NSDI '23 | Skyplane: Optimizing Transfer Cost and Throughput Using Cloud-Aware Overlays | Paras Jain, Sam Kumar, Sarah Wooders, Shishir G. Patil, Joseph E. Gonzalez, Ion Stoica |
NSDI '23 | Understanding RDMA Microarchitecture Resources for Performance Isolation | Xinhao Kong, Jingrong Chen, Wei Bai, Yechen Xu, Mahmoud Elhaddad, Shachar Raindel, Jitendra Padhye, Alvin R. Lebeck, Danyang Zhuo |
NSDI '23 | BGL: GPU-Efficient GNN Training by Optimizing Graph Data I/O and Preprocessing | Tianfeng Liu, Yangrui Chen, Dan Li, Chuan Wu, Yibo Zhu, Jun He, Yanghua Peng, Hongzheng Chen, Hongzhi Chen, Chuanxiong Guo |
NSDI '23 | Enhancing Global Network Monitoring with Magnifier | Tobias Bühler, Romain Jacob, Ingmar Poese, Laurent Vanbever |
NSDI '23 | Addax: A fast, private, and accountable ad exchange infrastructure | Ke Zhong, Yiping Ma, Yifeng Mao, Sebastian Angel |
NSDI '23 | Canvas: Isolated and Adaptive Swapping for Multi-Applications on Remote Memory | Chenxi Wang, Yifan Qiao, Haoran Ma, Shi Liu, Wenguang Chen, Ravi Netravali, Miryung Kim, Guoqing Harry Xu |
NSDI '23 | ModelKeeper: Accelerating DNN Training via Automated Training Warmup | Fan Lai, Yinwei Dai, Harsha V. Madhyastha, Mosharaf Chowdhury |
NSDI '23 | TACCL: Guiding Collective Algorithm Synthesis using Communication Sketches | Aashaka Shah, Vijay Chidambaram, Meghan Cowan, Saeed Maleki, Madan Musuvathi, Todd Mytkowicz, Jacob Nelson, Olli Saarikivi, Rachee Singh |
USENIX Security '22 | "How Do You Not Lose Friends?": Synthesizing a Design Space of Social Controls for Securing Shared Digital Resources Via Participatory Design Jams | Eyitemi Moju-Igbene, Hanan Abdi, Alan Lu, Sauvik Das |
USENIX Security '22 | AMD Prefetch Attacks through Power and Time | Moritz Lipp, Daniel Gruss, Michael Schwarz |
USENIX Security '22 | "I feel invaded, annoyed, anxious and I may protect myself": Individuals' Feelings about Online Tracking and their Protective Behaviour across Gender and Country | Kovila P.L. Coopamootoo, Maryam Mehrnezhad, Ehsan Toreini |
USENIX Security '22 | Mistrust Plugins You Must: A Large-Scale Study Of Malicious Plugins In WordPress Marketplaces | Ranjita Pai Kasturi, Jonathan Fuller, Yiting Sun, Omar Chabklo, Andres Rodriguez, Jeman Park, Brendan Saltaformaggio |
USENIX Security '22 | Web Cache Deception Escalates! | Seyed Ali Mirheidari, Matteo Golinelli, Kaan Onarlioglu, Engin Kirda, Bruno Crispo |
USENIX Security '22 | Exploring the Unchartered Space of Container Registry Typosquatting | Guannan Liu, Xing Gao, Haining Wang, Kun Sun |
USENIX Security '22 | LinKRID: Vetting Imbalance Reference Counting in Linux kernel with Symbolic Execution | Jian Liu, Lin Yi, Weiteng Chen, Chengyu Song, Zhiyun Qian, Qiuping Yi |
USENIX Security '22 | Hiding in Plain Sight? On the Efficacy of Power Side Channel-Based Control Flow Monitoring | Yi Han, Matthew Chan, Zahra Aref, Nils Ole Tippenhauer, Saman Zonouz |
USENIX Security '22 | Secure Poisson Regression | Mahimna Kelkar, Phi Hung Le, Mariana Raykova, Karn Seth |
USENIX Security '22 | Under the Hood of DANE Mismanagement in SMTP | Hyeonmin Lee, Md. Ishtiaq Ashiq, Moritz Müller, Roland van Rijswijk-Deij, Taekyoung "Ted" Kwon, Taejoong Chung |
USENIX Security '22 | The Dangers of Human Touch: Fingerprinting Browser Extensions through User Actions | Konstantinos Solomos, Panagiotis Ilia, Soroush Karami, Nick Nikiforakis, Jason Polakis |
USENIX Security '22 | Poisoning Attacks to Local Differential Privacy Protocols for Key-Value Data | Yongji Wu, Xiaoyu Cao, Jinyuan Jia, Neil Zhenqiang Gong |
USENIX Security '22 | Breaking Bridgefy, again: Adopting libsignal is not enough | Martin R. Albrecht, Raphael Eikenberg, Kenneth G. Paterson |
USENIX Security '22 | Many Roads Lead To Rome: How Packet Headers Influence DNS Censorship Measurement | Abhishek Bhaskar, Paul Pearce |
USENIX Security '22 | Communication-Efficient Triangle Counting under Local Differential Privacy | Jacob Imola, Takao Murakami, Kamalika Chaudhuri |
USENIX Security '22 | Seeing the Forest for the Trees: Understanding Security Hazards in the 3GPP Ecosystem through Intelligent Analysis on Change Requests | Yi Chen, Di Tang, Yepeng Yao, Mingming Zha, XiaoFeng Wang, Xiaozhong Liu, Haixu Tang, Dongfang Zhao |
USENIX Security '22 | OS-Aware Vulnerability Prioritization via Differential Severity Analysis | Qiushi Wu, Yue Xiao, Xiaojing Liao, Kangjie Lu |