Papers

Search results

    ConferenceTitleAuthor(s)
    NSDI '20AccelTCP: Accelerating Network Applications with Stateful TCP Offloading
    NSDI '20Enabling Programmable Transport Protocols in High-Speed NICs
    NSDI '20Contra: A Programmable System for Performance-aware Routing
    NSDI '20Network Error Logging: Client-side measurement of end-to-end web service reliability
    NSDI '20Gandalf: An Intelligent, End-To-End Analytics Service for Safe Deployment in Large-Scale Cloud Infrastructure
    NSDI '20Fine-Grained Replicated State Machines for a Cluster Storage System
    NSDI '20Meaningful Availability
    NSDI '20SP-PIFO: Approximating Push-In First-Out Behaviors using Strict-Priority Queues
    NSDI '20NetSMC: A Custom Symbolic Model Checker for Stateful Network Verification
    NSDI '20TinySDR: Low-Power SDR Platform for Over-the-Air Programmable IoT Testbeds
    NSDI '20Frequency Configuration for Low-Power Wide-Area Networks in a Heartbeat
    NSDI '20Plankton: Scalable network configuration verification through model checking
    NSDI '20Expanding across time to deliver bandwidth efficiency and low latency
    NSDI '20Config2Spec: Mining Network Specifications from Network Configurations
    NSDI '20XRD: Scalable Messaging System with Cryptographic Privacy
    NSDI '20Re-architecting Congestion Management in Lossless Ethernet
    NSDI '20Measuring Congestion in High-Performance Datacenter Interconnects
    RAID 2019On Design Inference from Binaries Compiled using Modern C++ DefensesRukayat Ayomide Erinfolami, Anh T Quach, Aravind Prakash
    RAID 2019DECAF++: Elastic Whole-System Dynamic Taint AnalysisAli Davanian, Zhenxiao Qi, Yu Qu, Heng Yin
    RAID 2019Be Sensitive and Collaborative: Analyzing Impact of Coverage Metrics in Greybox FuzzingJinghan Wang, Yue Duan, Wei Song, Heng Yin, Chengyu Song
    RAID 2019Fingerprinting Tooling used for SSH Compromisation AttemptsVincent Ghiette, Harm Griffioen, Christian Doerr
    RAID 2019Timing Patterns and Correlations in Spontaneous SCADA Traffic for Anomaly DetectionChih-Yuan Lin, Simin Nadjm-Tehrani
    RAID 2019Towards a First Step to Understand the Cryptocurrency Stealing Attack on EthereumZhen Cheng, Xinrui Hou, Runhuai Li, Yajin Zhou, Xiapu Luo, Jinku Li, Kui Ren
    RAID 2019Toward the Analysis of Embedded Firmware through Automated Re-hostingEric Gustafson, Marius Muench, Chad Spensky, Nilo Redini, Aravind Machiry, Yanick Fratantonio, Davide Balzarotti, Aurelien Francillon, Yung Ryn Choe, Christophe Kruegel, Giovanni Vigna
    RAID 2019ScaRR: Scalable Runtime Remote Attestation for Complex SystemsFlavio Toffalini, Eleonora Losiouk, Andrea Biondo, Jianying Zhou, Mauro Conti

Pages