Skip to main content
Conferences
Students
Sign in
usenix_logo_notag_white
Sign In
Conferences
Overview
Workshop Organizers
Workshop Program
Sponsorship
Instructions for Participants
Call for Papers
Past Workshops
When Cyber Met Physical
Presentations:
A Case for Enforcing App-Specific Constraints to Mobile Devices by Using Trust Leases
Fault Tolerance and the Five-Second Rule
A Case for Ending Monolithic Apps for Connected Devices