USENIX supports diversity, equity, and inclusion and condemns hate and discrimination.
Biblio
Export 10 results:
Filters: Author is Nadia Heninger [Clear All Filters]
Abuse-Resistant Location Tracking: Balancing Privacy and Safety in the Offline Finding Ecosystem. 33rd USENIX Security Symposium (USENIX Security 24). :5431--5448.
.
2024. RADIUS/UDP Considered Harmful. 33rd USENIX Security Symposium (USENIX Security 24). :7429--7446.
.
2024. Open to a fault: On the passive compromise of TLS keys via transient errors. 31st USENIX Security Symposium (USENIX Security 22). :233--250.
.
2022. CopyCat: Controlled Instruction-Level Attacks on Enclaves. 29th USENIX Security Symposium (USENIX Security 20). :469--486.
.
2020. TPM-FAIL: TPM meets Timing and Lattice Attacks. 29th USENIX Security Symposium (USENIX Security 20). :2057--2073.
.
2020. DROWN: Breaking TLS Using SSLv2. 25th USENIX Security Symposium (USENIX Security 16). :689--706.
.
2016. Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices. 21st USENIX Security Symposium (USENIX Security 12). :205--220.
.
2012. Optimally Robust Private Information Retrieval. 21st USENIX Security Symposium (USENIX Security 12). :269--283.
.
2012. Computational Complexity and Information Asymmetry in Election Audits with Low-Entropy Randomness. 2010 Electronic Voting Technology Workshop/ Workshop on Trustworthy Elections (EVT/WOTE 10).
.
2010. Lest We Remember: Cold Boot Attacks on Encryption Keys. 17th USENIX Security Symposium (USENIX Security 08).
.
2008.