| A Taxonomy of C Decompiler Fidelity Issues | USENIX Security '24 | Luke Dramko, Jeremy Lacomis, Edward J. Schwartz, Bogdan Vasilescu, Claire Le Goues |
| SmartCookie: Blocking Large-Scale SYN Floods with a Split-Proxy Defense on Programmable Data Planes | USENIX Security '24 | Sophia Yoo, Xiaoqi Chen, Jennifer Rexford |
| SpecLFB: Eliminating Cache Side Channels in Speculative Executions | USENIX Security '24 | Xiaoyu Cheng, Fei Tong, Hongyu Wang, Zhe Zhou, Fang Jiang, Yuxing Mao |
| Vulnerability-oriented Testing for RESTful APIs | USENIX Security '24 | Wenlong Du, Jian Li, Yanhao Wang, Libo Chen, Ruijie Zhao, Junmin Zhu, Zhengguang Han, Yijun Wang, Zhi Xue |
| K-Waay: Fast and Deniable Post-Quantum X3DH without Ring Signatures | USENIX Security '24 | Daniel Collins, Loïs Huguenin-Dumittan, Ngoc Khanh Nguyen, Nicolas Rolin, Serge Vaudenay |
| SWOOSH: Efficient Lattice-Based Non-Interactive Key Exchange | USENIX Security '24 | Phillip Gajland, Bor de Kock, Miguel Quaresma, Giulio Malavolta, Peter Schwabe |
| "I feel physically safe but not politically safe": Understanding the Digital Threats and Safety Practices of OnlyFans Creators | USENIX Security '24 | Ananta Soneji, Vaughn Hamilton, Adam Doupé, Allison McDonald, Elissa M. Redmiles |
| Rise of Inspectron: Automated Black-box Auditing of Cross-platform Electron Apps | USENIX Security '24 | Mir Masood Ali, Mohammad Ghasemisharif, Chris Kanich, Jason Polakis |
| DVa: Extracting Victims and Abuse Vectors from Android Accessibility Malware | USENIX Security '24 | Haichuan Xu, Mingxuan Yao, Runze Zhang, Mohamed Moustafa Dawoud, Jeman Park, Brendan Saltaformaggio |
| SoK: State of the Krawlers – Evaluating the Effectiveness of Crawling Algorithms for Web Security Measurements | USENIX Security '24 | Aleksei Stafeev, Giancarlo Pellegrino |
| Page-Oriented Programming: Subverting Control-Flow Integrity of Commodity Operating System Kernels with Non-Writable Code Pages | USENIX Security '24 | Seunghun Han, Seong-Joong Kim, Wook Shin, Byung Joon Kim, Jae-Cheol Ryou |
| "I chose to fight, be brave, and to deal with it": Threat Experiences and Security Practices of Pakistani Content Creators | USENIX Security '24 | Lea Gröber, Waleed Arshad, Shanza, Angelica Goetzen, Elissa M. Redmiles, Maryam Mustafa, Katharina Krombholz |
| Towards Privacy-Preserving Social-Media SDKs on Android | USENIX Security '24 | Haoran Lu, Yichen Liu, Xiaojing Liao, Luyi Xing |
| UIHash: Detecting Similar Android UIs through Grid-Based Visual Appearance Representation | USENIX Security '24 | Jiawei Li, Jian Mao, Jun Zeng, Qixiao Lin, Shaowen Feng, Zhenkai Liang |
| Defending Against Data Reconstruction Attacks in Federated Learning: An Information Theory Approach | USENIX Security '24 | Qi Tan, Qi Li, Yi Zhao, Zhuotao Liu, Xiaobing Guo, Ke Xu |
| Lotto: Secure Participant Selection against Adversarial Servers in Federated Learning | USENIX Security '24 | Zhifeng Jiang, Peng Ye, Shiqi He, Wei Wang, Ruichuan Chen, Bo Li |
| Loopy Hell(ow): Infinite Traffic Loops at the Application Layer | USENIX Security '24 | Yepeng Pan, Anna Ascheman, Christian Rossow |
| Eye of Sauron: Long-Range Hidden Spy Camera Detection and Positioning with Inbuilt Memory EM Radiation | USENIX Security '24 | Qibo Zhang, Daibo Liu, Xinyu Zhang, Zhichao Cao, Fanzi Zeng, Hongbo Jiang, Wenqiang Jin |
| In Wallet We Trust: Bypassing the Digital Wallets Payment Security for Free Shopping | USENIX Security '24 | Raja Hasnain Anwar, Syed Rafiul Hussain, Muhammad Taqi Raza |
| Racing for TLS Certificate Validation: A Hijacker's Guide to the Android TLS Galaxy | USENIX Security '24 | Sajjad Pourali, Xiufen Yu, Lianying Zhao, Mohammad Mannan, Amr Youssef |
| D-Helix: A Generic Decompiler Testing Framework Using Symbolic Differentiation | USENIX Security '24 | Muqi Zou, Arslan Khan, Ruoyu Wu, Han Gao, Antonio Bianchi, Dave (Jing) Tian |
| Web Platform Threats: Automated Detection of Web Security Issues With WPT | USENIX Security '24 | Pedro Bernardo, Lorenzo Veronese, Valentino Dalla Valle, Stefano Calzavara, Marco Squarcina, Pedro Adão, Matteo Maffei |
| The Impact of Exposed Passwords on Honeyword Efficacy | USENIX Security '24 | Zonghao Huang, Lujo Bauer, Michael K. Reiter |
| AttackGNN: Red-Teaming GNNs in Hardware Security Using Reinforcement Learning | USENIX Security '24 | Vasudev Gohil, Satwik Patnaik, Dileep Kalathil, Jeyavijayan Rajendran |
| PhishDecloaker: Detecting CAPTCHA-cloaked Phishing Websites via Hybrid Vision-based Interactive Models | USENIX Security '24 | Xiwen Teoh, Yun Lin, Ruofan Liu, Zhiyong Huang, Jin Song Dong |