USENIX Security 2024
USENIX Security '24 will announce the accepted papers from the summer, fall, and winter submission deadlines separately. Pre-publication versions with Georgia Tech authors or co-authors will become available below as they are announced.
Winter Accepted Papers
The 33rd USENIX Security Symposium accepted numerous research papers during their final call for papers, with Georgia Tech authors appearing on three of the works. Below are the pre-print versions that will be presented in Philadelphia this August. Note: not all pre-print versions have been made available.
-
Digital Discrimination of Users in Sanctioned States: The Case of the Cuba Embargo
Authors: Anna Ablove, Shreyas Chandrashekaran, Hieu Le, Ram Sundara Raman, and Reethika Ramesh, University of Michigan; Harry Oppenheimer, Georgia Institute of Technology; Roya Ensafi, University of Michigan -
Information Flow Control in Machine Learning through Modular Model Architecture
Authors: Trishita Tiwari, Cornell University; Suchin Gururangan, University of Washington; Chuan Guo, FAIR at Meta; Weizhe Hua, Google DeepMind; Sanjay Kariyappa, Georgia Institute of Technology; Udit Gupta, Cornell University; Wenjie Xiong, Virginia Tech; Kiwan Maeng, Pennsylvania State University; Hsien-Hsin S. Lee, Intel; G. Edward Suh, NVIDIA/Cornell University -
I Experienced More than 10 DeFi Scams: On DeFi Users' Perception of Security Breaches and Countermeasures
Authors: Mingyi Liu, Georgia Institute of Technology; Jun Ho Huh, Samsung Research; HyungSeok Han, Jaehyuk Lee, Jihae Ahn, and Frank Li, Georgia Institute of Technology; Hyoungshick Kim, Sungkyunkwan University; Taesoo Kim, Georgia Institute of Technology
Fall Accepted Papers
The 33rd USENIX Security Symposium accepted 145 research papers during their second call for papers, with Georgia Tech authors appearing on six of the works. Below are the pre-print versions that will be presented in Philadelphia this August.
- Towards Generic Database Management System Fuzzing
Authors: Yupeng Yang and Yongheng Chen, Georgia Institute of Technology; Rui Zhong, Palo Alto Networks; Jizhou Chen and Wenke Lee, Georgia Institute of Technology
-
DVa: Extracting Victims and Abuse Vectors from Android Accessibility Malware
Authors: Haichuan Xu, Mingxuan Yao, and Runze Zhang, Georgia Institute of Technology; Mohamed Moustafa Dawoud, German International University; Jeman Park, Kyung Hee University; Brendan Saltaformaggio, Georgia Institute of Technology -
AI Psychiatry: Forensic Investigation of Deep Learning Networks in Memory Images
Authors: David Oygenblik, Georgia Institute of Technology; Carter Yagemann, Ohio State University; Joseph Zhang, University of Pennsylvania; Arianna Mastali, Georgia Institute of Technology; Jeman Park, Kyung Hee University; Brendan Saltaformaggio, Georgia Institute of Technology -
6Sense: Internet-Wide IPv6 Scanning and its Security Applications
Authors: Grant Williams, Mert Erdemir, Amanda Hsu, Shraddha Bhat, Abhishek Bhaskar, Frank Li, and Paul Pearce, Georgia Institute of Technology -
Arcanum: Detecting and Evaluating the Privacy Risks of Browser Extensions on Web Pages and Web Content
Authors: Qinge Xie, Manoj Vignesh Kasi Murali, Paul Pearce, and Frank Li, Georgia Institute of Technology -
GoFetch: Breaking Constant-Time Cryptographic Implementations Using Data Memory-Dependent Prefetchers
Authors: Boru Chen, University of Illinois Urbana-Champaign; Yingchen Wang, University of Texas at Austin; Pradyumna Shome, Georgia Institute of Technology; Christopher Fletcher, University of California, Berkeley; David Kohlbrenner, University of Washington; Riccardo Paccagnella, Carnegie Mellon University; Daniel Genkin, Georgia Institute of Technology
Summer Accepted Papers
The 33rd USENIX Security Symposium accepted 32 research papers during their first call for papers, with Georgia Tech authors appearing on six of the works. Below are the pre-print versions that will be presented in Philadelphia this August.
- WEBRR: A Forensic System for Replaying and Investigating Web-Based Attacks in The Modern Web
Authors: Joey Allen, Palo Alto Networks; Zheng Yang, Feng Xiao, and Matthew Landen, Georgia Institute of Technology; Roberto Perdisci, Georgia Institute of Technology and University of Georgia; Wenke Lee, Georgia Institute of Technology - "I Don't Know If We're Doing Good. I Don't Know If We're Doing Bad": Investigating How Practitioners Scope, Motivate, and Conduct Privacy Work When Developing AI Products
Authors: Hao-Ping (Hank) Lee, Carnegie Mellon University; Lan Gao and Stephanie Yang, Georgia Institute of Technology; Jodi Forlizzi and Sauvik Das, Carnegie Mellon University - Two Shuffles Make a RAM: Improved Constant Overhead Zero Knowledge RAM
Authors: Yibin Yang, Georgia Institute of Technology; David Heath, University of Illinois Urbana-Champaign - Pixel Thief: Exploiting SVG Filter Leakage in Firefox and Chrome
Authors: Sioli O'Connell, The University of Adelaide; Lishay Aben Sour and Ron Magen, Ben-Gurion University of the Negev; Daniel Genkin, Georgia Institute of Technology; Yossi Oren, Ben-Gurion University of the Negev and Intel Corporation; Hovav Shacham, UT Austin; Yuval Yarom, Ruhr University Bochum - Go Go Gadget Hammer: Flipping Nested Pointers for Arbitrary Data Leakage
Authors: Youssef Tobah, University of Michigan; Andrew Kwong, UNC Chapel Hill; Ingab Kang, University of Michigan; Daniel Genkin, Georgia Tech; Kang G. Shin, University of Michigan - SledgeHammer: Amplifying Rowhammer via Bank-level Parallelism
Authors: Ingab Kang, University of Michigan; Walter Wang and Jason Kim, Georgia Tech; Stephan van Schaik and Youssef Tobah, University of Michigan; Daniel Genkin, Georgia Tech; Andrew Kwong, UNC Chapel Hill; Yuval Yarom, Ruhr University Bochum