Conferences

Search results

    TitleConferenceSpeaker(s)
    Gyrophone: Recognizing Speech from Gyroscope SignalsUSENIX Security '14Yan Michalevsky, Dan Boneh, Gabi Nakibly
    LibFTE: A Toolkit for Constructing Practical, Format-Abiding Encryption SchemesUSENIX Security '14Daniel Luchaup, Kevin P. Dyer, Somesh Jha, Thomas Ristenpart, Thomas Shrimpton
    TRUESET: Faster Verifiable Set ComputationsUSENIX Security '14Ahmed E. Kosba, Dimitrios Papadopoulos, Charalampos Papamanthou, Mahmoud F. Sayed, Elaine Shi, Nikos Triandopoulos
    Security Audit of Safeplug "Tor in a Box"FOCI '14Anne Edmundson, Anna Kornfeld Simpson, Joshua A. Kroll, Edward W. Felten
    Gleaner: Mitigating the Blocked-Waiter Wakeup Problem for Virtualized Multicore ApplicationsUSENIX ATC '14Xiaoning Ding, Phillip B. Gibbons, Michael A. Kozuch, Jianchen Shan
    Accelerating Restore and Garbage Collection in Deduplication-based Backup Systems via Exploiting Historical InformationUSENIX ATC '14Min Fu, Dan Feng, Yu Hua, Xubin He, Zuoning Chen, Wen Xia, Fangting Huang, Qing Liu
    Medusa: Managing Concurrency and Communication in Embedded SystemsUSENIX ATC '14Thomas W. Barr, Scott Rixner
    Pythia: Diagnosing Performance Problems in Wide Area ProvidersUSENIX ATC '14Partha Kanuparthy, Constantine Dovrolis
    Efficient Tracing of Cold Code via Bias-Free SamplingUSENIX ATC '14Baris Kasikci, Thomas Ball, George Candea, John Erickson, Madanlal Musuvathi
    MiniBox: A Two-Way Sandbox for x86 Native CodeUSENIX ATC '14Yanlin Li, Jonathan McCune, James Newsome, Adrian Perrig, Brandon Baker, Will Drewry
    The Fun and Future of CTF3GSE '14Andy Davis, Tim Leek, Michael Zhivich, Kyle Gwinnup, William Leonard
    A Case Study in Helping Students to Covertly Eat Their Classmates3GSE '14Roya Ensafi, Mike Jacobi, Jedidiah R. Crandall
    Practical Lessons from Creating the Control-Alt-Hack Card Game and Research Challenges for Games In Education and Research 3GSE '14Tamara Denning, Adam Shostack, Tadayoshi Kohno
    Ten Years of iCTF: The Good, The Bad, and The Ugly3GSE '14Giovanni Vigna, Kevin Borgolte, Jacopo Corbetta, Adam Doupe, Yanick Fratantonio, Luca Invernizzi, Dhilung Kirat, Yan Shoshitaishvili
    PicoCTF: A Game-Based Computer Security Competition for High School Students3GSE '14Peter Chapman, Jonathan Burket, David Brumley
    Class Capture-the-Flag Exercises3GSE '14Jelena Mirkovic, Peter A. H. Peterson
    SecurityEmpire: Development and Evaluation of a Digital Game to Promote Cybersecurity Education3GSE '14Marc Olano, Alan Sherman, Linda Oliva, Ryan Cox, Deborah Firestone, Oliver Kubik, Milind Patil, John Seymour, Isaac Sohn, Donna Thomas
    An Argument for Game Balance: Improving Student Engagement by Matching Difficulty Level with Learner Readiness3GSE '14Portia Pusey, David Tobey, Sr., Ralph Soule
    Elevation of Privilege: Drawing Developers into Threat Modeling3GSE '14Adam Shostack
    CyberCIEGE Scenario Design and Implementation3GSE '14Michael F. Thompson, Cynthia E. Irvine
    Learning Obstacles in the Capture The Flag Model 3GSE '14Kevin Chung, Julian Cohen
    On the Importance of Evaluating Storage Systems’ $CostsHotStorage '14Zhichao Li, Amanpreet Mukker, Erez Zadok
    Accelerating External Sorting via On-the-fly Data Merge in Active SSDsHotStorage '14Young-Sik Lee, Luis Cavazos Quero, Youngjae Lee, Jin-Soo Kim, Seungryoul Maeng
    Mobile App Acceleration via Fine-Grain Offloading to the CloudHotCloud '14Chit-Kwan Lin, H. T. Kung
    The Case for System Testing with Swift Hierarchical VM ForkHotCloud '14Junji Zhi, Sahil Suneja, Eyal de Lara

Pages