| Bridging Barriers: A Survey of Challenges and Priorities in the Censorship Circumvention Landscape | USENIX Security '24 | Diwen Xue, Anna Ablove, Reethika Ramesh, Grace Kwak Danciu, Roya Ensafi |
| Length Leakage in Oblivious Data Access Mechanisms | USENIX Security '24 | Grace Jia, Rachit Agarwal, Anurag Khandelwal |
| Stateful Least Privilege Authorization for the Cloud | USENIX Security '24 | Leo Cao, Luoxi Meng, Deian Stefan, Earlence Fernandes |
| Formal Security Analysis of Widevine through the W3C EME Standard | USENIX Security '24 | Stéphanie Delaune, Joseph Lallemand, Gwendal Patat, Florian Roudot, Mohamed Sabt |
| FIRE: Combining Multi-Stage Filtering with Taint Analysis for Scalable Recurring Vulnerability Detection | USENIX Security '24 | Siyue Feng, Yueming Wu, Wenjie Xue, Sikui Pan, Deqing Zou, Yang Liu, Hai Jin |
| BackdoorIndicator: Leveraging OOD Data for Proactive Backdoor Detection in Federated Learning | USENIX Security '24 | Songze Li, Yanbo Dai |
| GlobalConfusion: TrustZone Trusted Application 0-Days by Design | USENIX Security '24 | Marcel Busch, Philipp Mao, Mathias Payer |
| YPIR: High-Throughput Single-Server PIR with Silent Preprocessing | USENIX Security '24 | Samir Jordan Menon, David J. Wu |
| Abuse-Resistant Location Tracking: Balancing Privacy and Safety in the Offline Finding Ecosystem | USENIX Security '24 | Harry Eldridge, Gabrielle Beck, Matthew Green, Nadia Heninger, Abhishek Jain |
| I Experienced More than 10 DeFi Scams: On DeFi Users' Perception of Security Breaches and Countermeasures | USENIX Security '24 | Mingyi Liu, Jun Ho Huh, HyungSeok Han, Jaehyuk Lee, Jihae Ahn, Frank Li, Hyoungshick Kim, Taesoo Kim |
| POPSTAR: Lightweight Threshold Reporting with Reduced Leakage | USENIX Security '24 | Hanjun Li, Sela Navot, Stefano Tessaro |
| CARDSHARK: Understanding and Stablizing Linux Kernel Concurrency Bugs Against the Odds | USENIX Security '24 | Tianshuo Han, Xiaorui Gong, Jian Liu |
| Less Defined Knowledge and More True Alarms: Reference-based Phishing Detection without a Pre-defined Reference List | USENIX Security '24 | Ruofan Liu, Yun Lin, Xiwen Teoh, Gongshen Liu, Zhiyong Huang, Jin Song Dong |
| RADIUS/UDP Considered Harmful | USENIX Security '24 | Sharon Goldberg, Miro Haller, Nadia Heninger, Mike Milano, Dan Shumow, Marc Stevens, Adam Suhl |
| Cryptographic Analysis of Delta Chat | USENIX Security '24 | Yuanming Song, Lenka Mareková, Kenneth G. Paterson |
| Instruction Backdoor Attacks Against Customized LLMs | USENIX Security '24 | Rui Zhang, Hongwei Li, Rui Wen, Wenbo Jiang, Yuan Zhang, Michael Backes, Yun Shen, Yang Zhang |
| "You have to read 50 different RFCs that contradict each other": An Interview Study on the Experiences of Implementing Cryptographic Standards | USENIX Security '24 | Nicolas Huaman, Jacques Suray, Jan H. Klemmer, Marcel Fourné, Sabrina Klivan, Ivana Trummová, Yasemin Acar, Sascha Fahl |
| SoK: What Don't We Know? Understanding Security Vulnerabilities in SNARKs | USENIX Security '24 | Stefanos Chaliasos, Jens Ernstberger, David Theodore, David Wong, Mohammad Jahanara, Benjamin Livshits |
| On Bridging the Gap between Control Flow Integrity and Attestation Schemes | USENIX Security '24 | Mahmoud Ammar, Ahmed Abdelraoof, Silviu Vlasceanu |
| How does Endpoint Detection use the MITRE ATT&CK Framework? | USENIX Security '24 | Apurva Virkud, Muhammad Adil Inam, Andy Riddle, Jason Liu, Gang Wang, Adam Bates |
| FakeBehalf: Imperceptible Email Spoofing Attacks against the Delegation Mechanism in Email Systems | USENIX Security '24 | Jinrui Ma, Lutong Chen, Kaiping Xue, Bo Luo, Xuanbo Huang, Mingrui Ai, Huanjie Zhang, David S.L. Wei, Yan Zhuang |
| Windows into the Past: Exploiting Legacy Crypto in Modern OS's Kerberos Implementation | USENIX Security '24 | Michal Shagam, Eyal Ronen |
| MFKDF: Multiple Factors Knocked Down Flat | USENIX Security '24 | Matteo Scarlata, Matilda Backendal, Miro Haller |
| Election Eligibility with OpenID: Turning Authentication into Transferable Proof of Eligibility | USENIX Security '24 | Véronique Cortier, Alexandre Debant, Anselme Goetschmann, Lucca Hirschi |
| Forget and Rewire: Enhancing the Resilience of Transformer-based Models against Bit-Flip Attacks | USENIX Security '24 | Najmeh Nazari, Hosein Mohammadi Makrani, Chongzhou Fang, Hossein Sayadi, Setareh Rafatirad, Khaled N. Khasawneh, Houman Homayoun |