Search results

    USENIX Security '20MIRAGE: Succinct Arguments for Randomized Algorithms with Applications to Universal zk-SNARKsAhmed Kosba, Dimitrios Papadopoulos, Charalampos Papamanthou, Dawn Song
    USENIX Security '20A Spectral Analysis of Noise: A Comprehensive, Automated, Formal Analysis of Diffie-Hellman ProtocolsGuillaume Girol, Lucca Hirschi, Ralf Sasse, Dennis Jackson, Cas Cremers, David Basin
    USENIX Security '20Measuring and Modeling the Label Dynamics of Online Anti-Malware EnginesShuofei Zhu, Jianjun Shi, Limin Yang, Boqin Qin, Ziyi Zhang, Linhai Song, Gang Wang
    USENIX Security '20Medusa: Microarchitectural Data Leakage via Automated Attack SynthesisDaniel Moghimi, Moritz Lipp, Berk Sunar, Michael Schwarz
    USENIX Security '20V0LTpwn: Attacking x86 Processor Integrity from SoftwareZijo Kenjar, Tommaso Frassetto, David Gens, Michael Franz, Ahmad-Reza Sadeghi
    USENIX Security '20SEAL: Attack Mitigation for Encrypted Databases via Adjustable LeakageIoannis Demertzis, Dimitrios Papadopoulos, Charalampos Papamanthou, Saurabh Shintre
    USENIX Security '20Shim Shimmeny: Evaluating the Security and Privacy Contributions of Link Shimming in the Modern WebFrank Li
    USENIX Security '20COUNTERFOIL: Verifying Provenance of Integrated Circuits using Intrinsic Package Fingerprints and Inexpensive CamerasSiva Nishok Dhanuskodi, Xiang Li, Daniel Holcomb
    USENIX Security '20AURORA: Statistical Crash Analysis for Automated Root Cause ExplanationTim Blazytko, Moritz Schlögel, Cornelius Aschermann, Ali Abbasi, Joel Frank, Simon Wörner, Thorsten Holz
    USENIX Security '20FANS: Fuzzing Android Native System Services via Automated Interface AnalysisBaozheng Liu, Chao Zhang, Guang Gong, Yishun Zeng, Haifeng Ruan, Jianwei Zhuge
    USENIX Security '20Detecting Stuffing of a User’s Credentials at Her Own AccountsKe Coby Wang, Michael K. Reiter
    USENIX Security '20That Was Then, This Is Now: A Security Evaluation of Password Generation, Storage, and Autofill in Browser-Based Password Managers
    USENIX Security '20McTiny: Fast High-Confidence Post-Quantum Key Erasure for Tiny Network Servers
    NSDI '20Experiences with Modeling Network Topologies at Multiple Levels of Abstraction Jeffrey C. Mogul, Drago Goricanec, Martin Pool, Anees Shaikh, Douglas Turk, Bikash Koley, Xiaoxue Zhao
    NSDI '20Frequency Configuration for Low-Power Wide-Area Networks in a Heartbeat Akshay Gadre, Revathy Narayanan, Anh Luong, Anthony Rowe, Bob Iannucci, Swarun Kumar
    NSDI '20Re-architecting Congestion Management in Lossless EthernetWenxue Cheng, Kun Qian, Wanchun Jiang, Tong Zhang, Fengyuan Ren
    NSDI '20Network Error Logging: Client-side measurement of end-to-end web service reliability Sam Burnett, Lily Chen, Douglas A. Creager, Misha Efimov, Ilya Grigorik, Ben Jones, Harsha V. Madhyastha, Pavlos Papageorge, Brian Rogan, Charles Stahl, Julia Tuttle
    NSDI '20Gandalf: An Intelligent, End-To-End Analytics Service for Safe Deployment in Large-Scale Cloud Infrastructure Ze Li, Qian Cheng, Ken Hsieh, Yingnong Dang, Peng Huang, Pankaj Singh, Xinsheng Yang, Qingwei Lin, Youjiang Wu, Sebastien Levy, Murali Chintalapati
    NSDI '20Fine-Grained Replicated State Machines for a Cluster Storage System Ming Liu, Arvind Krishnamurthy, Harsha V. Madhyastha, Rishi Bhardwaj, Karan Gupta, Chinmay Kamat, Huapeng Yuan, Aditya Jaltade, Roger Liao, Pavan Konka, Anoop Jawahar
    NSDI '20Meaningful Availability Tamás Hauer, Philipp Hoffmann, John Lunney, Dan Ardelean, Amer Diwan
    NSDI '20NetSMC: A Custom Symbolic Model Checker for Stateful Network VerificationYifei Yuan, Soo-Jin Moon, Sahil Uppal, Limin Jia, Vyas Sekar
    NSDI '20TinySDR: Low-Power SDR Platform for Over-the-Air Programmable IoT Testbeds Mehrdad Hessar, Ali Najafi, Vikram Iyer, Shyamnath Gollakota
    NSDI '20Liveness Verification of Stateful Network Functions Farnaz Yousefi, Anubhavnidhi Abhashkumar, Kausik Subramanian, Kartik Hans, Soudeh Ghorbani, Aditya Akella
    NSDI '20Check before You Change: Preventing Correlated Failures in Service Updates Ennan Zhai, Ang Chen, Ruzica Piskac, Mahesh Balakrishnan, Bingchuan Tian, Bo Song, Haoliang Zhang
    NSDI '20Automated Verification of Customizable Middlebox Properties with Gravel Kaiyuan Zhang, Danyang Zhuo, Aditya Akella, Arvind Krishnamurthy, Xi Wang