USENIX Security '24 | Defending Against Data Reconstruction Attacks in Federated Learning: An Information Theory Approach | Qi Tan, Qi Li, Yi Zhao, Zhuotao Liu, Xiaobing Guo, Ke Xu |
USENIX Security '24 | Eye of Sauron: Long-Range Hidden Spy Camera Detection and Positioning with Inbuilt Memory EM Radiation | Qibo Zhang, Daibo Liu, Xinyu Zhang, Zhichao Cao, Fanzi Zeng, Hongbo Jiang, Wenqiang Jin |
USENIX Security '24 | The Impact of Exposed Passwords on Honeyword Efficacy | Zonghao Huang, Lujo Bauer, Michael K. Reiter |
USENIX Security '24 | Yes, One-Bit-Flip Matters! Universal DNN Model Inference Depletion with Runtime Code Fault Injection | Shaofeng Li, Xinyu Wang, Minhui Xue, Haojin Zhu, Zhi Zhang, Yansong Gao, Wen Wu, Xuemin (Sherman) Shen |
USENIX Security '24 | Tossing in the Dark: Practical Bit-Flipping on Gray-box Deep Neural Networks for Runtime Trojan Injection | Zihao Wang, Di Tang, XiaoFeng Wang, Wei He, Zhaoyang Geng, Wenhao Wang |
USENIX Security '24 | Formalizing Soundness Proofs of Linear PCP SNARKs | Bolton Bailey, Andrew Miller |
USENIX Security '24 | DNN-GP: Diagnosing and Mitigating Model's Faults Using Latent Concepts | Shuo Wang, Hongsheng Hu, Jiamin Chang, Benjamin Zi Hao Zhao, Qi Alfred Chen, Minhui Xue |
USENIX Security '24 | HYPERPILL: Fuzzing for Hypervisor-bugs by Leveraging the Hardware Virtualization Interface | Alexander Bulekov, Qiang Liu, Manuel Egele, Mathias Payer |
USENIX Security '24 | DPAdapter: Improving Differentially Private Deep Learning through Noise Tolerance Pre-training | Zihao Wang, Rui Zhu, Dongruo Zhou, Zhikun Zhang, John Mitchell, Haixu Tang, XiaoFeng Wang |
USENIX Security '24 | DARKFLEECE: Probing the Dark Side of Android Subscription Apps | Chang Yue, Chen Zhong, Kai Chen, Zhiyu Zhang, Yeonjoon Lee |
USENIX Security '24 | Understanding How to Inform Blind and Low-Vision Users about Data Privacy through Privacy Question Answering Assistants | Yuanyuan Feng, Abhilasha Ravichander, Yaxing Yao, Shikun Zhang, Rex Chen |
USENIX Security '24 | FEASE: Fast and Expressive Asymmetric Searchable Encryption | Long Meng, Liqun Chen, Yangguang Tian, Mark Manulis, Suhui Liu |
USENIX Security '24 | A Linear Reconstruction Approach for Attribute Inference Attacks against Synthetic Data | Meenatchi Sundaram Muthu Selva Annamalai, Andrea Gadotti, Luc Rocher |
USENIX Security '24 | Fast and Private Inference of Deep Neural Networks by Co-designing Activation Functions | Abdulrahman Diaa, Lucas Fenaux, Thomas Humphries, Marian Dietz, Faezeh Ebrahimianghazani, Bailey Kacsmar, Xinda Li, Nils Lukas, Rasoul Akhavan Mahdavi, Simon Oya, Ehsan Amjadian, Florian Kerschbaum |
USENIX Security '24 | An Interview Study on Third-Party Cyber Threat Hunting Processes in the U.S. Department of Homeland Security | William P. Maxam III, James C. Davis |
USENIX Security '24 | Lightweight Authentication of Web Data via Garble-Then-Prove | |
USENIX Security '24 | Exploring digital security and privacy in relative poverty in Germany through qualitative interviews | Anastassija Kostan, Sara Olschar, Lucy Simko, Yasemin Acar |
USENIX Security '24 | Fingerprinting Obfuscated Proxy Traffic with Encapsulated TLS Handshakes | Diwen Xue, Michalis Kallitsis, Amir Houmansadr, Roya Ensafi |
USENIX Security '24 | Mudjacking: Patching Backdoor Vulnerabilities in Foundation Models | Hongbin Liu, Michael K. Reiter, Neil Zhenqiang Gong |
USENIX Security '24 | Pixel Thief: Exploiting SVG Filter Leakage in Firefox and Chrome | Sioli O'Connell, Lishay Aben Sour, Ron Magen, Daniel Genkin, Yossi Oren, Hovav Shacham, Yuval Yarom |
USENIX Security '24 | Unpacking Privacy Labels: A Measurement and Developer Perspective on Google's Data Safety Section | Rishabh Khandelwal, Asmit Nayak, Paul Chung, Kassem Fawaz |
USENIX Security '24 | On the Difficulty of Defending Contrastive Learning against Backdoor Attacks | Changjiang Li, Ren Pang, Bochuan Cao, Zhaohan Xi, Jinghui Chen, Shouling Ji, Ting Wang |
USENIX Security '24 | More Simplicity for Trainers, More Opportunity for Attackers: Black-Box Attacks on Speaker Recognition Systems by Inferring Feature Extractor | Yunjie Ge, Pinji Chen, Qian Wang, Lingchen Zhao, Ningping Mou, Peipei Jiang, Cong Wang, Qi Li, Chao Shen |
USENIX Security '24 | Transferability of White-box Perturbations: Query-Efficient Adversarial Attacks against Commercial DNN Services | Meng Shen, Changyue Li, Qi Li, Hao Lu, Liehuang Zhu, Ke Xu |
USENIX Security '24 | Penetration Vision through Virtual Reality Headsets: Identifying 360-degree Videos from Head Movements | Anh Nguyen, Xiaokuan Zhang, Zhisheng Yan |