USENIX supports diversity, equity, and inclusion and condemns hate and discrimination.
Papers
Search results
Conference | Title | Author(s) |
---|---|---|
NSDI '24 | OctoSketch: Enabling Real-Time, Continuous Network Monitoring over Multiple Cores | Yinda Zhang, Peiqing Chen, Zaoxing Liu |
NSDI '24 | Habitus: Boosting Mobile Immersive Content Delivery through Full-body Pose Tracking and Multipath Networking | Anlan Zhang, Chendong Wang, Yuming Hu, Ahmad Hassan, Zejun Zhang, Bo Han, Feng Qian, Shichang Xu |
NSDI '24 | BFMSense: WiFi Sensing Using Beamforming Feedback Matrix | Enze Yi, Dan Wu, Jie Xiong, Fusang Zhang, Kai Niu, Wenwei Li, Daqing Zhang |
NSDI '24 | mmComb: High-speed mmWave Commodity WiFi Backscatter | Yoon Chae, Zhenzhe Lin, Kang Min Bae, Song Min Kim, Parth Pathak |
NSDI '24 | A System to Detect Forged-Origin BGP Hijacks | Thomas Holterbach, Thomas Alfroy, Amreesh Phokeer, Alberto Dainotti, Cristel Pelsser |
NSDI '24 | NetVigil: Robust and Low-Cost Anomaly Detection for East-West Data Center Security | Kevin Hsieh, Mike Wong, Santiago Segarra, Sathiya Kumaran Mani, Trevor Eberl, Anatoliy Panasyuk, Ravi Netravali, Ranveer Chandra, Srikanth Kandula |
NSDI '24 | LitePred: Transferable and Scalable Latency Prediction for Hardware-Aware Neural Architecture Search | Chengquan Feng, Li Lyna Zhang, Yuanchi Liu, Jiahang Xu, Chengruidong Zhang, Zhiyuan Wang, Ting Cao, Mao Yang, Haisheng Tan |
NSDI '24 | Catch Me If You Can: Laser Tethering with Highly Mobile Targets | Charles J. Carver, Hadleigh Schwartz, Qijia Shao, Nicholas Shade, Joseph Lazzaro, Xiaoxin Wang, Jifeng Liu, Eric Fossum, Xia Zhou |
NSDI '24 | AUGUR: Practical Mobile Multipath Transport Service for Low Tail Latency in Real-Time Streaming | Yuhan Zhou, Tingfeng Wang, Liying Wang, Nian Wen, Rui Han, Jing Wang, Chenglei Wu, Jiafeng Chen, Longwei Jiang, Shibo Wang, Honghao Liu, Chenren Xu |
NSDI '24 | Zombie: Middleboxes that Don’t Snoop | Collin Zhang, Zachary DeStefano, Arasu Arun, Joseph Bonneau, Paul Grubbs, Michael Walfish |
NSDI '24 | Solving Max-Min Fair Resource Allocations Quickly on Large Graphs | Pooria Namyar, Behnaz Arzani, Srikanth Kandula, Santiago Segarra, Daniel Crankshaw, Umesh Krishnaswamy, Ramesh Govindan, Himanshu Raj |
NSDI '24 | Passengers' Safety Matters: Experiences of Deploying a Large-Scale Indoor Delivery Monitoring System | Xiubin Fan, Zhongming Lin, Yuming Hu, Tianrui Jiang, Feng Qian, Zhimeng Yin, S.-H. Gary Chan, Dapeng Wu |
NSDI '24 | Harvesting Idle Memory for Application-managed Soft State with Midas | Yifan Qiao, Zhenyuan Ruan, Haoran Ma, Adam Belay, Miryung Kim, Harry Xu |
USENIX Security '23 | Tubes Among Us: Analog Attack on Automatic Speaker Identification | Shimaa Ahmed, Yash Wani, Ali Shahin Shamsabadi, Mohammad Yaghini, Ilia Shumailov, Nicolas Papernot, Kassem Fawaz |
USENIX Security '23 | Practical Asynchronous High-threshold Distributed Key Generation and Distributed Polynomial Sampling | Sourav Das, Zhuolun Xiang, Lefteris Kokoris-Kogias, Ling Ren |
USENIX Security '23 | Every Vote Counts: Ranking-Based Training of Federated Learning to Resist Poisoning Attacks | Hamid Mozaffari, Virat Shejwalkar, Amir Houmansadr |
USENIX Security '23 | Hidden Reality: Caution, Your Hand Gesture Inputs in the Immersive Virtual World are Visible to All! | Sindhu Reddy Kalathur Gopal, Diksha Shukla, James David Wheelock, Nitesh Saxena |
USENIX Security '23 | ARI: Attestation of Real-time Mission Execution Integrity | Jinwen Wang, Yujie Wang, Ao Li, Yang Xiao, Ruide Zhang, Wenjing Lou, Y. Thomas Hou, Ning Zhang |
USENIX Security '23 | Eos: Efficient Private Delegation of zkSNARK Provers | Alessandro Chiesa, Ryan Lehmkuhl, Pratyush Mishra, Yinuo Zhang |
USENIX Security '23 | PELICAN: Exploiting Backdoors of Naturally Trained Deep Learning Models In Binary Code Analysis | Zhuo Zhang, Guanhong Tao, Guangyu Shen, Shengwei An, Qiuling Xu, Yingqi Liu, Yapeng Ye, Yaoxuan Wu, Xiangyu Zhang |
USENIX Security '23 | The Gates of Time: Improving Cache Attacks with Transient Execution | Daniel Katzman, William Kosasih, Chitchanok Chuengsatiansup, Eyal Ronen, Yuval Yarom |
USENIX Security '23 | TRust: A Compilation Framework for In-process Isolation to Protect Safe Rust against Untrusted Code | Inyoung Bang, Martin Kayondo, Hyungon Moon, Yunheung Paek |
USENIX Security '23 | The Most Dangerous Codec in the World: Finding and Exploiting Vulnerabilities in H.264 Decoders | Willy R. Vasquez, Stephen Checkoway, Hovav Shacham |
USENIX Security '23 | A Large Scale Study of the Ethereum Arbitrage Ecosystem | Robert McLaughlin, Christopher Kruegel, Giovanni Vigna |
USENIX Security '23 | Sherlock on Specs: Building LTE Conformance Tests through Automated Reasoning | Yi Chen, Di Tang, Yepeng Yao, Mingming Zha, XiaoFeng Wang, Xiaozhong Liu, Haixu Tang, Baoxu Liu |