USENIX supports diversity, equity, and inclusion and condemns hate and discrimination.
Biblio
Export 12149 results:
Bunshin: Compositing Security Mechanisms through Diversification. 2017 USENIX Annual Technical Conference (USENIX ATC 17). :271--283.
.
2017. CAB-Fuzz: Practical Concolic Testing Techniques for COTS Operating Systems. 2017 USENIX Annual Technical Conference (USENIX ATC 17). :689--701.
.
2017. Cache Modeling and Optimization using Miniature Simulations. 2017 USENIX Annual Technical Conference (USENIX ATC 17). :487--498.
.
2017. CacheD: Identifying Cache-Based Timing Channels in Production Software. 26th USENIX Security Symposium (USENIX Security 17). :235--252.
.
2017. CAn’t Touch This: Software-only Mitigation against Rowhammer Attacks targeting Kernel Memory. 26th USENIX Security Symposium (USENIX Security 17). :117--130.
.
2017. Can we fight social engineering attacks by social means? Assessing social salience as a means to improve phish detection Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017). :285--298.
.
2017. Canopus: Enabling Extreme-Scale Data Analytics on Big HPC Storage via Progressive Refactoring. 9th USENIX Workshop on Hot Topics in Storage and File Systems (HotStorage 17).
.
2017. The Cause of All Evils: Assessing Causality Between User Actions and Malware Activity. 10th USENIX Workshop on Cyber Security Experimentation and Test (CSET 17).
.
2017. CC-Log: Drastically Reducing Storage Requirements for Robots Using Classification and Compression. 9th USENIX Workshop on Hot Topics in Storage and File Systems (HotStorage 17).
.
2017. CCSP: Controlled Relaxation of Content Security Policies by Runtime Policy Composition. 26th USENIX Security Symposium (USENIX Security 17). :695--712.
.
2017. CHAINIAC: Proactive Software-Update Transparency via Collectively Signed Skipchains and Verified Builds. 26th USENIX Security Symposium (USENIX Security 17). :1271--1287.
.
2017. Characterizing the Nature and Dynamics of Tor Exit Blocking. 26th USENIX Security Symposium (USENIX Security 17). :325--341.
.
2017. cHash: Detection of Redundant Compilations via AST Hashing. 2017 USENIX Annual Technical Conference (USENIX ATC 17). :527--538.
.
2017. CherryPick: Adaptively Unearthing the Best Cloud Configurations for Big Data Analytics. 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17). :469--482.
.
2017. Chronix: Long Term Storage and Retrieval Technology for Anomaly Detection in Operational Data. 15th USENIX Conference on File and Storage Technologies (FAST 17). :229--242.
.
2017. Clipper: A Low-Latency Online Prediction Serving System. 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17). :613--627.
.
2017. CLKSCREW: Exposing the Perils of Security-Oblivious Energy Management. 26th USENIX Security Symposium (USENIX Security 17). :1057--1074.
.
2017. A Cloud-based Content Gathering Network. 9th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud 17).
.
2017. Comparing Educational Approaches to Secure programming: Tool vs. TA. Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017).
.
2017. Computer Security, Privacy, and DNA Sequencing: Compromising Computers with Synthesized DNA, Privacy Leaks, and More. 26th USENIX Security Symposium (USENIX Security 17). :765--779.
.
2017. Configtron: Tackling network diversity with heterogeneous configurations.. 9th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud 17).
.
2017. Constant-Time Callees with Variable-Time Callers. 26th USENIX Security Symposium (USENIX Security 17). :83--98.
.
2017. Correct by Construction Networks Using Stepwise Refinement. 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17). :683--698.
.
2017. Corroboration via Provenance Patterns. 9th USENIX Workshop on the Theory and Practice of Provenance (TaPP 2017).
.
2017. CrashMonkey: A Framework to Automatically Test File-System Crash Consistency. 9th USENIX Workshop on Hot Topics in Storage and File Systems (HotStorage 17).
.
2017.