Biblio

Export 11184 results:
2022
Krishnaswamy U, Singh R, Bjørner N, Raj H.  2022.  Decentralized cloud wide-area network traffic engineering with BLASTSHIELD. 19th USENIX Symposium on Networked Systems Design and Implementation (NSDI 22). :325--338.
Burk K, Pagani F, Kruegel C, Vigna G.  2022.  Decomperson: How Humans Decompile and What We Can Learn From It. 31st USENIX Security Symposium (USENIX Security 22). :2765--2782.
Elias N, Shilane P, Sheinvald S, Yadgar G.  2022.  DedupSearch: Two-Phase Deduplication Aware Keyword Search. 20th USENIX Conference on File and Storage Technologies (FAST 22). :233--246.
Yu S, Qu Y, Hu X, Yin H.  2022.  DeepDi: Learning a Relational Graph Convolutional Network Model on Instructions for Fast and Accurate Disassembly. 31st USENIX Security Symposium (USENIX Security 22). :2709--2725.
Mink J, Luo L, Barbosa NM, Figueira O, Wang Y, Wang G.  2022.  DeepPhish: Understanding User Trust Towards Artificially Generated Profiles in Online Social Networks. 31st USENIX Security Symposium (USENIX Security 22). :1669--1686.
Park J, Kim J, Kim Y, Lee S, Mutlu O.  2022.  DeepSketch: A New Machine Learning-Based Reference Search Technique for Post-Deduplication Delta Compression. 20th USENIX Conference on File and Storage Technologies (FAST 22). :247--264.
Lou C, Jing Y, Huang P.  2022.  Demystifying and Checking Silent Semantic Violations in Large Distributed Systems. 16th USENIX Symposium on Operating Systems Design and Implementation (OSDI 22). :91--107.
Zhang Q, Li Y, Lee PPC, Xu Y, Wu S.  2022.  DEPART: Replica Decoupling for Distributed Key-Value Storage. 20th USENIX Conference on File and Storage Technologies (FAST 22). :397--412.
Luo X, Shen W, Mu S, Xu T.  2022.  DepFast: Orchestrating Code of Quorum Systems. 2022 USENIX Annual Technical Conference (USENIX ATC 22). :557--574.
Li X, Li X, Dall C, Gu R, Nieh J, Sait Y, Stockwell G.  2022.  Design and Verification of the Arm Confidential Compute Architecture. 16th USENIX Symposium on Operating Systems Design and Implementation (OSDI 22). :465--484.
Miao C, Chen M, Gupta A, Meng Z, Ye L, Xiao J, Chen J, He Z, Luo X, Wang J et al..  2022.  Detecting Ephemeral Optical Events with OpTel. 19th USENIX Symposium on Networked Systems Design and Implementation (NSDI 22). :339--353.
Gallardo A, Kim H, Li T, Bauer L, Cranor L.  2022.  Detecting iPhone Security Compromise in Simulated Stalking Scenarios: Strategies and Obstacles. Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022). :291--312.
Liang Y, Liu S, Hu H.  2022.  Detecting Logical Bugs of DBMS with Coverage-based Guidance. 31st USENIX Security Symposium (USENIX Security 22). :4309--4326.
Zhang P, Gember-Jacobson A, Zuo Y, Huang Y, Liu X, Li H.  2022.  Differential Network Analysis. 19th USENIX Symposium on Networked Systems Design and Implementation (NSDI 22). :601--615.
Gouk D, Lee S, Kwon M, Jung M.  2022.  Direct Access, High-Performance Memory Disaggregation with DirectCXL. 2022 USENIX Annual Technical Conference (USENIX ATC 22). :287--294.
Yang L, Park SJin, Alizadeh M, Kannan S, Tse D.  2022.  DispersedLedger: High-Throughput Byzantine Consensus on Variable Bandwidth Networks. 19th USENIX Symposium on Networked Systems Design and Implementation (NSDI 22). :493--512.
Bai J-J, Li T, Hu S-M.  2022.  DLOS: Effective Static Detection of Deadlocks in OS Kernels. 2022 USENIX Annual Technical Conference (USENIX ATC 22). :367--382.
Wu R, Kim T, Tian D, Bianchi A, Xu D.  2022.  DnD: A Cross-Architecture Deep Neural Network Decompiler. 31st USENIX Security Symposium (USENIX Security 22). :2135--2152.
Zibaei S, Malapaya DRinoa, Mercier B, Salehi-Abari A, Thorpe J.  2022.  Do Password Managers Nudge Secure (Random) Passwords? Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022). :581--597.
Park CJ, Bae S, Oh BS, Lee J, Lee E, Yun I, Kim Y.  2022.  DoLTEst: In-depth Downlink Negative Testing Framework for LTE Devices. 31st USENIX Security Symposium (USENIX Security 22). :1325--1342.
Bromberg Y-D, Dufour Q, Frey D, Rivière É.  2022.  Donar: Anonymous VoIP over Tor. 19th USENIX Symposium on Networked Systems Design and Implementation (NSDI 22). :249--265.
Dai M, Paccagnella R, Gomez-Garcia M, McCalpin J, Yan M.  2022.  Don't Mesh Around: Side-Channel Attacks and Mitigations on Mesh Interconnects. 31st USENIX Security Symposium (USENIX Security 22). :2857--2874.
Arp D, Quiring E, Pendlebury F, Warnecke A, Pierazzi F, Wressnegger C, Cavallaro L, Rieck K.  2022.  Dos and Don'ts of Machine Learning in Computer Security. 31st USENIX Security Symposium (USENIX Security 22). :3971--3988.
Purnal A, Turan F, Verbauwhede I.  2022.  Double Trouble: Combined Heterogeneous Attacks on Non-Inclusive Cache Hierarchies. 31st USENIX Security Symposium (USENIX Security 22). :3647--3664.
Zhou C, Yan Q, Shi Y, Sun L.  2022.  DoubleStar: Long-Range Attack Towards Depth Estimation based Obstacle Avoidance in Autonomous Systems. 31st USENIX Security Symposium (USENIX Security 22). :1885--1902.

Pages