Conferences

Search results

    TitleConferenceSpeaker(s)
    Profiling Node ApplicationsSREcon17 EuropeSasha Goldshtein
    Want to Solve Over-Monitoring and Alert Fatigue? Create the Right Incentives!SREcon17 EuropeKishore Jalleda
    Make Haste Slowly: Balancing SRE Diligence in Urgency Driven OrganizationsSREcon17 EuropeJason Hiltz-Laforge
    SRE Your gRPC—Building Reliable Distributed Systems (Illustrated with GRPC)SREcon17 EuropeGrainne Sheerin, Gabe Krabbe
    Globalizing SRE in a Walkup CultureSREcon17 EuropeBill Lincoln, Matt Coleman
    Diversity and Inclusion in SRE: A PostmortemSREcon17 EuropeNiall Richard Murphy
    Care and Feeding of SRESREcon17 EuropeNarayan Desai
    Lightning Talks VideoSREcon17 Europe
    Understanding the Mirai BotnetUSENIX Security '17Manos Antonakakis, Tim April, Michael Bailey, Matt Bernhard, Elie Bursztein, Jaime Cochran, Zakir Durumeric, J. Alex Halderman, Luca Invernizzi, Michalis Kallitsis, Deepak Kumar, Chaz Lever, Zane Ma, Joshua Mason, Damian Menscher, Chad Seaman, Nick Sullivan, Kurt Thomas, Yi Zhou
    BLENDER: Enabling Local Search with a Hybrid Differential Privacy ModelUSENIX Security '17Brendan Avent, Aleksandra Korolova, David Zeber, Torgeir Hovden, Benjamin Livshits
    Picking Up My Tab: Understanding and Mitigating Synchronized Token Lifting and Spending in Mobile PaymentUSENIX Security '17Xiaolong Bai, Zhe Zhou, XiaoFeng Wang, Zhou Li, Xianghang Mi, Nan Zhang, Tongxin Li, Shi-Min Hu, Kehuan Zhang
    Predicting the Resilience of Obfuscated Code Against Symbolic Execution Attacks via Machine LearningUSENIX Security '17Sebastian Banescu, Christian Collberg, Alexander Pretschner
    See No Evil, Hear No Evil, Feel No Evil, Print No Evil? Malicious Fill Patterns Detection in Additive ManufacturingUSENIX Security '17Christian Bayens, Tuan Le, Luis Garcia, Raheem Beyah, Mehdi Javanmard, Saman Zonouz
    MCMix: Anonymous Messaging via Secure Multiparty ComputationUSENIX Security '17Nikolaos Alexopoulos, Aggelos Kiayias, Riivo Talviste, Thomas Zacharias
    Venerable Variadic Vulnerabilities VanquishedUSENIX Security '17Priyam Biswas, Alessandro Di Federico, Scott A. Carr, Prabhu Rajasekaran, Stijn Volckaert, Yeoul Na, Michael Franz, Mathias Payer
    Syntia: Synthesizing the Semantics of Obfuscated CodeUSENIX Security '17Tim Blazytko, Moritz Contag, Cornelius Aschermann, Thorsten Holz
    Game of Registrars: An Empirical Analysis of Post-Expiration Domain Name TakeoversUSENIX Security '17Tobias Lauinger, Abdelberi Chaabane, Ahmet Salih Buyukkayhan, Kaan Onarlioglu, William Robertson
    CCSP: Controlled Relaxation of Content Security Policies by Runtime Policy CompositionUSENIX Security '17Stefano Calzavara, Alvise Rabitti, Michele Bugliesi
    Adaptive Android Kernel Live PatchingUSENIX Security '17Yue Chen, Yulong Zhang, Zhi Wang, Liangzhao Xia, Chenfu Bao, Tao Wei
    Neural Nets Can Learn Function Type Signatures From BinariesUSENIX Security '17Zheng Leong Chua, Shiqi Shen, Prateek Saxena, Zhenkai Liang
    Oscar: A Practical Page-Permissions-Based Scheme for Thwarting Dangling PointersUSENIX Security '17Thurston H.Y. Dang, Petros Maniatis, David Wagner
    Efficient Protection of Path-Sensitive Control SecurityUSENIX Security '17Ren Ding, Chenxiong Qian, Chengyu Song, Bill Harris, Taesoo Kim, Wenke Lee
    Prime+Abort: A Timer-Free High-Precision L3 Cache Attack using Intel TSXUSENIX Security '17Craig Disselkoen, David Kohlbrenner, Leo Porter, Dean Tullsen
    Ensuring Authorized Updates in Multi-user Database-Backed ApplicationsUSENIX Security '17Kevin Eykholt, Atul Prakash, Barzan Mozafari
    Measuring HTTPS Adoption on the WebUSENIX Security '17Adrienne Porter Felt, Richard Barnes, April King, Chris Palmer, Chris Bentzel, Parisa Tabriz

Pages