Multimedia

Search results

    TitleConferenceSpeaker(s)
    Efficient Memory Overcommitment for I/O Passthrough Enabled VMs via Fine-grained Page Meta-data ManagementUSENIX ATC '23Yaohui Wang, Ben Luo, Yibin Shen
    Pinolo: Detecting Logical Bugs in Database Management Systems with Approximate Query SynthesisUSENIX ATC '23Zongyin Hao, Quanfeng Huang, Chengpeng Wang, Jianfeng Wang, Yushan Zhang, Rongxin Wu, Charles Zhang
    Global Capacity Management With FluxOSDI '23Marius Eriksen, Kaushik Veeraraghavan, Yusuf Abdulghani, Andrew Birchall, Po-Yen Chou, Richard Cornew, Adela Kabiljo, Ranjith Kumar S, Maroo Lieuw, Justin Meza, Scott Michelson, Thomas Rohloff, Hayley Russell, Jeff Qin, Chunqiang Tang
    FedVal: Different good or different bad in federated learningUSENIX Security '23Viktor Valadi, Xinchi Qiu, Pedro Porto Buarque de Gusmão, Nicholas D. Lane, Mina Alibeigi
    How Effective is Multiple-Vantage-Point Domain Control Validation?USENIX Security '23Grace H. Cimaszewski, Henry Birge-Lee, Liang Wang, Jennifer Rexford, Prateek Mittal
    Bypassing Tunnels: Leaking VPN Client Traffic by Abusing Routing TablesUSENIX Security '23Nian Xue, Yashaswi Malla, Zihang Xia, Christina Pöpper, Mathy Vanhoef
    Auditing Frameworks Need Resource Isolation: A Systematic Study on the Super Producer Threat to System Auditing and Its MitigationUSENIX Security '23Peng Jiang, Ruizhe Huang, Ding Li, Yao Guo, Xiangqun Chen, Jianhai Luan, Yuxin Ren, Xinwei Hu
    MobileAtlas: Geographically Decoupled Measurements in Cellular Networks for Security and Privacy ResearchUSENIX Security '23Gabriel K. Gegenhuber, Wilfried Mayer, Edgar Weippl, Adrian Dabrowski
    Improving Logging to Reduce Permission Over-Granting MistakesUSENIX Security '23Bingyu Shen, Tianyi Shan, Yuanyuan Zhou
    Automata-Guided Control-Flow-Sensitive Fuzz Driver GenerationUSENIX Security '23
    Cross Container Attacks: The Bewildered eBPF on CloudsUSENIX Security '23Yi He, Roland Guo, Yunlong Xing, Xijia Che, Kun Sun, Zhuotao Liu, Ke Xu, Qi Li
    Pushed by Accident: A Mixed-Methods Study on Strategies of Handling Secret Information in Source Code RepositoriesUSENIX Security '23Alexander Krause, Jan H. Klemmer, Nicolas Huaman, Dominik Wermke, Yasemin Acar, Sascha Fahl
    You've Got Report: Measurement and Security Implications of DMARC ReportingUSENIX Security '23Md. Ishtiaq Ashiq, Weitong Li, Tobias Fiebig, Taejoong Chung
    “Employees Who Don’t Accept the Time Security Takes Are Not Aware Enough”: The CISO View of Human-Centred SecurityUSENIX Security '23Jonas Hielscher, Uta Menges, Simon Parkin, Annette Kluge, M. Angela Sasse
    Framing Frames: Bypassing Wi-Fi Encryption by Manipulating Transmit QueuesUSENIX Security '23Domien Schepers, Aanjhan Ranganathan, Mathy Vanhoef
    Network Detection of Interactive SSH Impostors Using Deep LearningUSENIX Security '23Julien Piet, Aashish Sharma, Vern Paxson, David Wagner
    Detecting Multi-Step IAM Attacks in AWS Environments via Model CheckingUSENIX Security '23Ilia Shevrin, Oded Margalit
    Formal Analysis of Session-Handling in Secure Messaging: Lifting Security from Sessions to ConversationsUSENIX Security '23Cas Cremers, Charlie Jacomme, Aurora Naska
    Union under Duress: Understanding Hazards of Duplicate Resource Mismediation in Android Software Supply ChainUSENIX Security '23Xueqiang Wang, Yifan Zhang, XiaoFeng Wang, Yan Jia, Luyi Xing
    Efficient 3PC for Binary Circuits with Application to Maliciously-Secure DNN InferenceUSENIX Security '23Yun Li, Yufei Duan, Zhicong Huang, Cheng Hong, Chao Zhang, Yifan Song
    Systematic Assessment of Fuzzers using Mutation AnalysisUSENIX Security '23Philipp Görz, Björn Mathis, Keno Hassler, Emre Güler, Thorsten Holz, Andreas Zeller, Rahul Gopinath
    Automated Exploitable Heap Layout Generation for Heap Overflows Through Manipulation Distance-Guided FuzzingUSENIX Security '23Bin Zhang, Jiongyi Chen, Runhao Li, Chao Feng, Ruilin Li, Chaojing Tang
    We Really Need to Talk About Session Tickets: A Large-Scale Analysis of Cryptographic Dangers with TLS Session TicketsUSENIX Security '23Sven Hebrok, Simon Nachtigall, Marcel Maehren, Nurullah Erinola, Robert Merget, Juraj Somorovsky, Jörg Schwenk
    An Efficient Design of Intelligent Network Data PlaneUSENIX Security '23Guangmeng Zhou, Zhuotao Liu, Chuanpu Fu, Qi Li, Ke Xu
    Side-Channel Attacks on Optane Persistent MemoryUSENIX Security '23Sihang Liu, Suraaj Kanniwadi, Martin Schwarzl, Andreas Kogler, Daniel Gruss, Samira Khan

Pages