Papers

Search results

    ConferenceTitleAuthor(s)
    NSDI '23Rearchitecting the TCP Stack for I/O-Offloaded Content DeliveryTaehyun Kim, Deondre Martin Ng, Junzhi Gong, Youngjin Kwon, Minlan Yu, KyoungSoo Park
    NSDI '23Scalable Distributed Massive MIMO Baseband ProcessingJunzhi Gong, Anuj Kalia, Minlan Yu
    NSDI '23NetPanel: Traffic Measurement of Exchange Online ServiceYu Chen, Liqun Li, Yu Kang, Boyang Zheng, Yehan Wang, More Zhou, Yuchao Dai, Zhenguo Yang, Brad Rutkowski, Jeff Mealiffe, Qingwei Lin
    NSDI '23DChannel: Accelerating Mobile Applications With Parallel High-bandwidth and Low-latency ChannelsWilliam Sentosa, Balakrishnan Chandrasekaran, P. Brighten Godfrey, Haitham Hassanieh, Bruce Maggs
    NSDI '23A High-Speed Stateful Packet Processing Approach for Tbps Programmable SwitchesMariano Scazzariello, Tommaso Caiazzi, Hamid Ghasemirahni, Tom Barbette, Dejan Kostić, Marco Chiesa
    NSDI '23xBGP: Faster Innovation in Routing ProtocolsThomas Wirtgen, Tom Rousseaux, Quentin De Coninck, Nicolas Rybowski, Randy Bush, Laurent Vanbever, Axel Legay, Olivier Bonaventure
    NSDI '23RECL: Responsive Resource-Efficient Continuous Learning for Video AnalyticsMehrdad Khani, Ganesh Ananthanarayanan, Kevin Hsieh, Junchen Jiang, Ravi Netravali, Yuanchao Shu, Mohammad Alizadeh, Victor Bahl
    NSDI '23SRNIC: A Scalable Architecture for RDMA NICsZilong Wang, Layong Luo, Qingsong Ning, Chaoliang Zeng, Wenxue Li, Xinchen Wan, Peng Xie, Tao Feng, Ke Cheng, Xiongfei Geng, Tianhao Wang, Weicheng Ling, Kejia Huo, Pingbo An, Kui Ji, Shideng Zhang, Bin Xu, Ruiqing Feng, Tao Ding, Kai Chen, Chuanxiong Guo
    USENIX Security '22"How Do You Not Lose Friends?": Synthesizing a Design Space of Social Controls for Securing Shared Digital Resources Via Participatory Design JamsEyitemi Moju-Igbene, Hanan Abdi, Alan Lu, Sauvik Das
    USENIX Security '22AMD Prefetch Attacks through Power and TimeMoritz Lipp, Daniel Gruss, Michael Schwarz
    USENIX Security '22"I feel invaded, annoyed, anxious and I may protect myself": Individuals' Feelings about Online Tracking and their Protective Behaviour across Gender and CountryKovila P.L. Coopamootoo, Maryam Mehrnezhad, Ehsan Toreini
    USENIX Security '22Mistrust Plugins You Must: A Large-Scale Study Of Malicious Plugins In WordPress MarketplacesRanjita Pai Kasturi, Jonathan Fuller, Yiting Sun, Omar Chabklo, Andres Rodriguez, Jeman Park, Brendan Saltaformaggio
    USENIX Security '22Web Cache Deception Escalates!Seyed Ali Mirheidari, Matteo Golinelli, Kaan Onarlioglu, Engin Kirda, Bruno Crispo
    USENIX Security '22Exploring the Unchartered Space of Container Registry TyposquattingGuannan Liu, Xing Gao, Haining Wang, Kun Sun
    USENIX Security '22LinKRID: Vetting Imbalance Reference Counting in Linux kernel with Symbolic ExecutionJian Liu, Lin Yi, Weiteng Chen, Chengyu Song, Zhiyun Qian, Qiuping Yi
    USENIX Security '22Hiding in Plain Sight? On the Efficacy of Power Side Channel-Based Control Flow MonitoringYi Han, Matthew Chan, Zahra Aref, Nils Ole Tippenhauer, Saman Zonouz
    USENIX Security '22Secure Poisson RegressionMahimna Kelkar, Phi Hung Le, Mariana Raykova, Karn Seth
    USENIX Security '22Under the Hood of DANE Mismanagement in SMTPHyeonmin Lee, Md. Ishtiaq Ashiq, Moritz Müller, Roland van Rijswijk-Deij, Taekyoung "Ted" Kwon, Taejoong Chung
    USENIX Security '22Helping hands: Measuring the impact of a large threat intelligence sharing communityXander Bouwman, Victor Le Pochat, Pawel Foremski, Tom Van Goethem, Carlos H. Gañán, Giovane C. M. Moura, Samaneh Tajalizadehkhoob, Wouter Joosen, Michel van Eeten
    USENIX Security '22Your Microphone Array Retains Your Identity: A Robust Voice Liveness Detection System for Smart SpeakersYan Meng, Jiachun Li, Matthew Pillari, Arjun Deopujari, Liam Brennan, Hafsah Shamsie, Haojin Zhu, Yuan Tian
    USENIX Security '22Lumos: Identifying and Localizing Diverse Hidden IoT Devices in an Unfamiliar EnvironmentRahul Anand Sharma, Elahe Soltanaghaei, Anthony Rowe, Vyas Sekar
    USENIX Security '22A Large-scale Temporal Measurement of Android Malicious Apps: Persistence, Migration, and Lessons LearnedYun Shen, Pierre-Antoine Vervier, Gianluca Stringhini
    USENIX Security '22"OK, Siri" or "Hey, Google": Evaluating Voiceprint Distinctiveness via Content-based PROLE ScoreRuiwen He, Xiaoyu Ji, Xinfeng Li, Yushi Cheng, Wenyuan Xu
    USENIX Security '22LTrack: Stealthy Tracking of Mobile Phones in LTEMartin Kotuliak, Simon Erni, Patrick Leu, Marc Röschlin, Srdjan Čapkun
    USENIX Security '22Watching the Watchers: Practical Video Identification Attack in LTE NetworksSangwook Bae, Mincheol Son, Dongkwan Kim, CheolJun Park, Jiho Lee, Sooel Son, Yongdae Kim

Pages