Biblio

Export 12686 results:
2024
Yan J, Xu H, Liu Z, Li Q, Xu K, Xu M, Wu J.  2024.  Brain-on-Switch: Towards Advanced Intelligent Network Data Plane via NN-Driven Traffic Analysis at Line-Speed. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24). :419--440.
Delvaux J, Mune C, Romero M, Timmers N.  2024.  Breaking Espressif’s ESP32 V3: Program Counter Control with Computed Values using Fault Injection. 18th USENIX WOOT Conference on Offensive Technologies (WOOT 24). :229--243.
Xue D, Ablove A, Ramesh R, Danciu GKwak, Ensafi R.  2024.  Bridging Barriers: A Survey of Challenges and Priorities in the Censorship Circumvention Landscape. 33rd USENIX Security Symposium (USENIX Security 24). :2671--2688.
Ammar M, Abdelraoof A, Vlasceanu S.  2024.  On Bridging the Gap between Control Flow Integrity and Attestation Schemes. 33rd USENIX Security Symposium (USENIX Security 24). :6633--6650.
Brown MD, Meily A, Fairservice B, Sood A, Dorn J, Kilmer E, Eytchison R.  2024.  A Broad Comparative Evaluation of Software Debloating Tools. 33rd USENIX Security Symposium (USENIX Security 24). :3927--3943.
Ahn J, Lee J, Lee K, Gwak W, Hwang M, Kwon Y.  2024.  BUDAlloc: Defeating Use-After-Free Bugs by Decoupling Virtual Address Management from Kernel. 33rd USENIX Security Symposium (USENIX Security 24). :181--197.
Shu J, Qian K, Zhai E, Liu X, Jin X.  2024.  Burstable Cloud Block Storage with Data Processing Units. 18th USENIX Symposium on Operating Systems Design and Implementation (OSDI 24). :783--799.
Panahi K, Robertson S, Acar Y, Bardas AG, Kohno T, Simko L.  2024.  "But they have overlooked a few things in Afghanistan:" An Analysis of the Integration of Biometric Voter Verification in the 2019 Afghan Presidential Elections. 33rd USENIX Security Symposium (USENIX Security 24). :2047--2064.
Zhang R, Gerlach L, Weber D, Hetterich L, Lü Y, Kogler A, Schwarz M.  2024.  CacheWarp: Software-based Fault Injection using Selective State Reset. 33rd USENIX Security Symposium (USENIX Security 24). :1135--1151.
Ramesh R, Winter P, Korman S, Ensafi R.  2024.  CalcuLatency: Leveraging Cross-Layer Network Latency Measurements to Detect Proxy-Enabled Abuse. 33rd USENIX Security Symposium (USENIX Security 24). :2263--2280.
Lin Z, Yu Z, Guo Z, Campanoni S, Dinda P, Xing X.  2024.  CAMP: Compiler and Allocator-based Heap Memory Protection. 33rd USENIX Security Symposium (USENIX Security 24). :4015--4032.
Duan H, Bearzi M, Vieli J, Basin D, Perrig A, Liu S, Tellenbach B.  2024.  CAMP: Compositional Amplification Attacks against DNS. 33rd USENIX Security Symposium (USENIX Security 24). :5769--5786.
Jiang N, Sun B, Sim T, Han J.  2024.  Can I Hear Your Face? Pervasive Attack on Voice Authentication Systems with a Single Face Image 33rd USENIX Security Symposium (USENIX Security 24). :1045--1062.
Häring M, Grohs JAngelika, Tiefenau E, Smith M, Tiefenau C.  2024.  Can Johnny be a whistleblower? A qualitative user study of a social authentication Signal extension in an adversarial scenario Twentieth Symposium on Usable Privacy and Security (SOUPS 2024). :259--278.
Yang Z, Sarwar Z, Hwang I, Bhaskar R, Zhao BY, Zheng H.  2024.  Can Virtual Reality Protect Users from Keystroke Inference Attacks? 33rd USENIX Security Symposium (USENIX Security 24). :2725--2742.
Wu Z, Chiang W-L, Mao Z, Yang Z, Friedman E, Shenker S, Stoica I.  2024.  Can't Be Late: Optimizing Spot Instance Savings under Deadlines. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24). :185--203.
Liu B, Scott C, Tariq M, Ferguson A, Gill P, Alimi R, Alipourfard O, Arulkannan D, Beauregard VJean, Conner‎ P et al..  2024.  CAPA: An Architecture For Operating Cluster Networks With High Availability. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24). :1995--2010.
Zhang Q, Imran A, Bardhi E, Swamy T, Zhang N, Shahbaz M, Olukotun K.  2024.  Caravan: Practical Online Learning of In-Network ML Models with Labeling Agents. 18th USENIX Symposium on Operating Systems Design and Implementation (OSDI 24). :325--345.
Han T, Gong X, Liu J.  2024.  CARDSHARK: Understanding and Stablizing Linux Kernel Concurrency Bugs Against the Odds. 33rd USENIX Security Symposium (USENIX Security 24). :6203--6218.
Solt F, Ceesay-Seitz K, Razavi K.  2024.  Cascade: CPU Fuzzing via Intricate Program Generation. 33rd USENIX Security Symposium (USENIX Security 24). :5341--5358.
Rajasekaran S, Ghobadi M, Akella A.  2024.  CASSINI: Network-Aware Job Scheduling in Machine Learning Clusters. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24). :1403--1420.
Carver CJ, Schwartz H, Shao Q, Shade N, Lazzaro J, Wang X, Liu J, Fossum E, Zhou X.  2024.  Catch Me If You Can: Laser Tethering with Highly Mobile Targets. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24). :1847--1865.
Lin Z, Lin Z, Liu X, Chen J, Guo R, Chen C, Xiao S.  2024.  CDN Cannon: Exploiting CDN Back-to-Origin Strategies for Amplification Attacks. 33rd USENIX Security Symposium (USENIX Security 24). :5717--5734.
Rahman MMasfiqur, Karim I, Bertino E.  2024.  CellularLint: A Systematic Approach to Identify Inconsistent Behavior in Cellular Network Specifications. 33rd USENIX Security Symposium (USENIX Security 24). :5215--5232.
Xie Z, Emani M, Yu X, Tao D, He X, Su P, Zhou K, Vishwanath V.  2024.  Centimani: Enabling Fast AI Accelerator Selection for DNN Training with a Novel Performance Predictor. 2024 USENIX Annual Technical Conference (USENIX ATC 24). :1203--1221.

Pages