Usenix security 2024 papers pdf. Support USENIX and our commitment to Open Access.
Usenix security 2024 papers pdf If you have questions, please contact the USENIX Security '24 Program Co-Chairs, Davide Balzarotti and Wenyuan Xu, or the USENIX Production Department. Driven by the growth in remote work and the increasing diversity of remote working arrangements, our qualitative research study aims to investigate the nature of 34th USENIX Security Symposium The USENIX Security Symposium brings together researchers, practitioners, system programmers, and others interested in the latest advances in the security and privacy of computer systems and networks. e. Paper submissions due: Wednesday, September 4, 2024; Early reject notification: Tuesday, October 15, 2024; Rebuttal period: November 18–25, 2024 In this paper, we thus investigate the threat of application-layer traffic loops. Cycle 1. Papers and proceedings are freely available to everyone once the event begins. Important Dates • Practitioner track paper submissions due: Tuesday, March 5, 2024, 11:59 pm AoE • Academic track paper submissions due: Tuesday, March 12, 2024, 11:59 pm AoE • Notification to authors: Thursday, April 11, 2024 Welcome to the 33rd USENIX Security Symposium (USENIX Security '24 Fall) submissions site. New in 2025, there will be two submission cycles. 33" inter-column space, formatted for 8 USENIX Security '23: Did the Shark Eat the Watchdog in the NTP Pool? Deceiving the NTP Pool’s Monitoring System: Jonghoon Kwon, Jeonggyu Song, Junbeom Hur, Adrian Perrig: USENIX Security '23: Formal Analysis of SPDM: Security Protocol and Data Model version 1. We hope you enjoyed the event. In this paper, we present a novel and scalable multi-party computation (MPC) protocol tailored for privacy-preserving machine learning (PPML) with semi-honest security in the honest-majority setting. Noh, Virginia Tech Arthi Padmanabhan, Harvey Mudd College Roberto Palmieri, Lehigh University Abhisek Pan, Microsoft Research Ashish Panwar, Microsoft Research Kexin Pei, The University of Chicago and Columbia University In this paper, we introduce MAGIC, a novel and flexible self-supervised APT detection approach capable of performing multi-granularity detection under different level of supervision. USENIX Security '24 Full Proceedings (PDF, 717. While multiple fuzzing frameworks have been proposed in recent years to test relational (SQL) DBMSs to improve their security, non-relational (NoSQL) DBMSs have yet to experience the same scrutiny and lack an effective testing solution in general. Filter List View By: USENIX Security '23. The 34th USENIX Security Symposium will be held on August 13–15, 2025, in Seattle, WA, USA. We observe that CCA offers the right abstraction and mechanisms to allow confidential VMs to use accelerators as a first-class abstraction. Please submit your short and long papers by 11:59 pm PDT on September 17, 2024, in PDF format via the submission form. , target states) can be derived, e. We empirically identify that 23. To this end, we propose a systematic approach to identify loops among real servers. , states, conditions, and actions). For revisions of submissions receiving “Accept Conditional on Major Revision” decisions during one of the USENIX Security '24 submission periods, authors who revise their papers must submit a separate PDF that includes the verbatim revision criteria, a list of changes to the paper, and a statement of how the changes address the criteria. We disclosed our findings to Intel before submitting to USENIX Security 2024. 33rd USENIX Security Symposium The USENIX Security Symposium brings together researchers, practitioners, system administrators, system programmers, and others interested in the latest advances in the security and privacy of computer systems and networks. The 33rd USENIX Security Symposium will be held August 14–16, 2024, in Philadelphia, PA In this paper, we present Hermes, an end-to-end framework to automatically generate formal representations from natural language cellular specifications. We also define new security notions, in particular Distinct with Volume-Hiding security, as well as forward and backward privacy, for the new concept. Existing solutions for automatically finding taint-style vulnerabilities significantly reduce the number of binaries analyzed to achieve scalability. Yang, Bo Luo, Kaitai Liang: USENIX Security '24: FEASE: Fast and Expressive Asymmetric Searchable Encryption: Long Meng, Liqun Chen, Yangguang Tian, Mark Manulis, Suhui Liu: USENIX This paper makes the following technical contributions. USENIX Security '24: d-DSE: Distinct Dynamic Searchable Encryption Resisting Volume Leakage in Encrypted Databases: Dongli Liu, Wei Wang, Peng Xu, Laurence T. By exhaustively exploring the entire IPv4 address space, Internet scanning has driven the development of new security protocols, found and tracked vulnerabilities, improved DDoS defenses, and illuminated global censorship. For general information, see https: August 14–16, 2024, Philadelphia, PA, USA 33rd USENIX Security Symposium The USENIX Security Symposium brings together researchers, practitioners, system administrators, system programmers, and others interested in the latest advances in the security and privacy of computer systems and networks. ’s ZMap [25] at USENIX Security 2013, researchers used fast IPv4 Internet scans in more than 700 peer-reviewed papers to paper. , read, write, and unrestricted) they may gain. It should include a clear description of the hardware, software, and configuration requirements. , files, memory, and operations) the adversary may access and what privileges (e. Cache side-channel attacks based on speculative executions are powerful and difficult to mitigate. unique to IPv6, surveying open ports and security-sensitive services, and identifying potential CVEs. Any video, audio, and/or slides that are posted after the event are also free and open to everyone. Since 2020, papers accepted at the USENIX Security Symposium had the option to get their artifact evaluated through a separate procedure, which this year was supervised by Phani Vadrevu and Anjo Vahldiek-Oberwagner. We observe that the major application scenarios of directed fuzzing provide detailed vulnerability descriptions, from which highly-valuable program states (i. 2. The 18th USENIX WOOT Conference on Offensive Technologies (WOOT '24) will take place at the Philadelphia Downtown Marriott in Philadelphia, PA, USA, on August 12–13, 2024. August 4–16 02 hiladelphia A SA 978-1-939133-44-1 Open access to the roceedings o the 33rd SENIX Security Symposium is sponsored by SENIX. Below are the pre-print versions that will be presented in Philadelphia this August. Distinct from existing methods that optimize AEs by querying the target model, VoxCloak initially employs a small number of queries (e. An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised 2024, and will be co-located with the 33rd USENIX Security Symposium in Philadelphia, PA, United States. Final Papers deadline. In 2018, we co-located with the USENIX Security Symposium for the first time, and we have continued that co-location for 2024. Do not email submissions. USENIX Security '24 has three submission deadlines. Thursday, March 28, 2024 • Workshop paper submission deadline: Thursday, May 23, 2024 • Workshop paper acceptance notification to authors: Thursday, June 6, 2024 • Workshop final papers due: Thursday, June 20, 2024 Organizers Workshops and Beyond Co-Chairs Kelsey Fulton, Colorado School of Mines Daniel Votipka, Tufts University USENIX is committed to Open Access to the research presented at our events. Aug 12, 2024 · Previous studies have shown that users often adopt security practices on the basis of advice from others and have proposed collaborative and community-based approaches to enhance user security behaviors. iHunter performs static taint analysis on iOS SDKs to extract taint traces representing privacy data collection and leakage practices. The deadline for nominations is Thursday, May 23, 2024. Thanks to those who joined us for the 33rd USENIX Security Symposium. We show how malicious accusers can successfully make false claims against independent suspect models that were not stolen. However, existing security testing methods for RESTful APIs usually lack targeted approaches to identify and detect security vulnerabilities. Submissions should be typeset in two-column format using 10-point type on 12-point (single-spaced) leading in a text block 7" wide x 9" deep, with . February 8, 2024 • Paper Submission Deadline: Thursday, February 15, 2024 • Early Rejection Notification: Friday, March 22, 2024 • Author Response Period: Thursday, April 18–Thursday, April 25, 2024 • Paper Notifications: Monday, May 13, 2024 • Final Paper Files Due: Thursday, June 10, 2024 Symposium Organizers General Co-Chairs USENIX Security brings together researchers, Thursday, February 1, 2024; Final paper files due: Tuesday, March 5, in PDF (maximum size 36" by The Twentieth Symposium on Usable Privacy and Security (SOUPS 2024), August 11–13, 2024, Philadelphia, PA, USA. 1 Windows WSL might work but is untested and not supported. 2: Cas Cremers, Alexander Dax, Aurora Naska: USENIX Security '23 Here, researchers identified shadow security behaviour: where security-conscious users apply their own security practices which are not in compliance with official security policy. USENIX Security '23: Humans vs. 2024) and MacOS 14. 0This is the author’s version of the USENIX Security 2024 paper. Jun 17, 2024 · The 22nd USENIX Symposium on Networked Systems Design and Implementation (NSDI '25) will take place April 28–30, 2025, at the Philadelphia Marriott Downtown in Philadelphia, PA, USA. A PDF of your final paper is due via the submissions system by Monday, June 10, 2024. Be-ginning with the debut of Durumeric et al. We first develop a neural constituency parser, NEUTREX, to process transition-relevant texts and extract transition components (i. August 14–16, 2024, Philadelphia, PA, USA 33rd USENIX Security Symposium The USENIX Security Symposium brings together researchers, practitioners, system administrators, system programmers, and others interested in the latest advances in the security and privacy of computer systems and networks. The typically with improved performance and security over their Linux counterparts. Our protocol utilizes the Damgaard-Nielsen (Crypto '07) protocol with Mersenne prime fields. But this increase in convenience comes with increased security risks to the users of IoT devices, partially because IoT firmware is frequently complex, feature-rich, and very vulnerable. Thus for the 2024 award, current graduate students and those who have graduated no earlier than January 2023 are eligible. 57. NSDI focuses on the design principles, implementation, and practical evaluation of networked and distributed systems. (i) The R1SMG mechanisms achieves DP guarantee on high dimension query results in, while its expected accuracy loss is lower bounded by a term that is on a lower order of magnitude by at least the dimension of query results compared with that of the classic Gaussian mechanism, of the Sam H. We used bash 5. 18% of glue records across 1,096 TLDs are outdated yet still served in practice. Prepublication versions of the accepted papers from the fall submission deadline are available below. In case your arti-fact aims to receive the functional or results reproduced. Existing hardware defense schemes often require additional hardware data structures, data movement operations and/or complex logical computations, resulting in excessive overhead of both processor performance and hardware resources. Important Dates. Notification of acceptance: Thursday, March 7, 2024 Wednesday, March 13, 2024; Final workshop CFP due date for workshop organizers: Thursday, March 28, 2024; Workshop paper submission deadline: Thursday, May 23, 2024; Workshop paper acceptance notification to authors: Thursday June 6, 2024; Workshop final papers due: Thursday, June 20, 2024 in high-load server scenarios. USENIX Security '24 Lotto: Secure Participant Selection against Adversarial Servers in Federated Learning Zhifeng Jiang, Peng Ye, Shiqi He, Wei Wang, Ruichuan Chen, Bo Li This paper undertakes the first systematic exploration of the potential threats posed by DNS glue records, uncovering significant real-world security risks. Hardware isolation and memory encryption in TEEs ensure the confidentiality and integrity of CVMs. In this paper, we focused on the negative effects of social triggers and investigated whether risky user behaviors are socially triggered. In this paper, we show that common MOR schemes in the literature are vulnerable to a different, equally important but insufficiently explored, robustness concern: a malicious accuser. SLUBStick operates in multiple stages: Initially, it exploits a timing side channel of the allocator to perform a cross-cache attack reliably. This paper is included in the roceedings of the 33rd SENIX ecrity yposim. Kernel privilege-escalation exploits typically leverage memory-corruption vulnerabilities to overwrite particular target locations. 37 MB, best for mobile devices) USENIX is committed to Open Access to the research presented at our events. No extensions will be granted. August 4–16 02 hiladelphia A SA 978-1-939133-44-1 Open access to the roceedings of the USENIX is committed to Open Access to the research presented at our events. Reiter, Mahmood Sharif: USENIX Security '23 Hao-Ping (Hank) Lee, Carnegie Mellon University; Lan Gao, Georgia Institute of Technology; Stephanie Yang, Georgia Institute of Technology; Jodi Forlizzi, Carnegie Mellon University; Sauvik Das, Carnegie Mellon University Nick Feamster, Fabian Monrose, David Wagner, and Wenyuan Xu to recognize papers that have had a lasting impact on the security field. Based on d-DSE, we construct the d-DSE designed EDB with related constructions for distinct keyword (d-KW-dDSE), keyword (KW-dDSE), and join queries (JOIN-dDSE) and update queries in encrypted Notification of acceptance: Thursday, March 7, 2024 Wednesday, March 13, 2024; Final workshop CFP due date for workshop organizers: Thursday, March 28, 2024; Workshop paper submission deadline: Thursday, May 23, 2024; Workshop paper acceptance notification to authors: Thursday June 6, 2024; Workshop final papers due: Thursday, June 20, 2024 USENIX Security '24 Full Proceedings (PDF, 717. For example, while models are often studied in isolation, they form part of larger ML pipelines in practice. 4 (Sonoma). MAGIC leverages masked graph representation learning to model benign system entities and behaviors, performing efficient deep feature extraction and structure USENIX is committed to Open Access to the research presented at our events. [USENIX Security 2024] Official Repository of 'KnowPhish: Large Language Models Meet Multimodal Knowledge Graphs for Enhancing Reference-Based Phishing Detection' - imethanlee/KnowPhish New approach to presenting accepted papers (see the public RFC about the plans for this new model). In this paper, we propose VOAPI2, a vulnerability-oriented API inspection framework designed to directly expose vulnerabilities in RESTful APIs, based on our observation that the type of vulnerability Database Management Systems play an indispensable role in modern cyberspace. In this paper, we introduce VoxCloak, a new targeted AE attack with superior performance in both these aspects. • Bash shell interpreter (typically included in the above). USENIX is committed to Open Access to the research presented at our events. AMD has gained a significant market share in recent years with the introduction of the Zen microarchitecture. Maximum page length. 26 and 3. The Twentieth Symposium on Usable Privacy and Security (SOUPS 2024), August 11–13, 2024, Philadelphia, PA, USA. Responsible Disclosure. This paper explores UI security for AR platforms, for which we identify three UI security-related properties: Same Space (how does the platform handle virtual content placed at the same coordinates?), Invisibility (how does the platform handle invisible virtual content?), and Synthetic Input (how does the platform handle simulated user input?). However, despite being untrusted, the privileged software components such as the hypervisor remain responsible for resource allocation and virtualization management. 1 Introduction Microkernels minimize functionality in the kernel and move components, such as file systems and device drivers, into well-isolated and least-privileged OS services, achieving better reliability, security, and extensibility than monolithic kernels . The 33rd USENIX Security Symposium will be held August 14–16, 2024, in Philadelphia, PA In this paper we propose SinglePass, the first PIR protocol that is concretely optimal with respect to client-preprocessing, requiring exactly a single linear pass over the database. Machines in Malware Classification: Simone Aonzo, Yufei Han, Alessandro Mantovani, Davide Balzarotti: USENIX Security '23: Adversarial Training for Raw-Binary Malware Classifiers: Keane Lucas, Samruddhi Pai, Weiran Lin, Lujo Bauer, Michael K. The complete submission must be no longer than 12 pages for long papers and no longer than 6 pages for short papers, excluding references. The 33rd USENIX Security Symposium will be held August 14–16, 2024, in Philadelphia, PA 33rd USENIX Security Symposium The USENIX Security Symposium brings together researchers, practitioners, system administrators, system programmers, and others interested in the latest advances in the security and privacy of computer systems and networks. Support USENIX and our commitment to Open Access. The 33rd USENIX Security Symposium will be held August 14–16, 2024, in Philadelphia, PA This paper is included in the roceedings o the 33rd SENIX Security Symposium. All dates are at 23:59 AoE (Anywhere on Earth) time. Nominations should include: The student's best three usable privacy and security papers. This is a hard deadline. 34th USENIX Security Symposium The USENIX Security Symposium brings together researchers, practitioners, system programmers, and others interested in the latest advances in the security and privacy of computer systems and networks. Reiter, Mahmood Sharif: USENIX Security '23 USENIX is committed to Open Access to the research presented at our events. Donate Today. 1 Motivations The motivations of this paper, from the lower cryptographic USENIX is committed to Open Access to the research presented at our events. The USENIX WOOT Conference aims to present a broad picture of offense and its contributions, bringing together researchers and practitioners across all areas of computer security. Final papers deadline. The 33rd USENIX Security Symposium will be held USENIX Security '24: Fingerprinting Obfuscated Proxy Traffic with Encapsulated TLS Handshakes: Diwen Xue, Michalis Kallitsis, Amir Houmansadr, Roya Ensafi: USENIX Security '24: SmartCookie: Blocking Large-Scale SYN Floods with a Split-Proxy Defense on Programmable Data Planes: Sophia Yoo, Xiaoqi Chen, Jennifer Rexford: USENIX Security '24 2024, and will be co-located with the 33rd USENIX Security Symposium in Philadelphia, PA, United States. In this paper, we analyze the phase 1 settings and implementations as they are found in phones as well as in commercially deployed networks worldwide. 5 MB) USENIX Security '24 Proceedings Interior (PDF, 714. 1 Introduction IPv4 Internet scanning has transformed security research. The 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI '24) will take place April 16–18, 2024, at the Hyatt Regency Santa Clara in Santa Clara, CA, USA. Instructions for Authors of Refereed Papers. Paper submissions due: Wednesday, September 4, 2024; Early reject notification: Tuesday, October 15, 2024; Rebuttal period: November 18–25, 2024 Thursday, March 28, 2024 • Workshop paper submission deadline: Thursday, May 23, 2024 • Workshop paper acceptance notification to authors: Thursday, June 6, 2024 • Workshop final papers due: Thursday, June 20, 2024 Organizers Workshops and Beyond Co-Chairs Kelsey Fulton, Colorado School of Mines Daniel Votipka, Tufts University USENIX is committed to Open Access to the research presented at our events. Their team has been fantastic at making the process of running a high-quality conference seamless. Our technique operates over an abstraction called the circuit dependence graph (CDG) that captures key properties of the circuit and allows expressing USENIX is committed to Open Access to the research presented at our events. While there are many recent Rowhammer attacks launched from Intel CPUs, they are completely absent on these newer AMD CPUs due to three non-trivial challenges: 1) reverse engineering the unknown DRAM addressing functions, 2) synchronizing with refresh commands for evading in-DRAM Internet-wide scanning is a critical tool for security researchers and practitioners alike. USENIX Security '24 Intellectual Property Exposure: Subverting and Securing Intellectual Property Encapsulation in Texas Instruments Microcontrollers Marton Bognar, Cas Magnus, Frank Piessens, Jo Van Bulck The 33rd USENIX Security Symposium accepted 32 research papers during their first call for papers, with Georgia Tech authors appearing on six of the works. , watching videos or websites. The 33rd USENIX Security Symposium will be held August 14–16, 2024, in Philadelphia, PA New approach to presenting accepted papers (see the public RFC about the plans for this new model). The 33rd USENIX Security Symposium will be held August 14–16, 2024, in Philadelphia, PA USENIX Security '23: Humans vs. In this paper, we present SnailLoad, a new side-channel attack where the victim loads an asset, e. There is no separate deadline for abstract submissions. 3 MB, best for mobile devices) USENIX Security '24 Errata Slip #1 (PDF) USENIX Security '24 Full Artifact Appendices Proceedings (PDF, 15. Directed fuzzers often unnecessarily explore program code and paths that cannot trigger the target vulnerabilities. , a file or an image, from an attacker-controlled server, exploiting the victim's network latency as a side channel tied to activities on the victim system, e. 1. If you have questions about the requirements shown below, contact the Production Department. 2 Background and Related Work This section provides relevant background information about the branch prediction mechanism in modern high-performance processors, focusing on Indirect Branch Pre- USENIX is committed to Open Access to the research presented at our events. The USENIX Security Symposium brings together researchers, practitioners, system administrators, system programmers, and others interested in the latest advances in the security and privacy of computer systems and networks. This paper studies common vulnerabilities in Circom (the most popular domain-specific language for ZKP circuits) and describes a static analysis framework for detecting these vulnerabilities. On the UE side, we identified a recent 5G baseband chipset from a major manufacturer that allows for fallback to weak, unannounced modes and verified it experimentally. Glaze: Protecting Artists from Style This paper presents the first large-scale study, based on our new taint analysis system named iHunter, to analyze privacy violations in the iOS software supply chain. These memory corruption targets play a critical role in the exploits, as they determine which privileged resources (e. • Docker Engine or Docker Desktop. The 19th USENIX WOOT Conference on Offensive Technologies (WOOT '25) will take place August 11–12, 2025, and will be co-located with the 34th USENIX Security Symposium in Seattle, WA, United States. In this paper, we present SmartCookie, the first system to run cryptographically secure SYN cookie checks on high-speed programmable switches, for both security and performance. g August 14–16, 2024, Philadelphia, PA, USA 33rd USENIX Security Symposium The USENIX Security Symposium brings together researchers, practitioners, system administrators, system programmers, and others interested in the latest advances in the security and privacy of computer systems and networks. In this paper, we reconsider the Arm Confidential Computing Architecture (CCA) design, an upcoming TEE feature in Armv9-A, to address this gap. Priority Submission Deadline*: Wednesday, April 24, 2024; Notification of Early Acceptance: Thursday, May 15, 2024; Submission Deadline: Thursday, May 23, 2024; Notification of Poster Acceptance: Thursday For regular papers, shorter papers won't be penalized; thus, authors are encouraged to submit papers of appropriate length based on the research contribution. Our approach yields a preprocessing speedup ranging from 45× to 100× and a query speedup of up to 20× when compared to previous state-of-the-art schemes (e. of the USENIX staff for their work in organizing SOUPS and supporting our community. , a few hundred) to infer the feature extractor used by the target system. Our novel split-proxy defense leverages emerging programmable switches to block 100% of SYN floods in the switch data plane and also uses state-of-the-art kernel "I can say I'm John Travoltabut I'm not John Travolta": Investigating the Impact of Changes to Social Media Verification Policies on User Perceptions of Verified Accounts USENIX is committed to Open Access to the research presented at our events. The 33rd USENIX Security Symposium will be held August 14–16, 2024, in Philadelphia, PA In this paper, we present SLUBStick, a novel kernel exploitation technique elevating a limited heap vulnerability to an arbitrary memory read-and-write primitive. g. , call traces when a vulnerability gets triggered. Up-and-coming track paper submissions due: Tuesday, March 4, 2025, 11:59 pm AoE In cooperation with USENIX, the Advanced Computing Systems Association. 12 MB) USENIX Security '24 Artifact Appendices Proceedings Interior (PDF, 14. Recent works have identified a gap between research and practice in artificial intelligence security: threats studied in academia do not always reflect the practical use and security risks of AI. The 33rd USENIX Security Symposium will be held For revisions of submissions receiving “Accept Conditional on Major Revision” decisions during one of the USENIX Security '24 submission periods, authors who revise their papers must submit a separate PDF that includes the verbatim revision criteria, a list of changes to the paper, and a statement of how the changes address the criteria. This paper takes a bottom-up methodology to solve this problem, starting from optimizing cryptographic algorithms at the lowest level, proceeding to the OpenSSL layer, and ultimately reaching the TLS application layer. @inproceedings {294520, author = {Dandan Xu and Di Tang and Yi Chen and XiaoFeng Wang and Kai Chen and Haixu Tang and Longxing Li}, title = {Racing on the Negative Force: Efficient Vulnerability {Root-Cause} Analysis through Reinforcement Learning on Counterexamples}, USENIX is committed to Open Access to the research presented at our events. While Docker En-gine suffices and is typically included in Linux distribu- USENIX is committed to Open Access to the research presented at our events. See full list on usenix. org ap for the evaluation of your artifact. Nominees will be notified of the outcome by the end of July. A printable PDF of your paper is due on or before the final paper deadlines listed below. Important Dates • Practitioner track paper submissions due: Tuesday, March 5, 2024, 11:59 pm AoE • Academic track paper submissions due: Tuesday, March 12, 2024, 11:59 pm AoE • Notification to authors: Thursday, April 11, 2024 The 18th USENIX WOOT Conference on Offensive Technologies (WOOT '24) will take place at the Philadelphia Downtown Marriott in Philadelphia, PA, USA, on August 12–13, 2024. The 33rd USENIX Security Symposium will be held USENIX Supporters; 2024 Board Election; USENIX Best Papers. No specific version is required. Our core idea is to learn the response functions of all servers of a given application-layer protocol, encode this knowledge into a 33rd USENIX Security Symposium The USENIX Security Symposium brings together researchers, practitioners, system administrators, system programmers, and others interested in the latest advances in the security and privacy of computer systems and networks. tpchaipjsfewesgyeyjmebmutsuidodrebvgpfakgmzswltckjedb