| Privacy Side Channels in Machine Learning Systems | USENIX Security '24 | Edoardo Debenedetti, Giorgio Severi, Nicholas Carlini, Christopher A. Choquette-Choo, Matthew Jagielski, Milad Nasr, Eric Wallace, Florian Tramèr |
| Adversarial Illusions in Multi-Modal Embeddings | USENIX Security '24 | Eugene Bagdasaryan, Rishi Jha, Vitaly Shmatikov, Tingwei Zhang |
| IoT Market Dynamics: An Analysis of Device Sales, Security and Privacy Signals, and their Interactions | USENIX Security '24 | Swaathi Vetrivel, Brennen Bouwmeester, Michel van Eeten, Carlos H. Gañán |
| Towards Privacy and Security in Private Clouds: A Representative Survey on the Prevalence of Private Hosting and Administrator Characteristics | USENIX Security '24 | Lea Gröber, Simon Lenau, Rebecca Weil, Elena Groben, Michael Schilling, Katharina Krombholz |
| ElectionGuard: a Cryptographic Toolkit to Enable Verifiable Elections | USENIX Security '24 | Josh Benaloh, Michael Naehrig, Olivier Pereira, Dan S. Wallach |
| Unveiling IoT Security in Reality: A Firmware-Centric Journey | USENIX Security '24 | Nicolas Nino, Ruibo Lu, Wei Zhou, Kyu Hyung Lee, Ziming Zhao, Le Guan |
| Exploiting Leakage in Password Managers via Injection Attacks | USENIX Security '24 | Andrés Fábrega, Armin Namavari, Rachit Agarwal, Ben Nassi, Thomas Ristenpart |
| Rethinking the Invisible Protection against Unauthorized Image Usage in Stable Diffusion | USENIX Security '24 | Shengwei An, Lu Yan, Siyuan Cheng, Guangyu Shen, Kaiyuan Zhang, Qiuling Xu, Guanhong Tao, Xiangyu Zhang |
| A Flushing Attack on the DNS Cache | USENIX Security '24 | Yehuda Afek, Anat Bremler-Barr, Shoham Danino, Yuval Shavitt |
| Scalable Private Set Union, with Stronger Security | USENIX Security '24 | Yanxue Jia, Shi-Feng Sun, Hong-Sheng Zhou, Dawu Gu |
| Verify your Labels! Trustworthy Predictions and Datasets via Confidence Scores | USENIX Security '24 | Torsten Krauß, Jasper Stang, Alexandra Dmitrienko |
| Orbital Trust and Privacy: SoK on PKI and Location Privacy Challenges in Space Networks | USENIX Security '24 | David Koisser, Richard Mitev, Nikita Yadav, Franziska Vollmer, Ahmad-Reza Sadeghi |
| What Was Your Prompt? A Remote Keylogging Attack on AI Assistants | USENIX Security '24 | Roy Weiss, Daniel Ayzenshteyn, Yisroel Mirsky |
| Detecting Kernel Memory Bugs through Inconsistent Memory Management Intention Inferences | USENIX Security '24 | Dinghao Liu, Zhipeng Lu, Shouling Ji, Kangjie Lu, Jianhai Chen, Zhenguang Liu, Dexin Liu, Renyi Cai, Qinming He |
| DVSorder: Ballot Randomization Flaws Threaten Voter Privacy | USENIX Security '24 | Braden L. Crimmins, Dhanya Y. Narayanan, Drew Springall, J. Alex Halderman |
| Invisibility Cloak: Proactive Defense Against Visual Game Cheating | USENIX Security '24 | Chenxin Sun, Kai Ye, Liangcai Su, Jiayi Zhang, Chenxiong Qian |
| From One Thousand Pages of Specification to Unveiling Hidden Bugs: Large Language Model Assisted Fuzzing of Matter IoT Devices | USENIX Security '24 | Xiaoyue Ma, Lannan Luo, Qiang Zeng |
| Navigating the Privacy Compliance Maze: Understanding Risks with Privacy-Configurable Mobile SDKs | USENIX Security '24 | Yifan Zhang, Zhaojie Hu, Xueqiang Wang, Yuhui Hong, Yuhong Nan, XiaoFeng Wang, Jiatao Cheng, Luyi Xing |
| Endokernel: A Thread Safe Monitor for Lightweight Subprocess Isolation | USENIX Security '24 | Fangfei Yang, Bumjin Im, Weijie Huang, Kelly Kaoudis, Anjo Vahldiek-Oberwagner, Chia-Che Tsai, Nathan Dautenhahn |
| INSIGHT: Attacking Industry-Adopted Learning Resilient Logic Locking Techniques Using Explainable Graph Neural Network | USENIX Security '24 | Lakshmi Likhitha Mankali, Ozgur Sinanoglu, Satwik Patnaik |
| Cross the Zone: Toward a Covert Domain Hijacking via Shared DNS Infrastructure | USENIX Security '24 | Yunyi Zhang, Mingming Zhang, Baojun Liu, Zhan Liu, Jia Zhang, Haixin Duan, Min Zhang, Fan Shi, Chengxi Xu |
| Enhancing Network Attack Detection with Distributed and In-Network Data Collection System | USENIX Security '24 | Seyed Mohammad Mehdi Mirnajafizadeh, Ashwin Raam Sethuram, David Mohaisen, DaeHun Nyang, Rhongho Jang |
| An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities against Strong Detection | USENIX Security '24 | Shenao Yan, Shen Wang, Yue Duan, Hanbin Hong, Kiho Lee, Doowon Kim, Yuan Hong |
| A World Where We Trust Hard-Won Lessons in Security Research, Technology, and People | USENIX Security '24 | David Brumley |
| Evolving Landscape of Disinformation - Lessons Learned So Far! | SOUPS 2024 | |