Conferences

Search results

    TitleConferenceSpeaker(s)
    How Double-Fetch Situations turn into Double-Fetch Vulnerabilities: A Study of Double Fetches in the Linux KernelUSENIX Security '17Pengfei Wang, Jens Krinke, Kai Lu, Gen Li, Steve Dodier-Lazaro
    Walkie-Talkie: An Efficient Defense Against Passive Website Fingerprinting AttacksUSENIX Security '17Tao Wang, Ian Goldberg
    CacheD: Identifying Cache-Based Timing Channels in Production SoftwareUSENIX Security '17Shuai Wang, Pei Wang, Xiao Liu, Danfeng Zhang, Dinghao Wu
    Postmortem Program Analysis with Hardware-Enhanced Post-Crash ArtifactsUSENIX Security '17Jun Xu, Dongliang Mu, Xinyu Xing, Peng Liu, Ping Chen, Bing Mao
    PlatPal: Detecting Malicious Documents with Platform DiversityUSENIX Security '17Meng Xu, Taesoo Kim
    Attacking the Brain: Races in the SDN Control PlaneUSENIX Security '17Lei Xu, Jeff Huang, Sungmin Hong, Jialong Zhang, Guofei Gu
    Malton: Towards On-Device Non-Invasive Mobile Malware Analysis for ARTUSENIX Security '17Lei Xue, Yajin Zhou, Ting Chen, Xiapu Luo, Guofei Gu
    Dead Store Elimination (Still) Considered HarmfulUSENIX Security '17Zhaomo Yang, Brian Johannesmeyer, Anders Trier Olesen, Sorin Lerner, Kirill Levchenko
    REM: Resource-Efficient Mining for BlockchainsUSENIX Security '17Fan Zhang, Ittay Eyal, Robert Escriva, Ari Juels, Robbert van Renesse
    Seeing Through The Same Lens: Introspecting Guest Address Space At Native SpeedUSENIX Security '17Siqi Zhao, Xuhua Ding, Wen Xu, Dawu Gu
    A Privacy Analysis of Cross-device TrackingUSENIX Security '17Sebastian Zimmeck, Jie S. Li, Hyungtae Kim, Steven M. Bellovin, Tony Jebara
    Differential Privacy: From Theory to DeploymentUSENIX Security '17Abhradeep Guha Thakurta
    OSS-Fuzz - Google's continuous fuzzing service for open source softwareUSENIX Security '17Kostya Serebryany
    Data Hemorrhage, Inequality, and You: How Technology and Data Flows are Changing the Civil Liberties GameUSENIX Security '17Shankar Narayan
    When Your Threat Model Is "Everything": Defensive Security in Modern NewsroomsUSENIX Security '17Erinn Clark
    An Ant in a World of GrasshoppersUSENIX Security '17Ellen Cram Kowalczyk
    Vale: Verifying High-Performance Cryptographic Assembly CodeUSENIX Security '17Barry Bond, Chris Hawblitzel, Manos Kapritsos, K. Rustan M. Leino, Jacob R. Lorch, Bryan Parno, Ashay Rane, Srinath Setty, Laure Thompson
    A Longitudinal, End-to-End View of the DNSSEC EcosystemUSENIX Security '17Taejoong Chung, Roland van Rijswijk-Deij, Balakrishnan Chandrasekaran, David Choffnes, Dave Levin, Bruce M. Maggs, Alan Mislove, Christo Wilson
    Detecting Credential Spearphishing in Enterprise SettingsUSENIX Security '17Grant Ho, Aashish Sharma, Mobin Javed, Vern Paxson, David Wagner
    MPI: Multiple Perspective Attack Investigation with Semantic Aware Execution PartitioningUSENIX Security '17Shiqing Ma, Juan Zhai, Fei Wang, Kyu Hyung Lee, Xiangyu Zhang, Dongyan Xu
    CLKSCREW: Exposing the Perils of Security-Oblivious Energy ManagementUSENIX Security '17Adrian Tang, Simha Sethumadhavan, Salvatore Stolfo
    Loophole: Timing Attacks on Shared Event Loops in ChromeUSENIX Security '17Pepe Vila, Boris Köpf
    Performance Superpowers with Enhanced BPFUSENIX ATC '17Brendan Gregg
    Visualizing Performance with Flame GraphsUSENIX ATC '17Brendan Gregg
    Scaling Reliability at Dropbox: Our Journey towards a Distributed Ownership ModelSREcon17 AsiaSat Kriya Khalsa

Pages