Search results

    USENIX Mach SymposiumParallelizing Signal Handling and Process Management in OSF/1Don Bolinger, Shashi Mangalat
    USENIX Mach SymposiumMach Resource Control in OSF/1David W. Mitchell
    USENIX Mach SymposiumMach Interfaces to Support Guest O.S. DebuggingRand Hoven
    USENIX Mach SymposiumKernel Support for Network Protocol ServersFranklin Reynolds, Jeffrey Heller
    USENIX Mach SymposiumAn I/O System for Mach 3.0Alessandro Forin, David Golub, Bryan Bershad
    USENIX Mach SymposiumMoving the Default Memory Manager Out of the Mach KernlDavid B. Golub, Richard P. Draves
    USENIX Mach SymposiumUser-Level Physical Memory Management for MachStuart Sechrest, Yoonho Park
    USENIX Mach SymposiumPage Replacement and Reference Bit Emulation in MachRichard P. Draves
    USENIX Mach SymposiumEvaluation of Real-Time Synchronization in Real-Time MachHideyuki Tokuda, Tatsuo Nakajima
    USENIX Mach SymposiumHow to Design Reliable Servers using Fault Tolerant Micro-Kernel MechanismsMichel Banâtre, Gilles Muller, Pack Heng, Bruno Rochat
    USENIX Mach SymposiumThe FIle System Belongs in the KernelBrent Welch
    USENIX Mach SymposiumDistributed Trusted Mach ArchitectureEdward John Sebes
    USENIX Security '24Key Recovery Attacks on Approximate Homomorphic Encryption with Non-Worst-Case Noise Flooding Countermeasures
    USENIX Security '24Mudjacking: Patching Backdoor Vulnerabilities in Foundation Models
    USENIX Security '24Does Online Anonymous Market Vendor Reputation Matter?
    USENIX Security '24SWOOSH: Efficient Lattice-Based Non-Interactive Key Exchange
    USENIX Security '24Machine Learning needs Better Randomness Standards: Randomised Smoothing and PRNG-based attacks
    USENIX Security '24Tossing in the Dark: Practical Bit-Flipping on Gray-box Deep Neural Networks for Runtime Trojan Injection
    USENIX Security '24Batch PIR and Labeled PSI with Oblivious Ciphertext Compression
    USENIX Security '24Pixel Thief: Exploiting SVG Filter Leakage in Firefox and Chrome
    USENIX Security '24ATTention Please! An Investigation of the App Tracking Transparency Permission
    USENIX Security '24Unpacking Privacy Labels: A Measurement and Developer Perspective on Google's Data Safety Section
    USENIX Security '24Hermes: Unlocking Security Analysis of Cellular Network Protocols by Synthesizing Finite State Machines from Natural Language Specifications
    USENIX Security '24Sync+Sync: A Covert Channel Built on fsync with Storage
    USENIX Security '24AutoFHE: Automated Adaption of CNNs for Efficient Evaluation over FHE