Biblio

Export 14 results:
Filters: Author is Adrian Perrig  [Clear All Filters]
2022
Birge-Lee H, Wanner J, Cimaszewski GH, Kwon J, Wang L, Wirz F, Mittal P, Perrig A, Sun Y.  2022.  Creating a Secure Underlay for the Internet. 31st USENIX Security Symposium (USENIX Security 22). :2601--2618.
Smith J-P, Dolfi L, Mittal P, Perrig A.  2022.  QCSD: A QUIC Client-Side Website-Fingerprinting Defence Framework. 31st USENIX Security Symposium (USENIX Security 22). :771--789.
2021
Giuliari G, Ciussani T, Perrig A, Singla A.  2021.  ICARUS: Attacking low Earth orbit satellite networks. 2021 USENIX Annual Technical Conference (USENIX ATC 21). :317--331.
Rothenberger B, Taranov K, Perrig A, Hoefler T.  2021.  ReDMArk: Bypassing RDMA Security Mechanisms. 30th USENIX Security Symposium (USENIX Security 21). :4277--4292.
2014
Li Y, McCune J, Newsome J, Perrig A, Baker B, Drewry W.  2014.  MiniBox: A Two-Way Sandbox for x86 Native Code. 2014 USENIX Annual Technical Conference (USENIX ATC 14). :409--420.
2010
Kim THyun-Jin, Bauer L, Newsome J, Perrig A, Walker J.  2010.  Challenges in Access Right Assignment for Secure Home Networks. 5th USENIX Workshop on Hot Topics in Security (HotSec 10).
2008
Wendlandt D, Perrig A.  2008.  Perspectives: Improving SSH-style Host Authentication with Multi-Path Probing. 2008 USENIX Annual Technical Conference (USENIX ATC 08).
2006
McCune JM, Perrig A, Reiter MK.  2006.  Bump in the Ether: A Framework for Securing Sensitive User Input . 2006 USENIX Annual Technical Conference (USENIX ATC 06).
2000
Dhamija R, Perrig A.  2000.  Deja Vu--A User Study: Using Images for Authentication. 9th USENIX Security Symposium (USENIX Security 00).