USENIX Security '24 | A Taxonomy of C Decompiler Fidelity Issues | Luke Dramko, Jeremy Lacomis, Edward J. Schwartz, Bogdan Vasilescu, Claire Le Goues |
USENIX Security '24 | SmartCookie: Blocking Large-Scale SYN Floods with a Split-Proxy Defense on Programmable Data Planes | Sophia Yoo, Xiaoqi Chen, Jennifer Rexford |
USENIX Security '24 | SWOOSH: Efficient Lattice-Based Non-Interactive Key Exchange | Phillip Gajland, Bor de Kock, Miguel Quaresma, Giulio Malavolta, Peter Schwabe |
USENIX Security '24 | "I feel physically safe but not politically safe": Understanding the Digital Threats and Safety Practices of OnlyFans Creators | Ananta Soneji, Vaughn Hamilton, Adam Doupé, Allison McDonald, Elissa M. Redmiles |
USENIX Security '24 | DVa: Extracting Victims and Abuse Vectors from Android Accessibility Malware | Haichuan Xu, Mingxuan Yao, Runze Zhang, Mohamed Moustafa Dawoud, Jeman Park, Brendan Saltaformaggio |
USENIX Security '24 | SoK: State of the Krawlers – Evaluating the Effectiveness of Crawling Algorithms for Web Security Measurements | Aleksei Stafeev, Giancarlo Pellegrino |
USENIX Security '24 | "I chose to fight, be brave, and to deal with it": Threat Experiences and Security Practices of Pakistani Content Creators | Lea Gröber, Waleed Arshad, Angelica Goetzen, Elissa M. Redmiles, Maryam Mustafa, Katharina Krombholz |
USENIX Security '24 | Towards Privacy-Preserving Social-Media SDKs on Android | Haoran Lu, Yichen Liu, Xiaojing Liao, Luyi Xing |
USENIX Security '24 | UIHash: Detecting Similar Android UIs through Grid-Based Visual Appearance Representation | Jiawei Li, Jian Mao, Jun Zeng, Qixiao Lin, Shaowen Feng, Zhenkai Liang |
USENIX Security '24 | Defending Against Data Reconstruction Attacks in Federated Learning: An Information Theory Approach | Qi Tan, Qi Li, Yi Zhao, Zhuotao Liu, Xiaobing Guo, Ke Xu |
USENIX Security '24 | Loopy Hell(ow): Infinite Traffic Loops at the Application Layer | Yepeng Pan, Anna Ascheman, Christian Rossow |
USENIX Security '24 | Eye of Sauron: Long-Range Hidden Spy Camera Detection and Positioning with Inbuilt Memory EM Radiation | Qibo Zhang, Daibo Liu, Xinyu Zhang, Zhichao Cao, Fanzi Zeng, Hongbo Jiang, Wenqiang Jin |
USENIX Security '24 | Racing for TLS Certificate Validation: A Hijacker's Guide to the Android TLS Galaxy | Sajjad Pourali, Xiufen Yu, Lianying Zhao, Mohammad Mannan, Amr Youssef |
USENIX Security '24 | D-Helix: A Generic Decompiler Testing Framework Using Symbolic Differentiation | Muqi Zou, Arslan Khan, Ruoyu Wu, Han Gao, Antonio Bianchi, Dave (Jing) Tian |
USENIX Security '24 | The Impact of Exposed Passwords on Honeyword Efficacy | Zonghao Huang, Lujo Bauer, Michael K. Reiter |
USENIX Security '24 | ABACuS: All-Bank Activation Counters for Scalable and Low Overhead RowHammer Mitigation | Ataberk Olgun, Yahya Can Tugrul, Nisa Bostanci, Ismail Emir Yuksel, Haocong Luo, Steve Rhyner, Abdullah Giray Yaglikci, Geraldo F. Oliveira, Onur Mutlu |
USENIX Security '24 | Unleashing the Power of Type-Based Call Graph Construction by Using Regional Pointer Information | Yuandao Cai, Yibo Jin, Charles Zhang |
USENIX Security '24 | Go Go Gadget Hammer: Flipping Nested Pointers for Arbitrary Data Leakage | Youssef Tobah, Andrew Kwong, Ingab Kang, Daniel Genkin, Kang G. Shin |
USENIX Security '24 | Two Shuffles Make a RAM: Improved Constant Overhead Zero Knowledge RAM | Yibin Yang, David Heath |
USENIX Security '24 | Code is not Natural Language: Unlock the Power of Semantics-Oriented Graph Representation for Binary Code Similarity Detection | Haojie He, Xingwei Lin, Ziang Weng, Ruijie Zhao, Shuitao Gan, Libo Chen, Yuede Ji, Jiashui Wang, Zhi Xue |
USENIX Security '24 | Practical Security Analysis of Zero-Knowledge Proof Circuits | Hongbo Wen, Jon Stephens, Yanju Chen, Kostas Ferles, Shankara Pailoor, Kyle Charbonnet, Isil Dillig, Yu Feng |
USENIX Security '24 | What IF Is Not Enough? Fixing Null Pointer Dereference With Contextual Check | Yunlong Xing, Shu Wang, Shiyu Sun, Xu He, Kun Sun, Qi Li |
USENIX Security '24 | CacheWarp: Software-based Fault Injection using Selective State Reset | Ruiyi Zhang, Lukas Gerlach, Daniel Weber, Lorenz Hetterich, Youheng Lü, Andreas Kogler, Michael Schwarz |
USENIX Security '24 | Yes, One-Bit-Flip Matters! Universal DNN Model Inference Depletion with Runtime Code Fault Injection | Shaofeng Li, Xinyu Wang, Minhui Xue, Haojin Zhu, Zhi Zhang, Yansong Gao, Wen Wu, Xuemin (Sherman) Shen |
USENIX Security '24 | Tossing in the Dark: Practical Bit-Flipping on Gray-box Deep Neural Networks for Runtime Trojan Injection | Zihao Wang, Di Tang, XiaoFeng Wang, Wei He, Zhaoyang Geng, Wenhao Wang |