USENIX Security '23 | FuzzJIT: Oracle-Enhanced Fuzzing for JavaScript Engine JIT Compiler | Junjie Wang, Zhiyi Zhang, Shuang Liu, Xiaoning Du, Junjie Chen |
USENIX Security '23 | TPatch: A Triggered Physical Adversarial Patch | Wenjun Zhu, Xiaoyu Ji, Yushi Cheng, Shibo Zhang, Wenyuan Xu |
USENIX Security '23 | TAP: Transparent and Privacy-Preserving Data Services | Daniel Reijsbergen, Aung Maw, Zheng Yang, Tien Tuan Anh Dinh, Jianying Zhou |
USENIX Security '23 | UnGANable: Defending Against GAN-based Face Manipulation | Zheng Li, Ning Yu, Ahmed Salem, Michael Backes, Mario Fritz, Yang Zhang |
USENIX Security '23 | Squint Hard Enough: Attacking Perceptual Hashing with Adversarial Machine Learning | Jonathan Prokos, Neil Fendley, Matthew Green, Roei Schuster, Eran Tromer, Tushar Jois, Yinzhi Cao |
USENIX Security '23 | "All of them claim to be the best": Multi-perspective study of VPN users and VPN providers | Reethika Ramesh, Anjali Vyas, Roya Ensafi |
USENIX Security '23 | GlitchHiker: Uncovering Vulnerabilities of Image Signal Transmission with IEMI | Qinhong Jiang, Xiaoyu Ji, Chen Yan, Zhixin Xie, Haina Lou, Wenyuan Xu |
USENIX Security '23 | Device Tracking via Linux’s New TCP Source Port Selection Algorithm | Moshe Kol, Amit Klein, Yossi Gilad |
USENIX Security '23 | The Writing on the Wall and 3D Digital Twins: Personal Information in (not so) Private Real Estate | Rachel McAmis, Tadayoshi Kohno |
USENIX Security '23 | PrivTrace: Differentially Private Trajectory Synthesis by Adaptive Markov Models | Haiming Wang, Zhikun Zhang, Tianhao Wang, Shibo He, Michael Backes, Jiming Chen, Yang Zhang |
USENIX Security '23 | Egg Hunt in Tesla Infotainment: A First Look at Reverse Engineering of Qt Binaries | Haohuang Wen, Zhiqiang Lin |
USENIX Security '23 | Learning Normality is Enough: A Software-based Mitigation against Inaudible Voice Attacks | Xinfeng Li, Xiaoyu Ji, Chen Yan, Chaohao Li, Yichen Li, Zhenning Zhang, Wenyuan Xu |
USENIX Security '23 | FirmSolo: Enabling dynamic analysis of binary Linux-based IoT kernel modules | Ioannis Angelakopoulos, Gianluca Stringhini, Manuel Egele |
NSDI '23 | LeakyScatter: A Frequency-Agile Directional Backscatter Network Above 100 GHz | Atsutse Kludze, Yasaman Ghasempour |
NSDI '23 | Boggart: Towards General-Purpose Acceleration of Retrospective Video Analytics | Neil Agarwal, Ravi Netravali |
NSDI '23 | Unlocking unallocated cloud capacity for long, uninterruptible workloads | Anup Agarwal, Shadi Noghabi, Íñigo Goiri, Srinivasan Seshan, Anirudh Badam |
NSDI '23 | Gemel: Model Merging for Memory-Efficient, Real-Time Video Analytics at the Edge | Arthi Padmanabhan, Neil Agarwal, Anand Iyer, Ganesh Ananthanarayanan, Yuanchao Shu, Nikolaos Karianakis, Guoqing Harry Xu, Ravi Netravali |
NSDI '23 | Following the Data, Not the Function: Rethinking Function Orchestration in Serverless Computing | Minchen Yu, Tingjia Cao, Wei Wang, Ruichuan Chen |
NSDI '23 | The Benefit of Hindsight: Tracing Edge-Cases in Distributed Systems | Lei Zhang, Zhiqiang Xie, Vaastav Anand, Ymir Vigfusson, Jonathan Mace |
NSDI '23 | Fast, Approximate Vector Queries on Very Large Unstructured Datasets | Zili Zhang, Chao Jin, Linpeng Tang, Xuanzhe Liu, Xin Jin |
NSDI '23 | TopoOpt: Co-optimizing Network Topology and Parallelization Strategy for Distributed Training Jobs | Weiyang Wang, Moein Khazraee, Zhizhen Zhong, Manya Ghobadi, Zhihao Jia, Dheevatsa Mudigere, Ying Zhang, Anthony Kewitsch |
NSDI '23 | Enhancing Global Network Monitoring with Magnifier | Tobias Bühler, Romain Jacob, Ingmar Poese, Laurent Vanbever |
NSDI '23 | Addax: A fast, private, and accountable ad exchange infrastructure | Ke Zhong, Yiping Ma, Yifeng Mao, Sebastian Angel |
NSDI '23 | Shockwave: Fair and Efficient Cluster Scheduling for Dynamic Adaptation in Machine Learning | Pengfei Zheng, Rui Pan, Tarannum Khan, Shivaram Venkataraman, Aditya Akella |
NSDI '23 | ModelKeeper: Accelerating DNN Training via Automated Training Warmup | Fan Lai, Yinwei Dai, Harsha V. Madhyastha, Mosharaf Chowdhury |