Biblio

Export 12752 results:
2024
Ramesh R, Winter P, Korman S, Ensafi R.  2024.  CalcuLatency: Leveraging Cross-Layer Network Latency Measurements to Detect Proxy-Enabled Abuse. 33rd USENIX Security Symposium (USENIX Security 24). :2263--2280.
Lin Z, Yu Z, Guo Z, Campanoni S, Dinda P, Xing X.  2024.  CAMP: Compiler and Allocator-based Heap Memory Protection. 33rd USENIX Security Symposium (USENIX Security 24). :4015--4032.
Duan H, Bearzi M, Vieli J, Basin D, Perrig A, Liu S, Tellenbach B.  2024.  CAMP: Compositional Amplification Attacks against DNS. 33rd USENIX Security Symposium (USENIX Security 24). :5769--5786.
Jiang N, Sun B, Sim T, Han J.  2024.  Can I Hear Your Face? Pervasive Attack on Voice Authentication Systems with a Single Face Image 33rd USENIX Security Symposium (USENIX Security 24). :1045--1062.
Häring M, Grohs JAngelika, Tiefenau E, Smith M, Tiefenau C.  2024.  Can Johnny be a whistleblower? A qualitative user study of a social authentication Signal extension in an adversarial scenario Twentieth Symposium on Usable Privacy and Security (SOUPS 2024). :259--278.
Yang Z, Sarwar Z, Hwang I, Bhaskar R, Zhao BY, Zheng H.  2024.  Can Virtual Reality Protect Users from Keystroke Inference Attacks? 33rd USENIX Security Symposium (USENIX Security 24). :2725--2742.
Wu Z, Chiang W-L, Mao Z, Yang Z, Friedman E, Shenker S, Stoica I.  2024.  Can't Be Late: Optimizing Spot Instance Savings under Deadlines. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24). :185--203.
Liu B, Scott C, Tariq M, Ferguson A, Gill P, Alimi R, Alipourfard O, Arulkannan D, Beauregard VJean, Conner‎ P et al..  2024.  CAPA: An Architecture For Operating Cluster Networks With High Availability. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24). :1995--2010.
Zhang Q, Imran A, Bardhi E, Swamy T, Zhang N, Shahbaz M, Olukotun K.  2024.  Caravan: Practical Online Learning of In-Network ML Models with Labeling Agents. 18th USENIX Symposium on Operating Systems Design and Implementation (OSDI 24). :325--345.
Han T, Gong X, Liu J.  2024.  CARDSHARK: Understanding and Stablizing Linux Kernel Concurrency Bugs Against the Odds. 33rd USENIX Security Symposium (USENIX Security 24). :6203--6218.
Solt F, Ceesay-Seitz K, Razavi K.  2024.  Cascade: CPU Fuzzing via Intricate Program Generation. 33rd USENIX Security Symposium (USENIX Security 24). :5341--5358.
Rajasekaran S, Ghobadi M, Akella A.  2024.  CASSINI: Network-Aware Job Scheduling in Machine Learning Clusters. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24). :1403--1420.
Carver CJ, Schwartz H, Shao Q, Shade N, Lazzaro J, Wang X, Liu J, Fossum E, Zhou X.  2024.  Catch Me If You Can: Laser Tethering with Highly Mobile Targets. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24). :1847--1865.
Lin Z, Lin Z, Liu X, Chen J, Guo R, Chen C, Xiao S.  2024.  CDN Cannon: Exploiting CDN Back-to-Origin Strategies for Amplification Attacks. 33rd USENIX Security Symposium (USENIX Security 24). :5717--5734.
Rahman MMasfiqur, Karim I, Bertino E.  2024.  CellularLint: A Systematic Approach to Identify Inconsistent Behavior in Cellular Network Specifications. 33rd USENIX Security Symposium (USENIX Security 24). :5215--5232.
Xie Z, Emani M, Yu X, Tao D, He X, Su P, Zhou K, Vishwanath V.  2024.  Centimani: Enabling Fast AI Accelerator Selection for DNN Training with a Novel Performance Predictor. 2024 USENIX Annual Technical Conference (USENIX ATC 24). :1203--1221.
Oqaily M, Purohit H, Jarraya Y, Wang L, Nour B, Pourzandi M, Debbabi M.  2024.  ChainPatrol: Balancing Attack Detection and Classification with Performance Overhead for Service Function Chains Using Virtual Trailers. 33rd USENIX Security Symposium (USENIX Security 24). :3441--3458.
De Pasquale G, Grishchenko I, Iesari R, Pizarro G, Cavallaro L, Kruegel C, Vigna G.  2024.  ChainReactor: Automated Privilege Escalation Chain Discovery via AI Planning. 33rd USENIX Security Symposium (USENIX Security 24). :5913--5929.
Fischer K, Trummová I, Gajland P, Acar Y, Fahl S, Sasse A.  2024.  The Challenges of Bringing Cryptography from Research Papers to Products: Results from an Interview Study with Experts. 33rd USENIX Security Symposium (USENIX Security 24). :7213--7230.
Liu Y, Wan C, Du K, Hoffmann H, Jiang J, Lu S, Maire M.  2024.  ChameleonAPI: Automatic and Efficient Customization of Neural Networks for ML Applications. 18th USENIX Symposium on Operating Systems Design and Implementation (OSDI 24). :365--386.
Hu Q, Ye Z, Wang Z, Wang G, Zhang M, Chen Q, Sun P, Lin D, Wang X, Luo Y et al..  2024.  Characterization of Large Language Model Development in the Datacenter. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24). :709--729.
Kumar AVijaya, Owens B, Bjørner N, Guan B, Yin Y, Bahl P, Singh R.  2024.  CHISEL: An optical slice of the wide-area network. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24). :859--875.
Camaioni M, Guerraoui R, Monti M, Roman P-L, Vidigueira M, Voron G.  2024.  Chop Chop: Byzantine Atomic Broadcast to the Network Limit. 18th USENIX Symposium on Operating Systems Design and Implementation (OSDI 24). :269--287.
Krauß T, Stang J, Dmitrienko A.  2024.  ClearStamp: A Human-Visible and Robust Model-Ownership Proof based on Transposed Model Training. 33rd USENIX Security Symposium (USENIX Security 24). :5269--5286.
Cherubin G, Kopf B, Paverd A, Tople S, Wutschitz L, Zanella-Béguelin S.  2024.  Closed-Form Bounds for DP-SGD against Record-level Inference Attacks. 33rd USENIX Security Symposium (USENIX Security 24). :4819--4836.

Pages