Biblio

Export 12149 results:
2017
Xu M, Lu K, Kim T, Lee W.  2017.  Bunshin: Compositing Security Mechanisms through Diversification. 2017 USENIX Annual Technical Conference (USENIX ATC 17). :271--283.
Kim SYong, Lee S, Yun I, Xu W, Lee B, Yun Y, Kim T.  2017.  CAB-Fuzz: Practical Concolic Testing Techniques for COTS Operating Systems. 2017 USENIX Annual Technical Conference (USENIX ATC 17). :689--701.
Waldspurger C, Saemundsson T, Ahmad I, Park N.  2017.  Cache Modeling and Optimization using Miniature Simulations. 2017 USENIX Annual Technical Conference (USENIX ATC 17). :487--498.
Wang S, Wang P, Liu X, Zhang D, Wu D.  2017.  CacheD: Identifying Cache-Based Timing Channels in Production Software. 26th USENIX Security Symposium (USENIX Security 17). :235--252.
Brasser F, Davi L, Gens D, Liebchen C, Sadeghi A-R.  2017.  CAn’t Touch This: Software-only Mitigation against Rowhammer Attacks targeting Kernel Memory. 26th USENIX Security Symposium (USENIX Security 17). :117--130.
Nicholson J, Coventry L, Briggs P.  2017.  Can we fight social engineering attacks by social means? Assessing social salience as a means to improve phish detection Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017). :285--298.
Lu T, Suchyta E, Choi J, Podhorszki N, Klasky S, Liu Q, Pugmire D, Wolf M, Ainsworth M.  2017.  Canopus: Enabling Extreme-Scale Data Analytics on Big HPC Storage via Progressive Refactoring. 9th USENIX Workshop on Hot Topics in Storage and File Systems (HotStorage 17).
Mariconti E, Onaolapo J, Ross G, Stringhini G.  2017.  The Cause of All Evils: Assessing Causality Between User Actions and Malware Activity. 10th USENIX Workshop on Cyber Security Experimentation and Test (CSET 17).
Gonzalez S, Chidambaram V, Sinapov J, Stone P.  2017.  CC-Log: Drastically Reducing Storage Requirements for Robots Using Classification and Compression. 9th USENIX Workshop on Hot Topics in Storage and File Systems (HotStorage 17).
Calzavara S, Rabitti A, Bugliesi M.  2017.  CCSP: Controlled Relaxation of Content Security Policies by Runtime Policy Composition. 26th USENIX Security Symposium (USENIX Security 17). :695--712.
Nikitin K, Kokoris-Kogias E, Jovanovic P, Gailly N, Gasser L, Khoffi I, Cappos J, Ford B.  2017.  CHAINIAC: Proactive Software-Update Transparency via Collectively Signed Skipchains and Verified Builds. 26th USENIX Security Symposium (USENIX Security 17). :1271--1287.
Singh R, Nithyanand R, Afroz S, Pearce P, Tschantz MCarl, Gill P, Paxson V.  2017.  Characterizing the Nature and Dynamics of Tor Exit Blocking. 26th USENIX Security Symposium (USENIX Security 17). :325--341.
Dietrich C, Rothberg V, Füracker L, Ziegler A, Lohmann D.  2017.  cHash: Detection of Redundant Compilations via AST Hashing. 2017 USENIX Annual Technical Conference (USENIX ATC 17). :527--538.
Alipourfard O, Liu HHarry, Chen J, Venkataraman S, Yu M, Zhang M.  2017.  CherryPick: Adaptively Unearthing the Best Cloud Configurations for Big Data Analytics. 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17). :469--482.
Lautenschlager F, Philippsen M, Kumlehn A, Adersberger J.  2017.  Chronix: Long Term Storage and Retrieval Technology for Anomaly Detection in Operational Data. 15th USENIX Conference on File and Storage Technologies (FAST 17). :229--242.
Crankshaw D, Wang X, Zhou G, Franklin MJ, Gonzalez JE, Stoica I.  2017.  Clipper: A Low-Latency Online Prediction Serving System. 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17). :613--627.
Tang A, Sethumadhavan S, Stolfo S.  2017.  CLKSCREW: Exposing the Perils of Security-Oblivious Energy Management. 26th USENIX Security Symposium (USENIX Security 17). :1057--1074.
Bhattacherjee D, Tirmazi M, Singla A.  2017.  A Cloud-based Content Gathering Network. 9th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud 17).
[Anonymous].  2017.  Comparing Educational Approaches to Secure programming: Tool vs. TA. Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017).
Ney P, Koscher K, Organick L, Ceze L, Kohno T.  2017.  Computer Security, Privacy, and DNA Sequencing: Compromising Computers with Synthesized DNA, Privacy Leaks, and More. 26th USENIX Security Symposium (USENIX Security 17). :765--779.
Naseer U, Benson T.  2017.  Configtron: Tackling network diversity with heterogeneous configurations.. 9th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud 17).
García CPereida, Brumley BBob.  2017.  Constant-Time Callees with Variable-Time Callers. 26th USENIX Security Symposium (USENIX Security 17). :83--98.
Ryzhyk L, Bjørner N, Canini M, Jeannin J-B, Schlesinger C, Terry DB, Varghese G.  2017.  Correct by Construction Networks Using Stepwise Refinement. 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17). :683--698.
Barakat L, Taylor P, Griffiths N, Miles S.  2017.  Corroboration via Provenance Patterns. 9th USENIX Workshop on the Theory and Practice of Provenance (TaPP 2017).
Martinez A, Chidambaram V.  2017.  CrashMonkey: A Framework to Automatically Test File-System Crash Consistency. 9th USENIX Workshop on Hot Topics in Storage and File Systems (HotStorage 17).

Pages