Skip to main content
Conferences
Students
Sign in
Get more
Help Promote graphics!
Twitter
Facebook
LinkedIn
Google+
YouTube
Tweets by @usenix
Event Code of Conduct
Conference Network Policy
Statement on Environmental Responsibility Policy
Tweet
connect with us
Presentations:
How to Phone Home with Someone Else’s Phone: Information Exfiltration Using Intentional Sound Noise on Gyroscopic Sensors
Eavesdropping on Fine-Grained User Activities Within Smartphone Apps Over Encrypted Network Traffic
Hardware-Assisted Rootkits: Abusing Performance Counters on the ARM and x86 Architectures
connect with us