Biblio

Export 19 results:
Filters: Author is Adrian Perrig  [Clear All Filters]
2023
Kwon J, Song J, Hur J, Perrig A.  2023.  Did the Shark Eat the Watchdog in the NTP Pool? Deceiving the NTP Pool’s Monitoring System 32nd USENIX Security Symposium (USENIX Security 23). :6151--6166.
Krähenbühl C, Wyss M, Basin D, Lenders V, Perrig A, Strohmeier M.  2023.  FABRID: Flexible Attestation-Based Routing for Inter-Domain Networks. 32nd USENIX Security Symposium (USENIX Security 23). :5755--5772.
De Vaere P, Perrig A.  2023.  Hey Kimya, Is My Smart Speaker Spying on Me? Taking Control of Sensor Privacy Through Isolation and Amnesia 32nd USENIX Security Symposium (USENIX Security 23). :2401--2418.
Duan H, Fischer R, Lou J, Liu S, Basin D, Perrig A.  2023.  RHINE: Robust and High-performance Internet Naming with E2E Authenticity. 20th USENIX Symposium on Networked Systems Design and Implementation (NSDI 23). :531--553.
Ivanov A, Rothenberger B, Dethise A, Canini M, Hoefler T, Perrig A.  2023.  SAGE: Software-based Attestation for GPU Execution. 2023 USENIX Annual Technical Conference (USENIX ATC 23). :485--499.
2022
Birge-Lee H, Wanner J, Cimaszewski GH, Kwon J, Wang L, Wirz F, Mittal P, Perrig A, Sun Y.  2022.  Creating a Secure Underlay for the Internet. 31st USENIX Security Symposium (USENIX Security 22). :2601--2618.
Smith J-P, Dolfi L, Mittal P, Perrig A.  2022.  QCSD: A QUIC Client-Side Website-Fingerprinting Defence Framework. 31st USENIX Security Symposium (USENIX Security 22). :771--789.
2021
Giuliari G, Ciussani T, Perrig A, Singla A.  2021.  ICARUS: Attacking low Earth orbit satellite networks. 2021 USENIX Annual Technical Conference (USENIX ATC 21). :317--331.
Rothenberger B, Taranov K, Perrig A, Hoefler T.  2021.  ReDMArk: Bypassing RDMA Security Mechanisms. 30th USENIX Security Symposium (USENIX Security 21). :4277--4292.
2014
Li Y, McCune J, Newsome J, Perrig A, Baker B, Drewry W.  2014.  MiniBox: A Two-Way Sandbox for x86 Native Code. 2014 USENIX Annual Technical Conference (USENIX ATC 14). :409--420.
2010
Kim THyun-Jin, Bauer L, Newsome J, Perrig A, Walker J.  2010.  Challenges in Access Right Assignment for Secure Home Networks. 5th USENIX Workshop on Hot Topics in Security (HotSec 10).
2008
Wendlandt D, Perrig A.  2008.  Perspectives: Improving SSH-style Host Authentication with Multi-Path Probing. 2008 USENIX Annual Technical Conference (USENIX ATC 08).
2006
McCune JM, Perrig A, Reiter MK.  2006.  Bump in the Ether: A Framework for Securing Sensitive User Input . 2006 USENIX Annual Technical Conference (USENIX ATC 06).
2000
Dhamija R, Perrig A.  2000.  Deja Vu--A User Study: Using Images for Authentication. 9th USENIX Security Symposium (USENIX Security 00).