Biblio

Export 12684 results:
2024
Yan J, Xu H, Liu Z, Li Q, Xu K, Xu M, Wu J.  2024.  Brain-on-Switch: Towards Advanced Intelligent Network Data Plane via NN-Driven Traffic Analysis at Line-Speed. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24). :419--440.
[Anonymous].  2024.  Breaking Espressif’s ESP32 V3: Program Counter Control with Computed Values using Fault Injection. 18th USENIX WOOT Conference on Offensive Technologies (WOOT 24). :229--243.
[Anonymous].  2024.  Bridging Barriers: A Survey of Challenges and Priorities in the Censorship Circumvention Landscape. 33rd USENIX Security Symposium (USENIX Security 24).
[Anonymous].  2024.  On Bridging the Gap between Control Flow Integrity and Attestation Schemes. 33rd USENIX Security Symposium (USENIX Security 24).
[Anonymous].  2024.  A Broad Comparative Evaluation of Software Debloating Tools. 33rd USENIX Security Symposium (USENIX Security 24).
[Anonymous].  2024.  BUDAlloc: Defeating Use-After-Free Bugs by Decoupling Virtual Address Management from Kernel. 33rd USENIX Security Symposium (USENIX Security 24).
Shu J, Qian K, Zhai E, Liu X, Jin X.  2024.  Burstable Cloud Block Storage with Data Processing Units. 18th USENIX Symposium on Operating Systems Design and Implementation (OSDI 24). :783--799.
[Anonymous].  2024.  "But they have overlooked a few things in Afghanistan:" An Analysis of the Integration of Biometric Voter Verification in the 2019 Afghan Presidential Elections. 33rd USENIX Security Symposium (USENIX Security 24).
[Anonymous].  2024.  CacheWarp: Software-based Fault Injection using Selective State Reset. 33rd USENIX Security Symposium (USENIX Security 24).
[Anonymous].  2024.  CalcuLatency: Leveraging Cross-Layer Network Latency Measurements to Detect Proxy-Enabled Abuse. 33rd USENIX Security Symposium (USENIX Security 24).
[Anonymous].  2024.  CAMP: Compiler and Allocator-based Heap Memory Protection. 33rd USENIX Security Symposium (USENIX Security 24).
[Anonymous].  2024.  CAMP: Compositional Amplification Attacks against DNS. 33rd USENIX Security Symposium (USENIX Security 24).
[Anonymous].  2024.  Can I Hear Your Face? Pervasive Attack on Voice Authentication Systems with a Single Face Image 33rd USENIX Security Symposium (USENIX Security 24).
Häring M, Grohs JAngelika, Tiefenau E, Smith M, Tiefenau C.  2024.  Can Johnny be a whistleblower? A qualitative user study of a social authentication Signal extension in an adversarial scenario Twentieth Symposium on Usable Privacy and Security (SOUPS 2024). :259--278.
[Anonymous].  2024.  Can Virtual Reality Protect Users from Keystroke Inference Attacks? 33rd USENIX Security Symposium (USENIX Security 24).
Wu Z, Chiang W-L, Mao Z, Yang Z, Friedman E, Shenker S, Stoica I.  2024.  Can't Be Late: Optimizing Spot Instance Savings under Deadlines. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24). :185--203.
Liu B, Scott C, Tariq M, Ferguson A, Gill P, Alimi R, Alipourfard O, Arulkannan D, Beauregard VJean, Conner‎ P et al..  2024.  CAPA: An Architecture For Operating Cluster Networks With High Availability. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24). :1995--2010.
Zhang Q, Imran A, Bardhi E, Swamy T, Zhang N, Shahbaz M, Olukotun K.  2024.  Caravan: Practical Online Learning of In-Network ML Models with Labeling Agents. 18th USENIX Symposium on Operating Systems Design and Implementation (OSDI 24). :325--345.
[Anonymous].  2024.  CARDSHARK: Understanding and Stablizing Linux Kernel Concurrency Bugs Against the Odds. 33rd USENIX Security Symposium (USENIX Security 24).
[Anonymous].  2024.  Cascade: CPU Fuzzing via Intricate Program Generation. 33rd USENIX Security Symposium (USENIX Security 24).
Rajasekaran S, Ghobadi M, Akella A.  2024.  CASSINI: Network-Aware Job Scheduling in Machine Learning Clusters. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24). :1403--1420.
Carver CJ, Schwartz H, Shao Q, Shade N, Lazzaro J, Wang X, Liu J, Fossum E, Zhou X.  2024.  Catch Me If You Can: Laser Tethering with Highly Mobile Targets. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24). :1847--1865.
[Anonymous].  2024.  CDN Cannon: Exploiting CDN Back-to-Origin Strategies for Amplification Attacks. 33rd USENIX Security Symposium (USENIX Security 24).
[Anonymous].  2024.  CellularLint: A Systematic Approach to Identify Inconsistent Behavior in Cellular Network Specifications. 33rd USENIX Security Symposium (USENIX Security 24).
Xie Z, Emani M, Yu X, Tao D, He X, Su P, Zhou K, Vishwanath V.  2024.  Centimani: Enabling Fast AI Accelerator Selection for DNN Training with a Novel Performance Predictor. 2024 USENIX Annual Technical Conference (USENIX ATC 24). :1203--1221.

Pages