Papers

Search results

    ConferenceTitleAuthor(s)
    USENIX Mach SymposiumManaging Discardable Pages with an External PagerIndira Subramanian
    USENIX Mach SymposiumA Fast Mach Network IPC ImplementationJoseph S. Barrera III
    USENIX Mach SymposiumGeneralized Emulation Services for Mach 3.0—Overview, Experiences and Current StatusDaniel P. Julin, J. Mark Stevenson, Jonathan J. Chew, Paulo Guedes, Paul Neves, Paul Roy
    USENIX Mach SymposiumDOS as a Mach 3.0 ApplicationGerald Malan, Richard Rashid, David Golub, Robert Baron
    USENIX Security '20"I am uncomfortable sharing what I can't see": Privacy Concerns of the Visually Impaired with Camera Based Assistive Applications
    USENIX Security '20PHMon: A Programmable Hardware Monitor and Its Security Use Cases
    USENIX Security '20Interpretable Deep Learning under Fire
    USENIX Security '20BesFS: A POSIX Filesystem for Enclaves with a Mechanized Safety Proof
    USENIX Security '20Automatic Hot Patch Generation for Android Kernels
    USENIX Security '20Cache Telepathy: Leveraging Shared Resource Attacks to Learn DNN Architectures
    USENIX Security '20HybCache: Hybrid Side-Channel-Resilient Caches for Trusted Execution Environments
    USENIX Security '20GREYONE: Data Flow Sensitive Fuzzing
    USENIX Security '20P2IM: Scalable and Hardware-independent Firmware Testing via Automatic Peripheral Interface Modeling
    USENIX Security '20Delphi: A Cryptographic Inference Service for Neural Networks
    USENIX Security '20Civet: An Efficient Java Partitioning Framework for Hardware Enclaves
    USENIX Security '20Understanding security mistakes developers make: Qualitative analysis from Build It, Break It, Fix It
    USENIX Security '20Montage: A Neural Network Language Model-Guided JavaScript Engine Fuzzer
    USENIX Security '20Big Numbers - Big Troubles: Systematically Analyzing Nonce Leakage in (EC)DSA Implementations
    USENIX Security '20(Mostly) Exitless VM Protection from Untrusted Hypervisor through Disaggregated Nested Virtualization
    USENIX Security '20Stealthy Tracking of Autonomous Vehicles with Cache Side Channels
    USENIX Security '20An Off-Chip Attack on Hardware Enclaves via the Memory Bus
    USENIX Security '20SmartVerif: Push the Limit of Automation Capability of Verifying Security Protocols by Dynamic Strategies
    USENIX Security '20Void: A fast and light voice liveness detection system
    USENIX Security '20An Observational Investigation of Reverse Engineers’ Processes
    USENIX Security '20Cached and Confused: Web Cache Deception in the Wild

Pages