Conferences

Search results

    TitleConferenceSpeaker(s)
    Poncho: Enabling Smart Administration of Full Private CloudsLISA '13Scott Devoid, Narayan Desai, Lorin Hochstein
    Making Problem Diagnosis Work for Large-Scale, Production Storage SystemsLISA '13Michael P. Kasick, Priya Narasimhan, Kevin Harms
    dsync: Efficient Block-wise Synchronization of Multi-Gigabyte Binary DataLISA '13Thomas Knauth, Christof Fetzer
    Surveillance, the NSA, and EverythingLISA '13Bruce Schneier
    Why Attend LISA '13?LISA '13
    OSv: A New Open Source Operating System Designed for the CloudLISA '13
    Systems PerformanceLISA '13Brendan Gregg
    LISA '13 Opening Remarks and AwardsLISA '13Narayan Desai, Kent Skaar
    Greystar: Fast and Accurate Detection of SMS Spam Numbers in Large Cellular Networks Using Gray Phone SpaceUSENIX Security '13Nan Jiang, Yu Jin, Ann Skudlark, Zhi-Li Zhang
    Practical Comprehensive Bounds on Surreptitious Communication over DNSUSENIX Security '13Vern Paxson, Mihai Christodorescu, Mobin Javed, Josyula Rao, Reiner Sailer, Douglas Lee Schales, Mark Stoecklin, Kurt Thomas, Wietse Venema, Nicholas Weaver
    Let Me Answer That for You: Exploiting Broadcast Information in Cellular NetworksUSENIX Security '13Nico Golde, Kevin Redon, Jean-Pierre Seifert
    Trafficking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and AbuseUSENIX Security '13Kurt Thomas, Damon McCoy, Chris Grier, Alek Kolcz, Vern Paxson
    Impression Fraud in On-line Advertising via Pay-Per-View NetworksUSENIX Security '13Kevin Springborn, Paul Barford
    The Velocity of Censorship: High-Fidelity Detection of Microblog Post DeletionsUSENIX Security '13Tao Zhu, David Phipps, Adam Pridgen, Jedidiah R. Crandall, Dan S. Wallach
    Securing Embedded User Interfaces: Android and BeyondUSENIX Security '13Franziska Roesner, Tadayoshi Kohno
    Flexible and Fine-grained Mandatory Access Control on Android for Diverse Security and Privacy PoliciesUSENIX Security '13Sven Bugiel, Stephen Heuser, Ahmad-Reza Sadeghi
    Proactively Accountable Anonymous Messaging in VerdictUSENIX Security '13Henry Corrigan-Gibbs, David Isaac Wolinsky, Bryan Ford
    ZQL: A Compiler for Privacy-Preserving Data ProcessingUSENIX Security '13Cedric Fournet, Markulf Kohlweiss, George Danezis, Zhengqin Luo
    DupLESS: Server-Aided Encryption for Deduplicated StorageUSENIX Security '13Sriram Keelveedhi, Mihir Bellare, Thomas Ristenpart
    Dowsing for Overflows: A Guided Fuzzer to Find Buffer Boundary ViolationsUSENIX Security '13Istvan Haller, Asia Slowinska, Matthias Neugschwandtner, Herbert Bos
    MetaSymploit: Day-One Defense against Script-based Attacks with Security-Enhanced Symbolic AnalysisUSENIX Security '13Ruowen Wang, Peng Ning, Tao Xie, Quan Chen
    Towards Automatic Software Lineage InferenceUSENIX Security '13Jiyong Jang, Maverick Woo, David Brumley
    You Are How You Click: Clickstream Analysis for Sybil DetectionUSENIX Security '13Gang Wang, Tristan Konolige, Christo Wilson, Xiao Wang, Haitao Zheng, Ben Y. Zhao
    Alice in Warningland: A Large-Scale Field Study of Browser Security Warning EffectivenessUSENIX Security '13Devdatta Akhawe, Adrienne Porter Felt
    An Empirical Study of Vulnerability Rewards ProgramsUSENIX Security '13Matthew Finifter, Devdatta Akhawe, David Wagner

Pages