Papers

Search results

    ConferenceTitleAuthor(s)
    NSDI '23Rearchitecting the TCP Stack for I/O-Offloaded Content DeliveryTaehyun Kim, Deondre Martin Ng, Junzhi Gong, Youngjin Kwon, Minlan Yu, KyoungSoo Park
    NSDI '23Scalable Distributed Massive MIMO Baseband ProcessingJunzhi Gong, Anuj Kalia, Minlan Yu
    NSDI '23NetPanel: Traffic Measurement of Exchange Online ServiceYu Chen, Liqun Li, Yu Kang, Boyang Zheng, Yehan Wang, More Zhou, Yuchao Dai, Zhenguo Yang, Brad Rutkowski, Jeff Mealiffe, Qingwei Lin
    NSDI '23DChannel: Accelerating Mobile Applications With Parallel High-bandwidth and Low-latency ChannelsWilliam Sentosa, Balakrishnan Chandrasekaran, P. Brighten Godfrey, Haitham Hassanieh, Bruce Maggs
    NSDI '23A High-Speed Stateful Packet Processing Approach for Tbps Programmable SwitchesMariano Scazzariello, Tommaso Caiazzi, Hamid Ghasemirahni, Tom Barbette, Dejan Kostić, Marco Chiesa
    NSDI '23xBGP: Faster Innovation in Routing ProtocolsThomas Wirtgen, Tom Rousseaux, Quentin De Coninck, Nicolas Rybowski, Randy Bush, Laurent Vanbever, Axel Legay, Olivier Bonaventure
    NSDI '23RECL: Responsive Resource-Efficient Continuous Learning for Video AnalyticsMehrdad Khani, Ganesh Ananthanarayanan, Kevin Hsieh, Junchen Jiang, Ravi Netravali, Yuanchao Shu, Mohammad Alizadeh, Victor Bahl
    NSDI '23SRNIC: A Scalable Architecture for RDMA NICsZilong Wang, Layong Luo, Qingsong Ning, Chaoliang Zeng, Wenxue Li, Xinchen Wan, Peng Xie, Tao Feng, Ke Cheng, Xiongfei Geng, Tianhao Wang, Weicheng Ling, Kejia Huo, Pingbo An, Kui Ji, Shideng Zhang, Bin Xu, Ruiqing Feng, Tao Ding, Kai Chen, Chuanxiong Guo
    USENIX Security '22Membership Inference Attacks and Defenses in Neural Network PruningXiaoyong Yuan, Lan Zhang
    USENIX Security '22Efficient Differentially Private Secure Aggregation for Federated Learning via Hardness of Learning with ErrorsTimothy Stevens, Christian Skalka, Christelle Vincent, John Ring, Samuel Clark, Joseph Near
    USENIX Security '22OpenVPN is Open to VPN FingerprintingDiwen Xue, Reethika Ramesh, Arham Jain, Michalis Kallitsis, J. Alex Halderman, Jedidiah R. Crandall, Roya Ensafi
    USENIX Security '22Backporting Security Patches of Web Applications: A Prototype Design and Implementation on Injection Vulnerability PatchesYoukun Shi, Yuan Zhang, Tianhan Luo, Xiangyu Mao, Yinzhi Cao, Ziwen Wang, Yudi Zhao, Zongan Huang, Min Yang
    USENIX Security '22MaDIoT 2.0: Modern High-Wattage IoT Botnet Attacks and DefensesTohid Shekari, Alvaro A. Cardenas, Raheem Beyah
    USENIX Security '22Physical-Layer Attacks Against Pulse Width Modulation-Controlled ActuatorsGökçen Yılmaz Dayanıklı, Sourav Sinha, Devaprakash Muniraj, Ryan M. Gerdes, Mazen Farhood, Mani Mina
    USENIX Security '22Who Are You (I Really Wanna Know)? Detecting Audio DeepFakes Through Vocal Tract ReconstructionLogan Blue, Kevin Warren, Hadi Abdullah, Cassidy Gibson, Luis Vargas, Jessica O'Dell, Kevin Butler, Patrick Traynor
    USENIX Security '22Shuffle-based Private Set Union: Faster and More SecureYanxue Jia, Shi-Feng Sun, Hong-Sheng Zhou, Jiajun Du, Dawu Gu
    USENIX Security '22Pacer: Comprehensive Network Side-Channel Mitigation in the CloudAastha Mehta, Mohamed Alzayat, Roberta De Viti, Björn B. Brandenburg, Peter Druschel, Deepak Garg
    USENIX Security '22Zero-Knowledge MiddleboxesPaul Grubbs, Arasu Arun, Ye Zhang, Joseph Bonneau, Michael Walfish
    USENIX Security '22TheHuzz: Instruction Fuzzing of Processors Using Golden-Reference Models for Finding Software-Exploitable VulnerabilitiesRahul Kande, Addison Crump, Garrett Persyn, Patrick Jauernig, Ahmad-Reza Sadeghi, Aakash Tyagi, Jeyavijayan Rajendran
    USENIX Security '22Private SignalingVarun Madathil, Alessandra Scafuro, István András Seres, Omer Shlomovits, Denis Varlakov
    USENIX Security '22Branch History Injection: On the Effectiveness of Hardware Mitigations Against Cross-Privilege Spectre-v2 AttacksEnrico Barberis, Pietro Frigo, Marius Muench, Herbert Bos, Cristiano Giuffrida
    USENIX Security '22Playing for K(H)eaps: Understanding and Improving Linux Kernel Exploit ReliabilityKyle Zeng, Yueqi Chen, Haehyun Cho, Xinyu Xing, Adam Doupé, Yan Shoshitaishvili, Tiffany Bao
    USENIX Security '22Are Your Sensitive Attributes Private? Novel Model Inversion Attribute Inference Attacks on Classification ModelsShagufta Mehnaz, Sayanton V. Dibbo, Ehsanul Kabir, Ninghui Li, Elisa Bertino
    USENIX Security '22Stalloris: RPKI Downgrade AttackTomas Hlavacek, Philipp Jeitner, Donika Mirdita, Haya Shulman, Michael Waidner
    USENIX Security '22V'CER: Efficient Certificate Validation in Constrained NetworksDavid Koisser, Patrick Jauernig, Gene Tsudik, Ahmad-Reza Sadeghi

Pages