Search results

    Revitalizing the Forgotten On-Chip DMA to Expedite Data Movement in NVM-based Storage SystemsFAST '23Jingbo Su, Jiahao Li, Luofan Chen, Cheng Li, Kai Zhang, Liang Yang, Yinlong Xu
    SMRSTORE: A Storage Engine for Cloud Object Storage on HM-SMR DrivesFAST '23Su Zhou, Erci Xu, Hao Wu, Yu Du, Jiacheng Cui, Wanyu Fu, Chang Liu, Yingni Wang, Wenbo Wang, Shouqu Sun, Xianfei Wang, Bo Feng, Biyun Zhu, Xin Tong, Weikang Kong, Linyan Liu, Zhongjie Wu, Jinbo Wu, Qingchao Luo, Jiesheng Wu
    Multi-view Feature-based SSD Failure Prediction: What, When, and WhyFAST '23Yuqi Zhang, Wenwen Hao, Ben Niu, Kangkang Liu, Shuyang Wang, Na Liu, Xing He, Yongwong Gwon, Chankyu Koh
    Integrated Host-SSD Mapping Table Management for Improving User Experience of SmartphonesFAST '23Yoona Kim, Inhyuk Choi, Juhyung Park, Jaeheon Lee, Sungjin Lee, Jihong Kim
    The Very Hungry Defender: Metamorphosing Security Decision-Making by Incorporating Opportunity CostEnigma 2023Kelly Shortridge
    The Slippery Slope of Cybersecurity AnalogiesEnigma 2023Josiah Dykstra
    Myths and Lies in InfoSecEnigma 2023Adrian Sanabria
    True Crime Journalism: CyberEnigma 2023Joseph Menn, Lily Hay Newman, Alfred Ng
    Building an Automated Machine for Discovering Privacy Violations at ScaleEnigma 2023Suchakra Sharma
    Technical Metamorphosis: The 3 Stages of DSAR AutomationEnigma 2023Alon Levy
    Meaningful Hardware Privacy for a Smart and Augmented FutureEnigma 2023Marcus Hodges
    Privacy Policies, by Lawyers, for Lawyers. What about Everyone Else? HotSec '19
    Enigma 2023
    Hannah Poteat, Holly Hogan, Miju Han, Emily Jones, Gabriela Zanfir-Fortuna
    Open Source Software and Journalism: Field Notes from a Global PerspectiveEnigma 2023Harlo Holmes
    So You're Going to Blow the Whistle? Communications Dos and Don'ts for Whistleblowers.Enigma 2023Emily Schwartz
    Protecting Whistleblower InformationEnigma 2023Shanna Devine
    Understanding Trust and Security Processes in the Open Source Software EcosystemEnigma 2023Dominik Wermke
    Why Is Our Security Research Failing? Five Practices to Change!Enigma 2023Marcus Botacin
    What Public Interest AI Auditors Can Learn from Security Testing: Legislative and Practical WinsEnigma 2023Justin Brookman
    Metric Perversity and Bad Decision-MakingEnigma 2023Lea Kissner
    The Not Fake News HourEnigma 2023Riana Pfefferkorn
    A New Process to Tackle Misinformation on Social Media: Prevalence-Based GradationEnigma 2023Kamesh Shekar
    Characterizing and Measuring Misleading and Harmful Online Ad Content at ScaleEnigma 2023Eric Zeng
    How the Internet Improves HumanityEnigma 2023Eric Goldman
    Fireside Chat: The State of Memory Safety Enigma 2023Amira Dhalla, Yael Grauer, Alex Gaynor, Josh Aas
    Spotting the Differences: Quirks of Machine Learning (in) SecurityEnigma 2023Fabrício Ceschin