Biblio

Export 12149 results:
2024
[Anonymous].  2024.  FFXE: Dynamic Control Flow Graph Recovery for Embedded Firmware Binaries. 33rd USENIX Security Symposium (USENIX Security 24).
Namyar P, Arzani B, Beckett R, Segarra S, Raj H, Krishnaswamy U, Govindan R, Kandula S.  2024.  Finding Adversarial Inputs for Heuristics using Multi-level Optimization. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24).
[Anonymous].  2024.  Finding Traceability Attacks in the Bluetooth Low Energy Specification and Its Implementations. 33rd USENIX Security Symposium (USENIX Security 24).
[Anonymous].  2024.  Fingerprinting Obfuscated Proxy Traffic with Encapsulated TLS Handshakes. 33rd USENIX Security Symposium (USENIX Security 24).
Li W, He X, Liu Y, Li K, Chen K, Ge Z, Guan Z, Qi H, Zhang S, Liu G.  2024.  Flow Scheduling with Imprecise Knowledge. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24). :95--111.
[Anonymous].  2024.  FraudWhistler: A Resilient, Robust and Plug-and-play Adversarial Example Detection Method for Speaker Recognition. 33rd USENIX Security Symposium (USENIX Security 24).
Sivaraman V, Karimi P, Venkatapathy V, Khani M, Fouladi S, Alizadeh M, Durand F, Sze V.  2024.  Gemino: Practical and Robust Neural Compression for Video Conferencing. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24). :569--590.
[Anonymous].  2024.  Go Go Gadget Hammer: Flipping Nested Pointers for Arbitrary Data Leakage. 33rd USENIX Security Symposium (USENIX Security 24).
Cheng Y, Zhang Z, Li H, Arapin A, Zhang Y, Zhang Q, Liu Y, Du K, Zhang X, Yan FY et al..  2024.  GRACE: Loss-Resilient Real-Time Video through Neural Codecs. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24). :509--531.
Zhang A, Wang C, Hu Y, Hassan A, Zhang Z, Han B, Qian F, Xu S.  2024.  Habitus: Boosting Mobile Immersive Content Delivery through Full-body Pose Tracking and Multipath Networking. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24).
Meng Z, Kong X, Chen J, Wang B, Xu M, Han R, Liu H, Arun V, Hu H, Wei X.  2024.  Hairpin: Rethinking Packet Loss Recovery in Edge-based Interactive Video Streaming. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24).
Lou J, Kong X, Huang J, Bai W, Kim NSung, Zhuo D.  2024.  Harmonic: Hardware-assisted RDMA Performance Isolation for Public Clouds. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24).
Agarwal S, Cai Q, Agarwal R, Shmoys D, Vahdat A.  2024.  Harmony: A Congestion-free Datacenter Architecture. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24). :329--343.
Qiao Y, Ruan Z, Ma H, Belay A, Kim M, Xu H.  2024.  Harvesting Idle Memory for Application-managed Soft State with Midas. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24).
[Anonymous].  2024.  Hermes: Unlocking Security Analysis of Cellular Network Protocols by Synthesizing Finite State Machines from Natural Language Specifications. 33rd USENIX Security Symposium (USENIX Security 24).
[Anonymous].  2024.  A High Coverage Cybersecurity Scale Predictive of User Behavior. 33rd USENIX Security Symposium (USENIX Security 24).
Blach N, Besta M, De Sensi D, Domke J, Harake H, Li S, Iff P, Konieczny M, Lakhotia K, Kubicek A et al..  2024.  A High-Performance Design, Implementation, Deployment, and Evaluation of The Slim Fly Network. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24).
[Anonymous].  2024.  Hijacking Attacks against Neural Network by Analyzing Training Data. 33rd USENIX Security Symposium (USENIX Security 24).
Yassini P, Diab K, Mahloujifar S, Hefeeda M.  2024.  Horus: Granular In-Network Task Scheduler for Cloud Datacenters. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24). :1--22.
[Anonymous].  2024.  How WEIRD is Usable Privacy and Security Research? 33rd USENIX Security Symposium (USENIX Security 24).
[Anonymous].  2024.  "I Don't Know If We're Doing Good. I Don't Know If We're Doing Bad": Investigating How Practitioners Scope, Motivate, and Conduct Privacy Work When Developing AI Products. 33rd USENIX Security Symposium (USENIX Security 24).
Zhu Z, Zhao Y, Liu Z.  2024.  In-Memory Key-Value Store Live Migration with NetMigrate. 22nd USENIX Conference on File and Storage Technologies (FAST 24). :209--224.
Curtis-Maury M, Kesavan R, R BV, Mattankot N, Fang V, Trivedi Y, Mishra K, Li Q.  2024.  I/O in a Flash: Evolution of ONTAP to Low-Latency SSDs. 22nd USENIX Conference on File and Storage Technologies (FAST 24). :177--192.
Joshi K, Gupta A, Gonzalez J, Kumar A, Reddy KKanth, George A, Lund S, Axboe J.  2024.  I/O Passthru: Upstreaming a flexible and efficient I/O Path in Linux. 22nd USENIX Conference on File and Storage Technologies (FAST 24). :107--121.
Xu Y, Zhu H, Pandey P, Conway A, Johnson R, Ganesan A, Alagappan R.  2024.  IONIA: High-Performance Replication for Modern Disk-based KV Stores. 22nd USENIX Conference on File and Storage Technologies (FAST 24). :225--241.

Pages