Biblio

Export 11183 results:
2022
Chen Q, Lacomis J, Schwartz EJ, Le Goues C, Neubig G, Vasilescu B.  2022.  Augmenting Decompiler Output with Learned Variable Names and Types. 31st USENIX Security Symposium (USENIX Security 22). :4327--4343.
Afnan T, Zou Y, Mustafa M, Naseem M, Schaub F.  2022.  Aunties, Strangers, and the FBI: Online Privacy Concerns and Experiences of Muslim-American Women. Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022). :387--406.
Jiang T, Zhang G, Li Z, Zheng W.  2022.  Aurogon: Taming Aborts in All Phases for Distributed In-Memory Transactions. 20th USENIX Conference on File and Storage Technologies (FAST 22). :217--232.
Fu Q-A, Dong Y, Su H, Zhu J, Zhang C.  2022.  AutoDA: Automated Decision-based Iterative Adversarial Attacks. 31st USENIX Security Symposium (USENIX Security 22). :3557--3574.
Herley C.  2022.  Automated Detection of Automated Traffic. 31st USENIX Security Symposium (USENIX Security 22). :1615--1632.
[Anonymous].  2022.  Automated Side Channel Analysis of Media Software with Manifold Learning. 31st USENIX Security Symposium (USENIX Security 22). :4419--4436.
Pirelli S, Valentukonytė A, Argyraki K, Candea G.  2022.  Automated Verification of Network Function Binaries. 19th USENIX Symposium on Networked Systems Design and Implementation (NSDI 22). :585--600.
Du Y, Court R, Snow K, Monrose F.  2022.  Automatic Recovery of Fine-grained Compiler Artifacts at the Binary Level. 2022 USENIX Annual Technical Conference (USENIX ATC 22). :853--868.
Sun X, Luo W, Gu JTyler, Ganesan A, Alagappan R, Gasch M, Suresh L, Xu T.  2022.  Automatic Reliability Testing For Cluster Management Controllers. 16th USENIX Symposium on Operating Systems Design and Implementation (OSDI 22). :143--159.
Bollinger D, Kubicek K, Cotrini C, Basin D.  2022.  Automating Cookie Consent and GDPR Violation Detection. 31st USENIX Security Symposium (USENIX Security 22). :2893--2910.
Sanaee A, Shahinfar F, Antichi G, Stephens BE.  2022.  Backdraft: a Lossless Virtual Switch that Prevents the Slow Receiver Problem. 19th USENIX Symposium on Networked Systems Design and Implementation (NSDI 22). :1375--1392.
Shi Y, Zhang Y, Luo T, Mao X, Cao Y, Wang Z, Zhao Y, Huang Z, Yang M.  2022.  Backporting Security Patches of Web Applications: A Prototype Design and Implementation on Injection Vulnerability Patches. 31st USENIX Security Symposium (USENIX Security 22). :1993--2010.
Goyal P, Shah P, Zhao K, Nikolaidis G, Alizadeh M, Anderson TE.  2022.  Backpressure Flow Control. 19th USENIX Symposium on Networked Systems Design and Implementation (NSDI 22). :779--805.
Fang P, Gao P, Liu C, Ayday E, Jee K, Wang T, Ye Y, Liu Z, Xiao X.  2022.  Back-Propagating System Dependency Impact for Attack Investigation. 31st USENIX Security Symposium (USENIX Security 22). :2461--2478.
Bernd J, Abu-Salma R, Choy J, Frik A.  2022.  Balancing Power Dynamics in Smart Homes: Nannies' Perspectives on How Cameras Reflect and Affect Relationships. Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022). :687--706.
Albab KDak, Issa R, Varia M, Graffi K.  2022.  Batched Differentially Private Information Retrieval. 31st USENIX Security Symposium (USENIX Security 22). :3327--3344.
Wang J, Behrens D, Fu M, Oberhauser L, Oberhauser J, Lei J, Chen G, Härtig H, Chen H.  2022.  BBQ: A Block-based Bounded Queue for Exchanging Data and Profiling. 2022 USENIX Annual Technical Conference (USENIX ATC 22). :249--262.
Xing J, Hsu K-F, Qiu Y, Yang Z, Liu H, Chen A.  2022.  Bedrock: Programmable Network Support for Secure RDMA Systems. 31st USENIX Security Symposium (USENIX Security 22). :2585--2600.
Chu A, Arunasalam A, Ozmen MOzgur, Z. Celik B.  2022.  Behind the Tube: Exploitative Monetization of Content on YouTube. 31st USENIX Security Symposium (USENIX Security 22). :2171--2188.
Rostami A, Vigren M, Raza S, Brown B.  2022.  Being Hacked: Understanding Victims' Experiences of IoT Hacking. Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022). :613--631.
Zhao ZNeil, Morrison A, Fletcher CW, Torrellas J.  2022.  Binoculars: Contention-Based Side-Channel Attacks Exploiting the Page Walker. 31st USENIX Security Symposium (USENIX Security 22). :699--716.
Guo X, Han Y, Liu Z, Wang D, Jia Y, Li J.  2022.  Birds of a Feather Flock Together: How Set Bias Helps to Deanonymize You via Revealed Intersection Sizes. 31st USENIX Security Symposium (USENIX Security 22). :1487--1504.
Hof AVan't, Nieh J.  2022.  BlackBox: A Container Security Monitor for Protecting Containers on Untrusted Operating Systems. 16th USENIX Symposium on Operating Systems Design and Implementation (OSDI 22). :683--700.
Li H, Shan S, Wenger E, Zhang J, Zheng H, Zhao BY.  2022.  Blacklight: Scalable Defense for Neural Networks against Query-Based Black-Box Attacks. 31st USENIX Security Symposium (USENIX Security 22). :2117--2134.
Zhang W, Sheng E, Chang M, Panda A, Sag, iv M, Shenker S.  2022.  Blockaid: Data Access Policy Enforcement for Web Applications. 16th USENIX Symposium on Operating Systems Design and Implementation (OSDI 22). :701--718.

Pages