Editor's Picks
Best Talks at 34th USENIX Security Symposium (USENIX Security '25)
Hand-picked from in-depth reviewer verdicts — the top 12 talks from this conference. Skip the noise, find the signal.
← All talks at 34th USENIX Security Symposium (USENIX Security '25)
-
1
My ZIP isn't your ZIP: Identifying and Exploiting Semantic Gaps Between ZIP Parsers
Yufan You
In this compelling talk from USENIX Security, Yufan You presented groundbreaking research on **semantic gaps** in **ZIP file format** parsing, revealing a widespread and critical vulnerability across numerous applications and systems. The core premise is deceptively simple yet…
0 Dr. Zero MUST SEE ★★★★★ H Heather Calloway SOLID ★★★☆☆ -
2
BGP Vortex: Update Message Floods Can Create Internet Instabilities
Felix Stöger
The Border Gateway Protocol (BGP) forms the foundational routing fabric of the internet, orchestrating how data traverses autonomous systems (ASes) globally. For decades, the stability and convergence of BGP have been a cornerstone assumption, particularly underpinned by the…
0 Dr. Zero MUST SEE ★★★★★ H Heather Calloway SOLID ★★★☆☆ -
3
A First Look at Governments' Enterprise Security Guidance
Kimberly Ruth
In an increasingly complex and interconnected digital landscape, organizations of all sizes frequently seek authoritative guidance on best practices for cybersecurity. Governments, often perceived as impartial and reliable sources, have stepped into this critical role, with…
0 Dr. Zero STRONG ACCEPT ★★★★☆ H Heather Calloway STRONG ACCEPT ★★★★☆ -
4
Abusability of Automation Apps in Intimate Partner Violence
Shirley Zhang
This talk, presented by Shirley Zhang at USENIX Security, unveils a critical and often overlooked vector for intimate partner violence (IPV): the weaponization of readily available mobile automation applications. While much research in tech-enabled abuse focuses on overt…
0 Dr. Zero STRONG ACCEPT ★★★★☆ H Heather Calloway SOLID ★★★☆☆ -
5
CloudFlow: Identifying Security-sensitive Data Flows in Serverless Applications
Giuseppe Raffa
In this presentation, Giuseppe Raffa introduces **CloudFlow**, a novel framework designed to statically detect security-sensitive data flows within serverless applications. As enterprises increasingly adopt serverless computing for its agility and reduced operational overhead…
0 Dr. Zero STRONG ACCEPT ★★★★☆ H Heather Calloway SOLID ★★★☆☆ -
6
Confusing Value with Enumeration: Studying the Use of CVEs in Academia
Moritz Schloegel
This article delves into a critical examination of how **Common Vulnerabilities and Exposures (CVE)** identifiers are perceived and utilized within the academic security research community. Presented by Moritz Schloegel at USENIX Security 2025, the talk, titled "Confusing Value…
0 Dr. Zero STRONG ACCEPT ★★★★☆ H Heather Calloway SOLID ★★★☆☆ -
7
Demystifying the (In)Security of QR Code-based Login in Real-world Deployments
Xin Zhang
The proliferation of QR code-based login systems across a myriad of digital platforms, from social media and e-commerce to cloud storage and gaming, has revolutionized user convenience. By simply scanning a QR code with a trusted mobile application, users can bypass traditional…
0 Dr. Zero STRONG ACCEPT ★★★★☆ H Heather Calloway SOLID ★★★☆☆ -
8
Universal Cross-app Attacks: Exploiting and Securing OAuth 2.0 in Integration Platforms
Kaixuan Luo
This talk, presented by Kaixuan Luo, a PhD candidate at the Chinese University of Hong Kong, delves into a critical security vulnerability within the rapidly expanding ecosystem of **integration platforms**. These platforms, ranging from virtual voice assistants like Alexa and…
0 Dr. Zero STRONG ACCEPT ★★★★☆ H Heather Calloway SOLID ★★★☆☆ -
9
Predictive Response Optimization: Using Reinforcement Learning to Fight Online Social Network Abuse
Garrett Wilson
In the realm of online social networks, the battle against abuse is a perpetual arms race. Traditional approaches have largely focused on the *detection* of malicious activities, often grappling with the inherent trade-off between precision and recall. However, as Garrett…
0 Dr. Zero STRONG ACCEPT ★★★★☆ H Heather Calloway SOLID ★★★☆☆ -
10
Assessing the Aftermath: the Effects of a Global Takedown against DDoS-for-hire Services
Anh V. Vu
0 Dr. Zero STRONG ACCEPT ★★★★☆ H Heather Calloway SOLID ★★★☆☆ -
11
Scoop: Mitigation of Recapture Attacks on Provenance-Based Media Authentication
Yuxin (Myles) Liu
In an era dominated by rapidly spreading digital information and the proliferation of sophisticated generative AI, distinguishing authentic content from fabricated material has become an increasingly critical challenge. This talk, "Scoop: Mitigation of Recapture Attacks on…
0 Dr. Zero STRONG ACCEPT ★★★★☆ H Heather Calloway SOLID ★★★☆☆ -
12
Tracking You from a Thousand Miles Away! Turning a Bluetooth Device into an Apple AirTag Without Root Privileges
Junming Chen
This talk, presented by Junming Chen at USENIX Security, unveils a critical security vulnerability within Apple's widely used Find My network. The research, dubbed "Android," demonstrates how nearly any Bluetooth-enabled device – from laptops and smartphones to gaming consoles…
0 Dr. Zero STRONG ACCEPT ★★★★☆ H Heather Calloway SOLID ★★★☆☆