Biblio
Export 12752 results:
CalcuLatency: Leveraging Cross-Layer Network Latency Measurements to Detect Proxy-Enabled Abuse. 33rd USENIX Security Symposium (USENIX Security 24). :2263--2280.
.
2024. CAMP: Compiler and Allocator-based Heap Memory Protection. 33rd USENIX Security Symposium (USENIX Security 24). :4015--4032.
.
2024. CAMP: Compositional Amplification Attacks against DNS. 33rd USENIX Security Symposium (USENIX Security 24). :5769--5786.
.
2024. Can I Hear Your Face? Pervasive Attack on Voice Authentication Systems with a Single Face Image 33rd USENIX Security Symposium (USENIX Security 24). :1045--1062.
.
2024. Can Johnny be a whistleblower? A qualitative user study of a social authentication Signal extension in an adversarial scenario Twentieth Symposium on Usable Privacy and Security (SOUPS 2024). :259--278.
.
2024. Can Virtual Reality Protect Users from Keystroke Inference Attacks? 33rd USENIX Security Symposium (USENIX Security 24). :2725--2742.
.
2024. Can't Be Late: Optimizing Spot Instance Savings under Deadlines. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24). :185--203.
.
2024. CAPA: An Architecture For Operating Cluster Networks With High Availability. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24). :1995--2010.
.
2024. Caravan: Practical Online Learning of In-Network ML Models with Labeling Agents. 18th USENIX Symposium on Operating Systems Design and Implementation (OSDI 24). :325--345.
.
2024. CARDSHARK: Understanding and Stablizing Linux Kernel Concurrency Bugs Against the Odds. 33rd USENIX Security Symposium (USENIX Security 24). :6203--6218.
.
2024. Cascade: CPU Fuzzing via Intricate Program Generation. 33rd USENIX Security Symposium (USENIX Security 24). :5341--5358.
.
2024. CASSINI: Network-Aware Job Scheduling in Machine Learning Clusters. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24). :1403--1420.
.
2024. Catch Me If You Can: Laser Tethering with Highly Mobile Targets. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24). :1847--1865.
.
2024. CDN Cannon: Exploiting CDN Back-to-Origin Strategies for Amplification Attacks. 33rd USENIX Security Symposium (USENIX Security 24). :5717--5734.
.
2024. CellularLint: A Systematic Approach to Identify Inconsistent Behavior in Cellular Network Specifications. 33rd USENIX Security Symposium (USENIX Security 24). :5215--5232.
.
2024. Centimani: Enabling Fast AI Accelerator Selection for DNN Training with a Novel Performance Predictor. 2024 USENIX Annual Technical Conference (USENIX ATC 24). :1203--1221.
.
2024. ChainPatrol: Balancing Attack Detection and Classification with Performance Overhead for Service Function Chains Using Virtual Trailers. 33rd USENIX Security Symposium (USENIX Security 24). :3441--3458.
.
2024. ChainReactor: Automated Privilege Escalation Chain Discovery via AI Planning. 33rd USENIX Security Symposium (USENIX Security 24). :5913--5929.
.
2024. The Challenges of Bringing Cryptography from Research Papers to Products: Results from an Interview Study with Experts. 33rd USENIX Security Symposium (USENIX Security 24). :7213--7230.
.
2024. ChameleonAPI: Automatic and Efficient Customization of Neural Networks for ML Applications. 18th USENIX Symposium on Operating Systems Design and Implementation (OSDI 24). :365--386.
.
2024. Characterization of Large Language Model Development in the Datacenter. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24). :709--729.
.
2024. CHISEL: An optical slice of the wide-area network. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24). :859--875.
.
2024. Chop Chop: Byzantine Atomic Broadcast to the Network Limit. 18th USENIX Symposium on Operating Systems Design and Implementation (OSDI 24). :269--287.
.
2024. ClearStamp: A Human-Visible and Robust Model-Ownership Proof based on Transposed Model Training. 33rd USENIX Security Symposium (USENIX Security 24). :5269--5286.
.
2024. Closed-Form Bounds for DP-SGD against Record-level Inference Attacks. 33rd USENIX Security Symposium (USENIX Security 24). :4819--4836.
.
2024.