Papers

Search results

    ConferenceTitleAuthor(s)
    USENIX Security '24VeriSimplePIR: Verifiability in SimplePIR at No Online Cost for Honest ServersLeo de Castro, Keewoo Lee
    USENIX Security '24Trust Me If You Can – How Usable Is Trusted Types In Practice?Sebastian Roth, Lea Gröber, Philipp Baus, Katharina Krombholz, Ben Stock
    USENIX Security '24"I just hated it and I want my money back": Data-driven Understanding of Mobile VPN Service Switching Preferences in The WildRohit Raj, Mridul Newar, Mainack Mondal
    USENIX Security '24RECORD: A RECeption-Only Region Determination Attack on LEO Satellite UsersEric Jedermann, Martin Strohmeier, Vincent Lenders, Jens Schmitt
    USENIX Security '24When Threads Meet Interrupts: Effective Static Detection of Interrupt-Based Deadlocks in LinuxChengfeng Ye, Yuandao Cai, Charles Zhang
    USENIX Security '24On Data Fabrication in Collaborative Vehicular Perception: Attacks and CountermeasuresQingzhao Zhang, Shuowei Jin, Ruiyang Zhu, Jiachen Sun, Xumiao Zhang, Qi Alfred Chen, Z. Morley Mao
    USENIX Security '24ENG25519: Faster TLS 1.3 handshake using optimized X25519 and Ed25519Jipeng Zhang, Junhao Huang, Lirui Zhao, Donglong Chen, Çetin Kaya Koç
    USENIX Security '24Enabling Developers, Protecting Users: Investigating Harassment and Safety in VRAbhinaya S.B., Aafaq Sabir, Anupam Das
    USENIX Security '24Opportunistic Data Flow Integrity for Real-time Cyber-physical Systems Using Worst Case Execution Time ReservationYujie Wang, Ao Li, Jinwen Wang, Sanjoy Baruah, Ning Zhang
    USENIX Security '24With Great Power Come Great Side Channels: Statistical Timing Side-Channel Analyses with Bounded Type-1 ErrorsMartin Dunsche, Marcel Maehren, Nurullah Erinola, Robert Merget, Nicolai Bissantz, Juraj Somorovsky, Jörg Schwenk
    USENIX Security '24"These results must be false": A usability evaluation of constant-time analysis toolsMarcel Fourné, Daniel De Almeida Braga, Jan Jancar, Mohamed Sabt, Peter Schwabe, Gilles Barthe, Pierre-Alain Fouque, Yasemin Acar
    USENIX Security '24Dancer in the Dark: Synthesizing and Evaluating Polyglots for Blind Cross-Site ScriptingRobin Kirchner, Jonas Möller, Marius Musch, David Klein, Konrad Rieck, Martin Johns
    USENIX Security '24Spider-Scents: Grey-box Database-aware Web Scanning for Stored XSSEric Olsson, Benjamin Eriksson, Adam Doupé, Andrei Sabelfeld
    USENIX Security '24False Claims against Model Ownership ResolutionJian Liu, Rui Zhang, Sebastian Szyller, Kui Ren, N. Asokan
    USENIX Security '24A Friend's Eye is A Good Mirror: Synthesizing MCU Peripheral Models from Peripheral DriversChongqing Lei, Zhen Ling, Yue Zhang, Yan Yang, Junzhou Luo, Xinwen Fu
    USENIX Security '24SoK: Security of Programmable Logic ControllersEfrén López-Morales, Ulysse Planta, Carlos Rubio-Medrano, Ali Abbasi, Alvaro A. Cardenas
    USENIX Security '24Operation Mango: Scalable Discovery of Taint-Style Vulnerabilities in Binary Firmware ServicesWil Gibbs, Arvind S Raj, Jayakrishna Menon Vadayath, Hui Jun Tay, Justin Miller, Akshay Ajayan, Zion Leonahenahe Basque, Audrey Dutcher, Fangzhou Dong, Xavier Maso, Giovanni Vigna, Christopher Kruegel, Adam Doupé, Yan Shoshitaishvili, Ruoyu Wang
    USENIX Security '24FraudWhistler: A Resilient, Robust and Plug-and-play Adversarial Example Detection Method for Speaker RecognitionKun Wang, Xiangyu Xu, Li Lu, Zhongjie Ba, Feng Lin, Kui Ren
    USENIX Security '24Terrapin Attack: Breaking SSH Channel Integrity By Sequence Number ManipulationFabian Bäumer, Marcus Brinkmann, Jörg Schwenk
    OSDI '24Managing Memory Tiers with CXL in Virtualized EnvironmentsYuhong Zhong, Daniel S. Berger, Carl Waldspurger, Ryan Wee, Ishwar Agarwal, Rajat Agarwal, Frank Hady, Karthik Kumar, Mark D. Hill, Mosharaf Chowdhury, Asaf Cidon
    OSDI '24Llumnix: Dynamic Scheduling for Large Language Model ServingBiao Sun, Ziming Huang, Hanyu Zhao, Wencong Xiao, Xinyi Zhang, Yong Li, Wei Lin
    OSDI '24Validating the eBPF Verifier via State EmbeddingHao Sun, Zhendong Su
    OSDI '24Fairness in Serving Large Language ModelsYing Sheng, Shiyi Cao, Dacheng Li, Banghua Zhu, Zhuohan Li, Danyang Zhuo, Joseph E. Gonzalez, Ion Stoica
    NSDI '24Horus: Granular In-Network Task Scheduler for Cloud DatacentersParham Yassini, Khaled Diab, Saeed Mahloujifar, Mohamed Hefeeda
    NSDI '24Sifter: An Inversion-Free and Large-Capacity Programmable Packet SchedulerPeixuan Gao, Anthony Dalleggio, Jiajin Liu, Chen Peng, Yang Xu, H. Jonathan Chao

Pages