USENIX supports diversity, equity, and inclusion and condemns hate and discrimination.
Papers
Search results
Conference | Title | Author(s) |
---|---|---|
NSDI '23 | Rearchitecting the TCP Stack for I/O-Offloaded Content Delivery | Taehyun Kim, Deondre Martin Ng, Junzhi Gong, Youngjin Kwon, Minlan Yu, KyoungSoo Park |
NSDI '23 | Scalable Distributed Massive MIMO Baseband Processing | Junzhi Gong, Anuj Kalia, Minlan Yu |
NSDI '23 | NetPanel: Traffic Measurement of Exchange Online Service | Yu Chen, Liqun Li, Yu Kang, Boyang Zheng, Yehan Wang, More Zhou, Yuchao Dai, Zhenguo Yang, Brad Rutkowski, Jeff Mealiffe, Qingwei Lin |
NSDI '23 | DChannel: Accelerating Mobile Applications With Parallel High-bandwidth and Low-latency Channels | William Sentosa, Balakrishnan Chandrasekaran, P. Brighten Godfrey, Haitham Hassanieh, Bruce Maggs |
NSDI '23 | A High-Speed Stateful Packet Processing Approach for Tbps Programmable Switches | Mariano Scazzariello, Tommaso Caiazzi, Hamid Ghasemirahni, Tom Barbette, Dejan Kostić, Marco Chiesa |
NSDI '23 | xBGP: Faster Innovation in Routing Protocols | Thomas Wirtgen, Tom Rousseaux, Quentin De Coninck, Nicolas Rybowski, Randy Bush, Laurent Vanbever, Axel Legay, Olivier Bonaventure |
NSDI '23 | RECL: Responsive Resource-Efficient Continuous Learning for Video Analytics | Mehrdad Khani, Ganesh Ananthanarayanan, Kevin Hsieh, Junchen Jiang, Ravi Netravali, Yuanchao Shu, Mohammad Alizadeh, Victor Bahl |
NSDI '23 | SRNIC: A Scalable Architecture for RDMA NICs | Zilong Wang, Layong Luo, Qingsong Ning, Chaoliang Zeng, Wenxue Li, Xinchen Wan, Peng Xie, Tao Feng, Ke Cheng, Xiongfei Geng, Tianhao Wang, Weicheng Ling, Kejia Huo, Pingbo An, Kui Ji, Shideng Zhang, Bin Xu, Ruiqing Feng, Tao Ding, Kai Chen, Chuanxiong Guo |
USENIX Security '22 | "How Do You Not Lose Friends?": Synthesizing a Design Space of Social Controls for Securing Shared Digital Resources Via Participatory Design Jams | Eyitemi Moju-Igbene, Hanan Abdi, Alan Lu, Sauvik Das |
USENIX Security '22 | AMD Prefetch Attacks through Power and Time | Moritz Lipp, Daniel Gruss, Michael Schwarz |
USENIX Security '22 | "I feel invaded, annoyed, anxious and I may protect myself": Individuals' Feelings about Online Tracking and their Protective Behaviour across Gender and Country | Kovila P.L. Coopamootoo, Maryam Mehrnezhad, Ehsan Toreini |
USENIX Security '22 | Mistrust Plugins You Must: A Large-Scale Study Of Malicious Plugins In WordPress Marketplaces | Ranjita Pai Kasturi, Jonathan Fuller, Yiting Sun, Omar Chabklo, Andres Rodriguez, Jeman Park, Brendan Saltaformaggio |
USENIX Security '22 | Web Cache Deception Escalates! | Seyed Ali Mirheidari, Matteo Golinelli, Kaan Onarlioglu, Engin Kirda, Bruno Crispo |
USENIX Security '22 | Exploring the Unchartered Space of Container Registry Typosquatting | Guannan Liu, Xing Gao, Haining Wang, Kun Sun |
USENIX Security '22 | LinKRID: Vetting Imbalance Reference Counting in Linux kernel with Symbolic Execution | Jian Liu, Lin Yi, Weiteng Chen, Chengyu Song, Zhiyun Qian, Qiuping Yi |
USENIX Security '22 | Hiding in Plain Sight? On the Efficacy of Power Side Channel-Based Control Flow Monitoring | Yi Han, Matthew Chan, Zahra Aref, Nils Ole Tippenhauer, Saman Zonouz |
USENIX Security '22 | Secure Poisson Regression | Mahimna Kelkar, Phi Hung Le, Mariana Raykova, Karn Seth |
USENIX Security '22 | Under the Hood of DANE Mismanagement in SMTP | Hyeonmin Lee, Md. Ishtiaq Ashiq, Moritz Müller, Roland van Rijswijk-Deij, Taekyoung "Ted" Kwon, Taejoong Chung |
USENIX Security '22 | Helping hands: Measuring the impact of a large threat intelligence sharing community | Xander Bouwman, Victor Le Pochat, Pawel Foremski, Tom Van Goethem, Carlos H. Gañán, Giovane C. M. Moura, Samaneh Tajalizadehkhoob, Wouter Joosen, Michel van Eeten |
USENIX Security '22 | Your Microphone Array Retains Your Identity: A Robust Voice Liveness Detection System for Smart Speakers | Yan Meng, Jiachun Li, Matthew Pillari, Arjun Deopujari, Liam Brennan, Hafsah Shamsie, Haojin Zhu, Yuan Tian |
USENIX Security '22 | Lumos: Identifying and Localizing Diverse Hidden IoT Devices in an Unfamiliar Environment | Rahul Anand Sharma, Elahe Soltanaghaei, Anthony Rowe, Vyas Sekar |
USENIX Security '22 | A Large-scale Temporal Measurement of Android Malicious Apps: Persistence, Migration, and Lessons Learned | Yun Shen, Pierre-Antoine Vervier, Gianluca Stringhini |
USENIX Security '22 | "OK, Siri" or "Hey, Google": Evaluating Voiceprint Distinctiveness via Content-based PROLE Score | Ruiwen He, Xiaoyu Ji, Xinfeng Li, Yushi Cheng, Wenyuan Xu |
USENIX Security '22 | LTrack: Stealthy Tracking of Mobile Phones in LTE | Martin Kotuliak, Simon Erni, Patrick Leu, Marc Röschlin, Srdjan Čapkun |
USENIX Security '22 | Watching the Watchers: Practical Video Identification Attack in LTE Networks | Sangwook Bae, Mincheol Son, Dongkwan Kim, CheolJun Park, Jiho Lee, Sooel Son, Yongdae Kim |