USENIX Security '24 | SoK: The Good, The Bad, and The Unbalanced: Measuring Structural Limitations of Deepfake Media Datasets | Seth Layton, Tyler Tucker, Daniel Olszewski, Kevin Warren, Kevin Butler, Patrick Traynor |
USENIX Security '24 | SeaK: Rethinking the Design of a Secure Allocator for OS Kernel | Zicheng Wang, Yicheng Guang, Yueqi Chen, Zhenpeng Lin, Michael Le, Dang K Le, Dan Williams, Xinyu Xing, Zhongshu Gu, Hani Jamjoom |
USENIX Security '24 | ABACuS: All-Bank Activation Counters for Scalable and Low Overhead RowHammer Mitigation | Ataberk Olgun, Yahya Can Tugrul, Nisa Bostanci, Ismail Emir Yuksel, Haocong Luo, Steve Rhyner, Abdullah Giray Yaglikci, Geraldo F. Oliveira, Onur Mutlu |
USENIX Security '24 | Automated Large-Scale Analysis of Cookie Notice Compliance | Ahmed Bouhoula, Karel Kubicek, Amit Zac, Carlos Cotrini, David Basin |
USENIX Security '24 | WEBRR: A Forensic System for Replaying and Investigating Web-Based Attacks in The Modern Web | Joey Allen, Zheng Yang, Feng Xiao, Matthew Landen, Roberto Perdisci, Wenke Lee |
USENIX Security '24 | Go Go Gadget Hammer: Flipping Nested Pointers for Arbitrary Data Leakage | Youssef Tobah, Andrew Kwong, Ingab Kang, Daniel Genkin, Kang G. Shin |
USENIX Security '24 | Two Shuffles Make a RAM: Improved Constant Overhead Zero Knowledge RAM | Yibin Yang, David Heath |
USENIX Security '24 | Scalable Multi-Party Computation Protocols for Machine Learning in the Honest-Majority Setting | |
USENIX Security '24 | Code is not Natural Language: Unlock the Power of Semantics-Oriented Graph Representation for Binary Code Similarity Detection | Haojie He, Xingwei Lin, Ziang Weng, Ruijie Zhao, Shuitao Gan, Libo Chen, Yuede Ji, Jiashui Wang, Zhi Xue |
USENIX Security '24 | SledgeHammer: Amplifying Rowhammer via Bank-level Parallelism | Ingab Kang, Walter Wang, Jason Kim, Stephan van Schaik, Youssef Tobah, Daniel Genkin, Andrew Kwong, Yuval Yarom |
USENIX Security '24 | Practical Security Analysis of Zero-Knowledge Proof Circuits | Hongbo Wen, Jon Stephens, Yanju Chen, Kostas Ferles, Shankara Pailoor, Kyle Charbonnet, Isil Dillig, Yu Feng |
USENIX Security '24 | AI Psychiatry: Forensic Investigation of Deep Learning Networks in Memory Images | David Oygenblik, Carter Yagemann, Joseph Zhang, Arianna Mastali, Jeman Park, Brendan Saltaformaggio |
USENIX Security '24 | Don't Waste My Efforts: Pruning Redundant Sanitizer Checks by Developer-Implemented Type Checks | Yizhuo Zhai, Zhiyun Qian, Chengyu Song, Manu Sridharan, Trent Jaeger, Paul Yu, Srikanth V. Krishnamurthy |
USENIX Security '24 | Formalizing Soundness Proofs of Linear PCP SNARKs | Bolton Bailey, Andrew Miller |
USENIX Security '24 | Inference of Error Specifications and Bug Detection Using Structural Similarities | Niels Dossche, Bart Coppens |
USENIX Security '24 | Notus: Dynamic Proofs of Liabilities from Zero-knowledge RSA Accumulators | Jiajun Xin, Arman Haghighi, Xiangan Tian, Dimitrios Papadopoulos |
USENIX Security '24 | A Binary-level Thread Sanitizer or Why Sanitizing on the Binary Level is Hard | Joschua Schilling, Andreas Wendler, Philipp Görz, Nils Bars, Moritz Schloegel, Thorsten Holz |
USENIX Security '24 | ZenHammer: Rowhammer Attacks on AMD Zen-based Platforms | Patrick Jattke, Max Wipfli, Flavien Solt, Michele Marazzi, Matej Bölcskei, Kaveh Razavi |
USENIX Security '24 | DARKFLEECE: Probing the Dark Side of Android Subscription Apps | Chang Yue, Chen Zhong, Kai Chen, Zhiyu Zhang, Yeonjoon Lee |
USENIX Security '24 | Accelerating Secure Collaborative Machine Learning with Protocol-Aware RDMA | Zhenghang Ren, Mingxuan Fan, Zilong Wang, Junxue Zhang, Chaoliang Zeng, Zhicong Huang, Cheng Hong, Kai Chen |
USENIX Security '24 | When the User Is Inside the User Interface: An Empirical Study of UI Security Properties in Augmented Reality | Kaiming Cheng, Arkaprabha Bhattacharya, Michelle Lin, Jaewook Lee, Aroosh Kumar, Jeffery F. Tian, Tadayoshi Kohno, Franziska Roesner |
USENIX Security '24 | Understanding How to Inform Blind and Low-Vision Users about Data Privacy through Privacy Question Answering Assistants | Yuanyuan Feng, Abhilasha Ravichander, Yaxing Yao, Shikun Zhang, Rex Chen |
USENIX Security '24 | Fingerprinting Obfuscated Proxy Traffic with Encapsulated TLS Handshakes | Diwen Xue, Michalis Kallitsis, Amir Houmansadr, Roya Ensafi |
USENIX Security '24 | AutoFHE: Automated Adaption of CNNs for Efficient Evaluation over FHE | Wei Ao, Vishnu Naresh Boddeti |
USENIX Security '24 | SDFuzz: Target States Driven Directed Fuzzing | Penghui Li, Wei Meng, Chao Zhang |