Search results

    USENIX Security '20That Was Then, This Is Now: A Security Evaluation of Password Generation, Storage, and Autofill in Browser-Based Password Managers
    USENIX Security '20McTiny: Fast High-Confidence Post-Quantum Key Erasure for Tiny Network Servers
    USENIX Security '20Void: A fast and light voice liveness detection system
    USENIX Security '20A Longitudinal and Comprehensive Study of the DANE Ecosystem in EmailHyeonmin Lee, Aniketh Gireesh, Roland van Rijswijk-Deij, Taekyoung "Ted" Kwon, Taejoong Chung
    USENIX Security '20Sunrise to Sunset: Analyzing the End-to-end Life Cycle and Effectiveness of Phishing Attacks at ScaleAdam Oest, Penghui Zhang, Brad Wardman, Eric Nunes, Jakub Burgis, Ali Zand, Kurt Thomas, Adam Doupe, Gail-Joon Ahn
    USENIX Security '20Interpretable Deep Learning under FireXinyang Zhang, Ningfei Wang, Hua Shen, Shouling Ji, Xiapu Luo, Ting Wang
    USENIX Security '20ETHBMC: A Bounded Model Checker for Smart ContractsJoel Frank, Cornelius Aschermann, Thorsten Holz
    USENIX Security '20The Unpatchable Silicon: A Full Break of the Bitstream Encryption of Xilinx 7-Series FPGAsMaik Ender, Amir Moradi, Christof Paar
    USENIX Security '20HALucinator: Firmware Re-hosting Through Abstraction Layer Emulation
    USENIX Security '20FuzzGuard: Filtering out Unreachable Inputs in Directed Grey-box Fuzzing through Deep Learning
    USENIX Security '20KOOBE: Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities
    USENIX Security '20Exploring Connections Between Active Learning and Model Extraction
    USENIX Security '20Local Model Poisoning Attacks to Byzantine-Robust Federated Learning
    HotStorage '20A New LSM-style Garbage Collection Scheme for ZNS SSDsGunhee Choi, Kwanghee Lee, Myunghoon Oh, Jongmoo Choi, Jhuyeong Jhin, Yongseok Oh
    HotStorage '20Ultra-Low Latency SSDs' Impact on Overall Energy EfficiencyBryan Harris, Nihat Altiparmak
    HotStorage '20Need for a Deeper Cross-Layer Optimization for Dense NAND SSD to Improve Read Performance of Big Data Applications: A Case for Melded PagesArpith K, K. Gopinath
    HotStorage '20Say Goodbye to Off-heap Caches! On-heap Caches Using Memory-Mapped I/OIacovos G. Kolokasis, Anastasios Papagiannis, Polyvios Pratikakis, Angelos Bilas, Foivos Zakkak
    HotStorage '20Differentiating Cache Files for Fine-grain Management to Improve Mobile Performance and LifetimeYu Liang, Jinheng Li, Xianzhang Chen, Rachata Ausavarungnirun, Riwei Pan, Tei-Wei Kuo, Chun Jason Xue
    HotStorage '20Desperately Seeking ... Optimal Multi-Tier Cache ConfigurationsTyler Estro, Pranav Bhandari, Avani Wildani, Erez Zadok
    HotStorage '20Reinforcement Learning-Based SLC Cache Technique for Enhancing SSD Write PerformanceSangjin Yoo, Dongkun Shin
    HotStorage '20SelectiveEC: Selective Reconstruction in Erasure-coded Storage SystemsLiangliang Xu, Min Lyu, Qiliang Li, Lingjiang Xie, Yinlong Xu
    HotStorage '20Rethinking WOM Codes to Enhance the Lifetime in New SSD GenerationsShehbaz Jaffer, Kaveh Mahdaviani, Bianca Schroeder
    HotStorage '20StripeFinder: Erasure Coding of Small Objects Over Key-Value Storage Devices (An Uphill Battle)Umesh Maheshwari
    HotStorage '20Prefetching in Hybrid Main Memory SystemsSubisha V, Varun Gohil, Nisarg Ujjainkar, Manu Awasthi
    HotStorage '20It's Time to Revisit LRU vs. FIFOOhad Eytan, Danny Harnik, Effi Ofer, Roy Friedman, Ronen Kat