Biblio

Export 12684 results:
2024
Chen J, Mi Z, Xia Y, Guan H, Chen H.  2024.  CPC: Flexible, Secure, and Efficient CVM Maintenance with Confidential Procedure Calls. 2024 USENIX Annual Technical Conference (USENIX ATC 24). :1065--1082.
Addanki V, Pacut M, Schmid S.  2024.  Credence: Augmenting Datacenter Switch Buffer Sharing with ML Predictions. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24). :613--634.
Gao Z, Abhashkumar A, Sun Z, Jiang W, Wang Y.  2024.  Crescent: Emulating Heterogeneous Production Network at Scale. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24). :1045--1062.
[Anonymous].  2024.  Critical Code Guided Directed Greybox Fuzzing for Commits. 33rd USENIX Security Symposium (USENIX Security 24).
[Anonymous].  2024.  On the Criticality of Integrity Protection in 5G Fronthaul Networks. 33rd USENIX Security Symposium (USENIX Security 24).
[Anonymous].  2024.  Cross the Zone: Toward a Covert Domain Hijacking via Shared DNS Infrastructure. 33rd USENIX Security Symposium (USENIX Security 24).
Gao C, Meng X, Li W, Lai J, Zhang Y, Ren F.  2024.  CrossMapping: Harmonizing Memory Consistency in Cross-ISA Binary Translation. 2024 USENIX Annual Technical Conference (USENIX ATC 24). :1013--1028.
[Anonymous].  2024.  Cryptographic Analysis of Delta Chat. 33rd USENIX Security Symposium (USENIX Security 24).
Tabassum M, Mackey A, Lerner A.  2024.  'Custodian of Online Communities': How Moderator Mutual Support in Communities Help Fight Hate and Harassment Online. Twentieth Symposium on Usable Privacy and Security (SOUPS 2024). :297--314.
Xu T, Xue B, Song Y, Wu X, Peng X, Lyu Y, Wang X, Tian C, Ye B, Nguyen C et al..  2024.  CyberStar: Simple, Elastic and Cost-Effective Network Functions Management in Cloud Network at Scale. 2024 USENIX Annual Technical Conference (USENIX ATC 24). :227--246.
Li L, Shang B, Wu Y, Xiong J, Chen X, Xie Y.  2024.  Cyclops: A Nanomaterial-based, Battery-Free Intraocular Pressure (IOP}}}}) Monitoring System inside Contact Lens. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24). :1659--1675.
[Anonymous].  2024.  DAAP: Privacy-Preserving Model Accuracy Estimation on Unlabeled Datasets Through Distribution-Aware Adversarial Perturbation. 33rd USENIX Security Symposium (USENIX Security 24).
[Anonymous].  2024.  DaCapo: Automatic Bootstrapping Management for Efficient Fully Homomorphic Encryption. 33rd USENIX Security Symposium (USENIX Security 24).
[Anonymous].  2024.  Dancer in the Dark: Synthesizing and Evaluating Polyglots for Blind Cross-Site Scripting. 33rd USENIX Security Symposium (USENIX Security 24).
[Anonymous].  2024.  DARKFLEECE: Probing the Dark Side of Android Subscription Apps. 33rd USENIX Security Symposium (USENIX Security 24).
Tang C, Fan B, Zhao J, Liang C, Wang Y, Wang B, Qiu Z, Qiu L, Ding B, Sun S et al..  2024.  Data Caching for Enterprise-Grade Petabyte-Scale OLAP. 2024 USENIX Annual Technical Conference (USENIX ATC 24). :901--915.
[Anonymous].  2024.  Data Caching for Enterprise-Grade Petabyte-Scale OLAP. 2024 USENIX Annual Technical Conference (USENIX ATC 24).
[Anonymous].  2024.  Data Coverage for Guided Fuzzing. 33rd USENIX Security Symposium (USENIX Security 24).
[Anonymous].  2024.  On Data Fabrication in Collaborative Vehicular Perception: Attacks and Countermeasures. 33rd USENIX Security Symposium (USENIX Security 24).
[Anonymous].  2024.  Data Subjects' Reactions to Exercising Their Right of Access. 33rd USENIX Security Symposium (USENIX Security 24).
Li A, Zhang N.  2024.  Data-flow Availability: Achieving Timing Assurance in Autonomous Systems. 18th USENIX Symposium on Operating Systems Design and Implementation (OSDI 24). :445--463.
[Anonymous].  2024.  d-DSE: Distinct Dynamic Searchable Encryption Resisting Volume Leakage in Encrypted Databases. 33rd USENIX Security Symposium (USENIX Security 24).
[Anonymous].  2024.  A Decade of Privacy-Relevant Android App Reviews: Large Scale Trends. 33rd USENIX Security Symposium (USENIX Security 24).
[Anonymous].  2024.  Deciphering Textual Authenticity: A Generalized Strategy through the Lens of Large Language Semantics for Detecting Human vs. Machine-Generated Text. 33rd USENIX Security Symposium (USENIX Security 24).
[Anonymous].  2024.  The Decisive Power of Indecision: Low-Variance Risk-Limiting Audits and Election Contestation via Marginal Mark Recording. 33rd USENIX Security Symposium (USENIX Security 24).

Pages