Biblio

Export 12686 results:
2024
Schröder RLeander, Gast S, Guo Q.  2024.  Divide and Surrender: Exploiting Variable Division Instruction Timing in HQC Key Recovery Attacks. 33rd USENIX Security Symposium (USENIX Security 24). :6669--6686.
Wu B, Zhu R, Zhang Z, Sun P, Liu X, Jin X.  2024.  dLoRA: Dynamically Orchestrating Requests and Adapters for LoRA LLM Serving. 18th USENIX Symposium on Operating Systems Design and Implementation (OSDI 24). :911--927.
Wang X, Shen W, Bu Y, Zhou J, Zhou Y.  2024.  DMAAUTH: A Lightweight Pointer Integrity-based Secure Architecture to Defeat DMA Attacks. 33rd USENIX Security Symposium (USENIX Security 24). :1081--1098.
Wang S, Hu H, Chang J, Zhao BZi Hao, Chen QAlfred, Xue M.  2024.  DNN-GP: Diagnosing and Mitigating Model's Faults Using Latent Concepts. 33rd USENIX Security Symposium (USENIX Security 24). :1297--1314.
Wu C, Zeng Q.  2024.  Do You See How I Pose? Using Poses as an Implicit Authentication Factor for QR Code Payment 33rd USENIX Security Symposium (USENIX Security 24). :4571--4588.
Cuevas A, Christin N.  2024.  Does Online Anonymous Market Vendor Reputation Matter? 33rd USENIX Security Symposium (USENIX Security 24). :4641--4656.
Huang C, Wang N, Wang Z, Sun S, Li L, Chen J, Zhao Q, Han J, Yang Z, Shi L.  2024.  DONAPI: Malicious NPM Packages Detector using Behavior Sequence Knowledge Mapping. 33rd USENIX Security Symposium (USENIX Security 24). :3765--3782.
Yu Z, Liu X, Liang S, Cameron Z, Xiao C, Zhang N.  2024.  Don't Listen To Me: Understanding and Exploring Jailbreak Prompts of Large Language Models. 33rd USENIX Security Symposium (USENIX Security 24). :4675--4692.
Zhai Y, Qian Z, Song C, Sridharan M, Jaeger T, Yu P, Krishnamurthy SV.  2024.  Don't Waste My Efforts: Pruning Redundant Sanitizer Checks by Developer-Implemented Type Checks. 33rd USENIX Security Symposium (USENIX Security 24). :1419--1434.
Joslin M, Wang X, Hao S.  2024.  Double Face: Leveraging User Intelligence to Characterize and Recognize AI-synthesized Faces. 33rd USENIX Security Symposium (USENIX Security 24). :1009--1026.
Wang Z, Zhu R, Zhou D, Zhang Z, Mitchell J, Tang H, Wang XF.  2024.  DPAdapter: Improving Differentially Private Deep Learning through Noise Tolerance Pre-training. 33rd USENIX Security Symposium (USENIX Security 24). :991--1008.
Wang H, Pang S, Lu Z, Rao Y, Zhou Y, Xue M.  2024.  dp-promise: Differentially Private Diffusion Probabilistic Models for Image Synthesis. 33rd USENIX Security Symposium (USENIX Security 24). :1063--1080.
Ma H, Qiao Y, Liu S, Yu S, Ni Y, Lu Q, Wu J, Zhang Y, Kim M, Xu H.  2024.  DRust: Language-Guided Distributed Shared Memory with Fine Granularity, Full Transparency, and Ultra Efficiency. 18th USENIX Symposium on Operating Systems Design and Implementation (OSDI 24). :97--115.
Aguilera MK, Burgelin C, Guerraoui R, Murat A, Xygkis A, Zablotchi I.  2024.  DSig: Breaking the Barrier of Signatures in Data Centers. 18th USENIX Symposium on Operating Systems Design and Implementation (OSDI 24). :667--685.
Xu H, Yao M, Zhang R, Dawoud MMoustafa, Park J, Saltaformaggio B.  2024.  DVa: Extracting Victims and Abuse Vectors from Android Accessibility Malware. 33rd USENIX Security Symposium (USENIX Security 24). :701--718.
Crimmins BL, Narayanan DY, Springall D, J. Halderman A.  2024.  DVSorder: Ballot Randomization Flaws Threaten Voter Privacy. 33rd USENIX Security Symposium (USENIX Security 24). :6525--6541.
Liu S, Cao D, Kim J, Abraham T, Montague P, Camtepe S, Zhang J, Xiang Y.  2024.  EaTVul: ChatGPT-based Evasion Attack Against Software Vulnerability Detection. 33rd USENIX Security Symposium (USENIX Security 24). :7357--7374.
Ko W-H, Ghosh U, Dinesha U, Wu R, Shakkottai S, Bharadia D.  2024.  EdgeRIC: Empowering Real-time Intelligent Optimization and Control in NextG Cellular Networks. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24). :1315--1330.
Bielova N, Litvine L, Nguyen A, Chammat M, Toubiana V, Hary E.  2024.  The Effect of Design Patterns on (Present and Future) Cookie Consent Decisions. 33rd USENIX Security Symposium (USENIX Security 24). :2813--2830.
Chai D, Zhang J, Yang L, Jin Y, Wang L, Chen K, Yang Q.  2024.  Efficient Decentralized Federated Singular Vector Decomposition. 2024 USENIX Annual Technical Conference (USENIX ATC 24). :1029--1047.
Wu H, Pan J, Huang P.  2024.  Efficient Exposure of Partial Failure Bugs in Distributed Systems with Inferred Abstract States. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24). :1267--1283.
Wang R, Zong W, He S, Chen X, Li Z, Dang Z.  2024.  Efficient Large Graph Processing with Chunk-Based Graph Representation Model. 2024 USENIX Annual Technical Conference (USENIX ATC 24). :1239--1255.
Chang H, Edwards B, Paul AS, Shokri R.  2024.  Efficient Privacy Auditing in Federated Learning. 33rd USENIX Security Symposium (USENIX Security 24). :307--323.
Lindenmeier C, Payer M, Busch M.  2024.  EL3XIR: Fuzzing COTS Secure Monitors. 33rd USENIX Security Symposium (USENIX Security 24). :5395--5412.
Ren Y, Ren Y, Li X, Hu Y, Li J, Lee PPC.  2024.  ELECT: Enabling Erasure Coding Tiering for LSM-tree-based Storage. 22nd USENIX Conference on File and Storage Technologies (FAST 24). :293--310.

Pages