Papers

Search results

    ConferenceTitleAuthor(s)
    USENIX Mach SymposiumGeneralized Emulation Services for Mach 3.0—Overview, Experiences and Current StatusDaniel P. Julin, Jonathan J. Chew, J. Mark Stevenson, Paulo Guedes, Paul Neves, Paul Roy
    USENIX Mach SymposiumParallelizing Signal Handling and Process Management in OSF/1Don Bolinger, Shashi Mangalat
    USENIX Mach SymposiumAn I/O System for Mach 3.0Alessandro Forin, David Golub, Bryan Bershad
    USENIX Security '21PEARL: Plausibly Deniable Flash Translation Layer using WOM coding
    USENIX Security '21SHARD: Fine-Grained Kernel Specialization with Context-Aware Hardening
    USENIX Security '21Preventing Use-After-Free Attacks with Fast Forward Allocation
    USENIX Security '21Partitioning Oracle Attacks
    USENIX Security '21Understanding and Detecting Disordered Error Handling with Precise Function Pairing
    USENIX Security '21HAWatcher: Semantics-Aware Anomaly Detection for Appified Smart Homes
    USENIX Security '21Kalεido: Real-Time Privacy Control for Eye-Tracking Systems
    USENIX Security '21CURE: A Security Architecture with CUstomizable and Resilient Enclaves
    USENIX Security '21A Stealthy Location Identification Attack Exploiting Carrier Aggregation in Cellular Networks
    USENIX Security '21Adversarial Policy Training against Deep Reinforcement Learning
    USENIX Security '21Security Analysis of the Democracy Live Online Voting System
    USENIX Security '21PriSEC: A Privacy Settings Enforcement Controller
    USENIX Security '21Ripple: A Programmable, Decentralized Link-Flooding Defense Against Adaptive Adversaries
    USENIX Security '21Blinder: Partition-Oblivious Hierarchical Scheduling
    USENIX Security '21Nyx: Greybox Hypervisor Fuzzing using Fast Snapshots and Affine Types
    USENIX Security '21Saphire: Sandboxing PHP Applications with Tailored System Call Allowlists
    USENIX Security '21Smart Contract Vulnerabilities: Vulnerable Does Not Imply Exploited
    USENIX Security '21KeyForge: Non-Attributable Email from Forward-Forgeable Signatures
    USENIX Security '21You Autocomplete Me: Poisoning Vulnerabilities in Neural Code Completion
    USENIX Security '21Finding Bugs Using Your Own Code: Detecting Functionally-similar yet Inconsistent Code
    USENIX Security '21Assessing Browser-level Defense against IDN-based Phishing
    USENIX Security '21An Investigation of the Android Kernel Patch Ecosystem

Pages