umar Iqbal, Zubair Shafiq, Sandra Siby |
| Understanding Help-Seeking and Help-Giving on Social Media for Image-Based Sexual Abuse | USENIX Security '24 | Miranda Wei, Sunny Consolvo, Patrick Gage Kelley, Tadayoshi Kohno, Tara Matthews, Sarah Meiklejohn, Franziska Roesner, Renee Shelby, Kurt Thomas, Rebecca Umbach |
| Holding Secrets Accountable: Auditing Privacy-Preserving Machine Learning | USENIX Security '24 | |
| "I really just leaned on my community for support": Barriers, Challenges, and Coping Mechanisms Used by Survivors of Technology-Facilitated Abuse to Seek Social Support | USENIX Security '24 | Naman Gupta, Kate Walsh, Sanchari Das, Rahul Chatterjee |
| Information Flow Control in Machine Learning through Modular Model Architecture | USENIX Security '24 | Trishita Tiwari, Suchin Gururangan, Chuan Guo, Weizhe Hua, Sanjay Kariyappa, Udit Gupta, Wenjie Xiong, Kiwan Maeng, Hsien-Hsin S. Lee, G. Edward Suh |
| SpotProxy: Rediscovering the Cloud for Censorship Circumvention | USENIX Security '24 | Patrick Tser Jern Kon, Sina Kamali, Jinyu Pei, Diogo Barradas, Ang Chen, Micah Sherr, Moti Yung |
| LanDscAPe: Exploring LDAP Weaknesses and Data Leaks at Internet Scale | USENIX Security '24 | Jonas Kaspereit, Gurur Öndarö, Gustavo Luvizotto Cesar, Simon Ebbers, Fabian Ising, Christoph Saatjohann, Mattijs Jonker, Ralph Holz, Sebastian Schinzel |
| UBA-Inf: Unlearning Activated Backdoor Attack with Influence-Driven Camouflage | USENIX Security '24 | Zirui Huang, Yunlong Mao, Sheng Zhong |
| SIMurai: Slicing Through the Complexity of SIM Card Security Research | USENIX Security '24 | Tomasz Piotr Lisowski, Merlin Chlosta, Jinjin Wang, Marius Muench |
| SoK: Neural Network Extraction Through Physical Side Channels | USENIX Security '24 | |
| Zero-setup Intermediate-rate Communication Guarantees in a Global Internet | USENIX Security '24 | Marc Wyss, Adrian Perrig |
| Making Them Ask and Answer: Jailbreaking Large Language Models in Few Queries via Disguise and Reconstruction | USENIX Security '24 | Tong Liu, Yingjie Zhang, Zhe Zhao, Yinpeng Dong, Guozhu Meng, Kai Chen |
| Bending microarchitectural weird machines towards practicality | USENIX Security '24 | Ping-Lun Wang, Riccardo Paccagnella, Riad S. Wahby, Fraser Brown |
| Diffie-Hellman Picture Show: Key Exchange Stories from Commercial VoWiFi Deployments | USENIX Security '24 | Gabriel K. Gegenhuber, Florian Holzbauer, Philipp É. Frenzel, Edgar Weippl, Adrian Dabrowski |
| Data Coverage for Guided Fuzzing | USENIX Security '24 | Mingzhe Wang, Jie Liang, Chijin Zhou, Zhiyong Wu, Jingzhou Fu, Zhuo Su, Qing Liao, Bin Gu, Bodong Wu, Yu Jiang |
| Unveiling the Hunter-Gatherers: Exploring Threat Hunting Practices and Challenges in Cyber Defense | USENIX Security '24 | Priyanka Badva, Kopo M. Ramokapane, Eleonora Pantano, Awais Rashid |
| The Decisive Power of Indecision: Low-Variance Risk-Limiting Audits and Election Contestation via Marginal Mark Recording | USENIX Security '24 | Benjamin Fuller, Rashmi Pai, Alexander Russell |
| Navigating Traumatic Stress Reactions During Computer Security Interventions | USENIX Security '24 | Lana Ramjit, Natalie Dolci, Francesca Rossi, Ryan Garcia, Thomas Ristenpart, Dana Cuomo |
| Formal verification of the PQXDH Post-Quantum key agreement protocol for end-to-end secure messaging | USENIX Security '24 | Karthikeyan Bhargavan, Charlie Jacomme, Franziskus Kiefer, Rolfe Schmidt |
| SnailLoad: Exploiting Remote Network Latency Measurements without JavaScript | USENIX Security '24 | Stefan Gast, Roland Czerny, Jonas Juffinger, Fabian Rauscher, Simone Franza, Daniel Gruss |
| ORANalyst: Systematic Testing Framework for Open RAN Implementations | USENIX Security '24 | Tianchang Yang, Syed Md Mukit Rashid, Ali Ranjbar, Gang Tan, Syed Rafiul Hussain |
| FVD-DPM: Fine-grained Vulnerability Detection via Conditional Diffusion Probabilistic Models | USENIX Security '24 | Miaomiao Shao, Yuxin Ding |
| Shaken, not Stirred - Automated Discovery of Subtle Attacks on Protocols using Mix-Nets | USENIX Security '24 | Jannik Dreier, Pascal Lafourcade, Dhekra Mahmoud |
| Digital Discrimination of Users in Sanctioned States: The Case of the Cuba Embargo | USENIX Security '24 | Anna Ablove, Shreyas Chandrashekaran, Hieu Le, Ram Sundara Raman, Reethika Ramesh, Harry Oppenheimer, Roya Ensafi |
| The Imitation Game: Exploring Brand Impersonation Attacks on Social Media Platforms | USENIX Security '24 | Bhupendra Acharya, Dario Lazzaro, Efrén López-Morales, Adam Oest, Muhammad Saad, Antonio Emanuele Cinà, Lea Schönherr, Thorsten Holz |