NSDI '23 | OpenLoRa: Validating LoRa Implementations through an Extensible and Open-sourced Framework | |
NSDI '23 | Skyplane: Optimizing Transfer Cost and Throughput Using Cloud-Aware Overlays | |
NSDI '23 | Addax: A fast, private, and accountable ad exchange infrastructure | |
NSDI '23 | Unlocking unallocated cloud capacity for long, uninterruptible workloads | |
NSDI '23 | Following the Data, Not the Function: Rethinking Function Orchestration in Serverless Computing | |
NSDI '23 | Fast, Approximate Vector Queries on Very Large Unstructured Datasets | |
NSDI '23 | Shockwave: Fair and Efficient Cluster Scheduling for Dynamic Adaptation in Machine Learning | |
NSDI '23 | Enhancing Global Network Monitoring with Magnifier | |
NSDI '23 | POLYCORN: Data-driven Cross-layer Multipath Networking for High-speed Railway through Composable Schedulerlets | |
USENIX Security '22 | An Audit of Facebook's Political Ad Policy Enforcement | Victor Le Pochat, Laura Edelson, Tom Van Goethem, Wouter Joosen, Damon McCoy, Tobias Lauinger |
USENIX Security '22 | "How Do You Not Lose Friends?": Synthesizing a Design Space of Social Controls for Securing Shared Digital Resources Via Participatory Design Jams | Eyitemi Moju-Igbene, Hanan Abdi, Alan Lu, Sauvik Das |
USENIX Security '22 | AMD Prefetch Attacks through Power and Time | Moritz Lipp, Daniel Gruss, Michael Schwarz |
USENIX Security '22 | Online Website Fingerprinting: Evaluating Website Fingerprinting Attacks on Tor in the Real World | Giovanni Cherubin, Rob Jansen, Carmela Troncoso |
USENIX Security '22 | "I feel invaded, annoyed, anxious and I may protect myself": Individuals' Feelings about Online Tracking and their Protective Behaviour across Gender and Country | Kovila P.L. Coopamootoo, Maryam Mehrnezhad, Ehsan Toreini |
USENIX Security '22 | Mistrust Plugins You Must: A Large-Scale Study Of Malicious Plugins In WordPress Marketplaces | Ranjita Pai Kasturi, Jonathan Fuller, Yiting Sun, Omar Chabklo, Andres Rodriguez, Jeman Park, Brendan Saltaformaggio |
USENIX Security '22 | Web Cache Deception Escalates! | Seyed Ali Mirheidari, Matteo Golinelli, Kaan Onarlioglu, Engin Kirda, Bruno Crispo |
USENIX Security '22 | Exploring the Unchartered Space of Container Registry Typosquatting | Guannan Liu, Xing Gao, Haining Wang, Kun Sun |
USENIX Security '22 | LinKRID: Vetting Imbalance Reference Counting in Linux kernel with Symbolic Execution | Jian Liu, Lin Yi, Weiteng Chen, Chengyu Song, Zhiyun Qian, Qiuping Yi |
USENIX Security '22 | Hiding in Plain Sight? On the Efficacy of Power Side Channel-Based Control Flow Monitoring | Yi Han, Matthew Chan, Zahra Aref, Nils Ole Tippenhauer, Saman Zonouz |
USENIX Security '22 | Secure Poisson Regression | Mahimna Kelkar, Phi Hung Le, Mariana Raykova, Karn Seth |
USENIX Security '22 | Under the Hood of DANE Mismanagement in SMTP | Hyeonmin Lee, Md. Ishtiaq Ashiq, Moritz Müller, Roland van Rijswijk-Deij, Taekyoung "Ted" Kwon, Taejoong Chung |
USENIX Security '22 | The Dangers of Human Touch: Fingerprinting Browser Extensions through User Actions | Konstantinos Solomos, Panagiotis Ilia, Soroush Karami, Nick Nikiforakis, Jason Polakis |
USENIX Security '22 | Poisoning Attacks to Local Differential Privacy Protocols for Key-Value Data | Yongji Wu, Xiaoyu Cao, Jinyuan Jia, Neil Zhenqiang Gong |
USENIX Security '22 | Breaking Bridgefy, again: Adopting libsignal is not enough | Martin R. Albrecht, Raphael Eikenberg, Kenneth G. Paterson |
USENIX Security '22 | Many Roads Lead To Rome: How Packet Headers Influence DNS Censorship Measurement | Abhishek Bhaskar, Paul Pearce |