Biblio

Export 12686 results:
2024
Oqaily M, Purohit H, Jarraya Y, Wang L, Nour B, Pourzandi M, Debbabi M.  2024.  ChainPatrol: Balancing Attack Detection and Classification with Performance Overhead for Service Function Chains Using Virtual Trailers. 33rd USENIX Security Symposium (USENIX Security 24). :3441--3458.
De Pasquale G, Grishchenko I, Iesari R, Pizarro G, Cavallaro L, Kruegel C, Vigna G.  2024.  ChainReactor: Automated Privilege Escalation Chain Discovery via AI Planning. 33rd USENIX Security Symposium (USENIX Security 24). :5913--5929.
Fischer K, Trummová I, Gajland P, Acar Y, Fahl S, Sasse A.  2024.  The Challenges of Bringing Cryptography from Research Papers to Products: Results from an Interview Study with Experts. 33rd USENIX Security Symposium (USENIX Security 24). :7213--7230.
Liu Y, Wan C, Du K, Hoffmann H, Jiang J, Lu S, Maire M.  2024.  ChameleonAPI: Automatic and Efficient Customization of Neural Networks for ML Applications. 18th USENIX Symposium on Operating Systems Design and Implementation (OSDI 24). :365--386.
Hu Q, Ye Z, Wang Z, Wang G, Zhang M, Chen Q, Sun P, Lin D, Wang X, Luo Y et al..  2024.  Characterization of Large Language Model Development in the Datacenter. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24). :709--729.
Kumar AVijaya, Owens B, Bjørner N, Guan B, Yin Y, Bahl P, Singh R.  2024.  CHISEL: An optical slice of the wide-area network. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24). :859--875.
Camaioni M, Guerraoui R, Monti M, Roman P-L, Vidigueira M, Voron G.  2024.  Chop Chop: Byzantine Atomic Broadcast to the Network Limit. 18th USENIX Symposium on Operating Systems Design and Implementation (OSDI 24). :269--287.
Krauß T, Stang J, Dmitrienko A.  2024.  ClearStamp: A Human-Visible and Robust Model-Ownership Proof based on Transposed Model Training. 33rd USENIX Security Symposium (USENIX Security 24). :5269--5286.
Cherubin G, Kopf B, Paverd A, Tople S, Wutschitz L, Zanella-Béguelin S.  2024.  Closed-Form Bounds for DP-SGD against Record-level Inference Attacks. 33rd USENIX Security Symposium (USENIX Security 24). :4819--4836.
Wooders S, Liu S, Jain P, Mo X, Gonzalez JE, Liu V, Stoica I.  2024.  Cloudcast: High-Throughput, Cost-Aware Overlay Multicast in the Cloud. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24). :281--296.
Shahid MOsama, Koch D, Raghuram J, Krishnaswamy B, Chintalapudi K, Banerjee S.  2024.  Cloud-LoRa: Enabling Cloud Radio Access LoRa Networks Using Reinforcement Learning Based Bandwidth-Adaptive Compression. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24). :1959--1976.
Frieß J, Gattermayer T, Gelernter N, Schulmann H, Waidner M.  2024.  Cloudy with a Chance of Cyberattacks: Dangling Resources Abuse on Cloud Platforms. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24). :1977--1994.
Liu C, Mera A, Kirda E, Xu M, Lu L.  2024.  CO3: Concolic Co-execution for Firmware. 33rd USENIX Security Symposium (USENIX Security 24). :5591--5608.
He H, Lin X, Weng Z, Zhao R, Gan S, Chen L, Ji Y, Wang J, Xue Z.  2024.  Code is not Natural Language: Unlock the Power of Semantics-Oriented Graph Representation for Binary Code Similarity Detection. 33rd USENIX Security Symposium (USENIX Security 24). :1759--1776.
Albayaydh W, Flechais I.  2024.  Co-Designing a Mobile App for Bystander Privacy Protection in Jordanian Smart Homes: A Step Towards Addressing a Complex Privacy Landscape. 33rd USENIX Security Symposium (USENIX Security 24). :4963--4980.
Zhang C, Xu C, Hu H, Xu J.  2024.  COLE: A Column-based Learned Storage for Blockchain Systems. 22nd USENIX Conference on File and Storage Technologies (FAST 24). :329--345.
Longo G, Strohmeier M, Russo E, Merlo A, Lenders V.  2024.  On a Collision Course: Unveiling Wireless Attacks to the Aircraft Traffic Collision Avoidance System (TCAS}}}}). 33rd USENIX Security Symposium (USENIX Security 24). :6131--6147.
Qian Y, Vef M-A, Farrell P, Dilger A, Li X, Ihara S, Fu Y, Xue W, Brinkmann A.  2024.  Combining Buffered I/O and Direct I/O in Distributed File Systems. 22nd USENIX Conference on File and Storage Technologies (FAST 24). :17--33.
Wong MYong, Landen M, Li F, Monrose F, Ahamad M.  2024.  Comparing Malware Evasion Theory with Practice: Results from Interviews with Expert Analysts. Twentieth Symposium on Usable Privacy and Security (SOUPS 2024). :61--80.
McLeod J, Zhang-Kennedy L, Stobert E.  2024.  Comparing Teacher and Creator Perspectives on the Design of Cybersecurity and Privacy Educational Resources. Twentieth Symposium on Usable Privacy and Security (SOUPS 2024). :587--603.
Bin-Yahya M, Zhao Y, Shafieirad H, Ho A, Yin S, Wang F, Li G.  2024.  Config-Snob: Tuning for the Best Configurations of Networking Protocol Stack. 2024 USENIX Annual Technical Conference (USENIX ATC 24). :749--765.
Xiao Y, Tootaghaj DZad, Dhakal A, Cao L, Sharma P, Kuzmanovic A.  2024.  Conspirator: SmartNIC-Aided Control Plane for Distributed ML Workloads. 2024 USENIX Annual Technical Conference (USENIX ATC 24). :767--784.
Song W, Cong C, Zhong H, Xue J.  2024.  Correction-based Defense Against Adversarial Video Attacks via Discretization-Enhanced Video Compressive Sensing. 33rd USENIX Security Symposium (USENIX Security 24). :3603--3620.
Yu L, Ye Y, Zhang Z, Zhang X.  2024.  Cost-effective Attack Forensics by Recording and Correlating File System Changes. 33rd USENIX Security Symposium (USENIX Security 24). :1705--1722.
Gao B, He Z, Sharma P, Kang Q, Jevdjic D, Deng J, Yang X, Yu Z, Zuo P.  2024.  Cost-Efficient Large Language Model Serving for Multi-turn Conversations with CachedAttention. 2024 USENIX Annual Technical Conference (USENIX ATC 24). :111--126.

Pages