USENIX supports diversity, equity, and inclusion and condemns hate and discrimination.
Biblio
Export 10 results:
Filters: Author is Kun Sun [Clear All Filters]
What IF Is Not Enough? Fixing Null Pointer Dereference With Contextual Check 33rd USENIX Security Symposium (USENIX Security 24). :1367--1382.
.
2024. Your Firmware Has Arrived: A Study of Firmware Update Vulnerabilities. 33rd USENIX Security Symposium (USENIX Security 24). :5627--5644.
.
2024. Cross Container Attacks: The Bewildered eBPF on Clouds. 32nd USENIX Security Symposium (USENIX Security 23). :5971--5988.
.
2023. Rosetta: Enabling Robust TLS Encrypted Traffic Classification in Diverse Network Environments with TCP-Aware Traffic Augmentation. 32nd USENIX Security Symposium (USENIX Security 23). :625--642.
.
2023. Exploring the Unchartered Space of Container Registry Typosquatting. 31st USENIX Security Symposium (USENIX Security 22). :35--51.
.
2022. Off-Path Network Traffic Manipulation via Revitalized ICMP Redirect Attacks. 31st USENIX Security Symposium (USENIX Security 22). :2619--2636.
.
2022. RapidPatch: Firmware Hotpatching for Real-Time Embedded Devices. 31st USENIX Security Symposium (USENIX Security 22). :2225--2242.
.
2022. SIEVE: Secure In-Vehicle Automatic Speech Recognition Systems. 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2020). :365--379.
.
2020. The CrossPath Attack: Disrupting the SDN Control Channel via Shared Links. 28th USENIX Security Symposium (USENIX Security 19). :19--36.
.
2019. Fingerprinting SDN Applications via Encrypted Control Traffic. 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2019). :501--515.
.
2019.