Biblio

Export 11184 results:
2022
Shen Z, Roongta R, Dolan-Gavitt B.  2022.  Drifuzz: Harvesting Bugs in Device Drivers from Golden Seeds. 31st USENIX Security Symposium (USENIX Security 22). :1275--1290.
Yoshikawa R, Ochiai H, Yatani K.  2022.  DualCheck: Exploiting Human Verification Tasks for Opportunistic Online Safety Microlearning. Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022). :19--37.
Yao J, Tao R, Gu R, Nieh J.  2022.  DuoAI: Fast, Automated Inference of Inductive Invariants for Verifying Distributed Protocols. 16th USENIX Symposium on Operating Systems Design and Implementation (OSDI 22). :485--501.
Bacs A, Musaev S, Razavi K, Giuffrida C, Bos H.  2022.  DUPEFS: Leaking Data Over the Network With Filesystem Deduplication Side Channels. 20th USENIX Conference on File and Storage Technologies (FAST 22). :281--296.
Fu X, Lee D, Min C.  2022.  DURINN: Adversarial Memory and Thread Interleaving for Detecting Durable Linearizability Bugs. 16th USENIX Symposium on Operating Systems Design and Implementation (OSDI 22). :195--211.
Cui W, Zhao H, Chen Q, Wei H, Li Z, Zeng D, Li C, Guo M.  2022.  DVABatch: Diversity-aware Multi-Entry Multi-Exit Batching for Efficient Processing of DNN Services on GPUs. 2022 USENIX Annual Technical Conference (USENIX ATC 22). :183--198.
Misa C, O'Connor W, Durairajan R, Rejaie R, Willinger W.  2022.  Dynamic Scheduling of Approximate Telemetry Queries. 19th USENIX Symposium on Networked Systems Design and Implementation (NSDI 22). :701--717.
Chamani JGhareh, Papadopoulos D, Karbasforushan M, Demertzis I.  2022.  Dynamic Searchable Encryption with Optimal Search in the Presence of Deletions. 31st USENIX Security Symposium (USENIX Security 22). :2425--2442.
Olteanu V, Eran H, Dumitrescu D, Popa A, Baciu C, Silberstein M, Nikolaidis G, Handley M, Raiciu C.  2022.  An edge-queued datagram service for all datacenter traffic. 19th USENIX Symposium on Networked Systems Design and Implementation (NSDI 22). :761--777.
Chen X, A.  2022.  Efficient and Scalable Graph Pattern Mining on GPUs. 16th USENIX Symposium on Operating Systems Design and Implementation (OSDI 22). :857--877.
Stevens T, Skalka C, Vincent C, Ring J, Clark S, Near J.  2022.  Efficient Differentially Private Secure Aggregation for Federated Learning via Hardness of Learning with Errors. 31st USENIX Security Symposium (USENIX Security 22). :1379--1395.
Angel S, Blumberg AJ, Ioannidis E, Woods J.  2022.  Efficient Representation of Numerical Optimization Problems for SNARKs. 31st USENIX Security Symposium (USENIX Security 22). :4273--4290.
McClure S, Ousterhout A, Shenker S, Ratnasamy S.  2022.  Efficient Scheduling Policies for Microsecond-Scale Tasks. 19th USENIX Symposium on Networked Systems Design and Implementation (NSDI 22). :1--18.
[Anonymous].  2022.  Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022). Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022).
[Anonymous].  2022.  Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022). Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022).
Sima C, Fu Y, Sit M-K, Guo L, Gong X, Lin F, Wu J, Li Y, Rong H, Aublin P-L et al..  2022.  Ekko: A Large-Scale Deep Learning Recommender System with Low-Latency Model Update. 16th USENIX Symposium on Operating Systems Design and Implementation (OSDI 22). :821--839.
Bhardwaj R, Xia Z, Ananthanarayanan G, Jiang J, Shu Y, Karianakis N, Hsieh K, Bahl P, Stoica I.  2022.  Ekya: Continuous Learning of Video Analytics Models on Edge Compute Servers. 19th USENIX Symposium on Networked Systems Design and Implementation (NSDI 22). :119--135.
Yu JZhijingche, Shinde S, Carlson TE, Saxena P.  2022.  Elasticlave: An Efficient Memory Model for Enclaves. 31st USENIX Security Symposium (USENIX Security 22). :4111--4128.
Owens K, Alem A, Roesner F, Kohno T.  2022.  Electronic Monitoring Smartphone Apps: An Analysis of Risks from Technical, Human-Centered, and Legal Perspectives. 31st USENIX Security Symposium (USENIX Security 22). :4077--4094.
Wang Y, Li D, Lu Y, Wu J, Shao H, Wang Y.  2022.  Elixir: A High-performance and Low-cost Approach to Managing Hardware/Software Hybrid Flow Tables Considering Flow Burstiness. 19th USENIX Symposium on Networked Systems Design and Implementation (NSDI 22). :535--550.
Korir M, Parkin S, Dunphy P.  2022.  An Empirical Study of a Decentralized Identity Wallet: Usability, Security, and Perspectives on User Control. Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022). :195--211.
Minaei M, Mondal M, Kate A.  2022.  Empirical Understanding of Deletion Privacy: Experiences, Expectations, and Measures. 31st USENIX Security Symposium (USENIX Security 22). :3415--3432.
Feng Y, Chen Z, Song H, Xu W, Li J, Zhang Z, Yun T, Wan Y, Liu B.  2022.  Enabling In-situ Programmability in Network Data Plane: From Architecture to Language. 19th USENIX Symposium on Networked Systems Design and Implementation (NSDI 22). :635--649.
Jog S, Guan J, Madani S, Lu R, Gong S, Vasisht D, Hassanieh H.  2022.  Enabling IoT Self-Localization Using Ambient 5G Signals. 19th USENIX Symposium on Networked Systems Design and Implementation (NSDI 22). :1011--1026.
Chen L, Li Y-N, Tang Q, Yung M.  2022.  End-to-Same-End Encryption: Modularly Augmenting an App with an Efficient, Portable, and Blind Cloud Storage. 31st USENIX Security Symposium (USENIX Security 22). :2353--2370.

Pages