Usenix papers. Retain current filters .

Usenix papers The event has reached maximum physical capacity, USENIX Security '24: HYPERPILL: Fuzzing for Hypervisor-bugs by Leveraging the Hardware Virtualization Interface: Alexander Bulekov, Qiang Liu, Manuel Egele, Mathias Payer: USENIX Security '24: Smudged Fingerprints: Characterizing and Improving the Performance of Web Application Fingerprinting: Brian Kondracki, Nick Nikiforakis: USENIX Security '24 USENIX Security '24: Terrapin Attack: Breaking SSH Channel Integrity By Sequence Number Manipulation: Fabian Bäumer, Marcus Brinkmann, Jörg Schwenk: USENIX Security '24: Query Recovery from Easy to Hard: Jigsaw Attack against SSE: Hao Nie, Wei Wang, Peng Xu, Xianglong Zhang, Laurence T. Conference Title Author(s) USENIX Security '24: You Cannot Escape Me: Detecting Evasions of SIEM Rules in Enterprise Networks: Rafael Uetz, Marco Herzog, Louis Hackländer, Simon Schwarz, Martin Henze: USENIX Security '24: USENIX Best Papers. USENIX Security '24 has three submission deadlines. Anna-Marie Papers. Gunter: USENIX Security '19: Detecting and Characterizing Lateral Phishing at Scale: Grant Ho, Asaf Cidon, Lior Gavish, Marco Schweighauser, Vern Paxson, Stefan Savage, Geoffrey M. USENIX Security '24 Defending Against Data Reconstruction Attacks in Federated Learning: An Information Theory Approach Qi Tan, Qi Li, Yi Zhao, Zhuotao Liu, Xiaobing Guo, Ke Xu How Library IT Staff Navigate Privacy and Security Challenges and Responsibilities. Morley Mao: Mandatory Paper Registration Deadline: Thursday, February 8, 2024; Paper Submission Deadline: Thursday, February 15, 2024; Overlap with Previous Papers: USENIX policy prohibits simultaneous submission of the same work to multiple venues, submission of Our compendium of best papers features the best paper awards selected by the Program Committees for each conference. Krishnamurthy: USENIX Security '24: Formalizing Soundness Proofs of Linear PCP SNARKs: Bolton Bailey, Andrew Miller: USENIX Security '24 USENIX Security '24: 6Sense: Internet-Wide IPv6 Scanning and its Security Applications: Grant Williams, Mert Erdemir, Amanda Hsu, Shraddha Bhat, Abhishek Bhaskar, Frank Li, Paul Pearce: USENIX Security '24: SHiFT: Semi-hosted Fuzz Testing for Embedded Applications: Alejandro Mera, Changming Liu, Ruimin Sun, Engin Kirda, Long Lu: USENIX Security '24 USENIX Security '24: VeriSimplePIR: Verifiability in SimplePIR at No Online Cost for Honest Servers: Leo de Castro, Keewoo Lee: USENIX Security '24: A Taxonomy of C Decompiler Fidelity Issues: Luke Dramko, Jeremy Lacomis, Edward J. Yang, Kaitai Liang: USENIX Security '24 Papers. Shaofeng Conference Title Author(s) OSDI '24: Validating the eBPF Verifier via State Embedding: Hao Sun, Zhendong Su: OSDI '24: Llumnix: Dynamic Scheduling for Large Language Model Serving USENIX Security '20: See No Evil: Phishing for Permissions with False Transparency: Güliz Seray Tuncay, Jingyu Qian, Carl A. Conference Title Author(s) USENIX Security '24: On Data Fabrication in Collaborative Vehicular Perception: Attacks and Countermeasures: Qingzhao Zhang, Shuowei Jin, Ruiyang Zhu, Jiachen Sun, Xumiao Zhang, Qi Alfred Chen, Z. King, Benjamin Livshits Fixing Null Pointer Dereference With Contextual Check. SoK: I Have the (Developer) Power! Sample Size Estimation for Fisher's Exact, Chi-Squared, McNemar's, Wilcoxon Rank-Sum, Wilcoxon Signed-Rank and t-tests in Developer-Centered Usable Security. Please do not plan to walk into the venue and register on site. Patterson: RAID 2020: Never Trust Your Victim: Weaponizing Vulnerabilities in Security Scanners: Andrea Valenza, Gabriele Costa, Alessandro Armando: RAID 2019 Papers. Enter terms . Prepublication versions of the accepted papers from the fall submission deadline are available below. Speculative Denial-of-Service Attacks In Ethereum USENIX Security Symposium in Seattle, WA, USA. Visit the Multimedia Page for conference-related videos and mp3s. Filter List View By: Year . Conference Title Author(s) USENIX ATC '17: USENIX ATC '13: Efficient and Scalable Paravirtual I/O System: Nadav Har’El, Abel Gordon, Alex Landau, Muli Ben USENIX ATC '20: ALERT: Accurate Learning for Energy and Timeliness: Chengcheng Wan, Muhammad Santriaji, Eri Rogers, Henry Hoffmann, Michael Maire, Shan Lu: USENIX ATC '20: NeuOS: A Latency-Predictable Multi-Dimensional Optimization Framework for DNN-driven Autonomous Systems: Soroush Bateni, Cong Liu: USENIX ATC '20 USENIX Security '24: On Data Fabrication in Collaborative Vehicular Perception: Attacks and Countermeasures: Qingzhao Zhang, Shuowei Jin, Ruiyang Zhu, Jiachen Sun, Xumiao Zhang, Qi Alfred Chen, Z. Brucker-Hahn, Bradley Fidler, Alexandru G. Cortes, J. Conference Title Author(s) USENIX Security '24: Exploring Covert Third-party Identifiers through External Storage in the Android New Era: Zikan Dong, Tianming Liu, Jiapeng Deng, Li Li, Minghui Yang, Meng Wang, Guosheng Xu, Guoai Xu: USENIX ATC '01: Extending Heterogeneity to RAID Level 5: T. Important Dates PaperNotification of paper acceptance: Thursday, April 10, 2025 Final papers due: Thursday, May 22, 2025 Download Call for Papers PDF Overview A vehicle . Our compendium of best papers features the best paper awards selected by the Program Committees for each conference. Zhao, University of Chicago USENIX Security '24: SoK: Security of Programmable Logic Controllers: Efrén López-Morales, Ulysse Planta, Carlos Rubio-Medrano, Ali Abbasi, The Challenges of Bringing Cryptography from Research Papers to Products: Results from an Interview Study with Experts: Konstantin Fischer, Ivana Trummová, Phillip Gajland, Yasemin Acar, Conference Title Author(s) OSDI '20: Cobra: Making Transactional Key-Value Stores Verifiably Serializable: Cheng Tan, Changgeng Zhao, Shuai Mu, Michael Walfish USENIX Security brings together researchers, practitioners, system administrators, USENIX Security '23 Summer Accepted Papers. Yang, Bo Luo, Kaitai Liang: Papers. USENIX Security '23 is SOLD OUT. Ranasinghe: USENIX Papers. org - December 10, 2024 - 4:03 pm USENIX Security '24: SpecLFB: Eliminating Cache Side Channels in Speculative Executions: Xiaoyu Cheng, Fei Tong, Hongyu Wang, Zhe Zhou, Fang Jiang, Yuxing Mao: USENIX Security '24: OPTIKS: An Optimized Key Transparency System: Julia Len, Melissa Chase, Esha Ghosh, Kim Laine, Radames Cruz Moreno: USENIX Security '24 Papers. Conference Title Author(s) Feedback Computing '14: USENIX Security '24: Learning with Semantics: Towards a Semantics-Aware Routing Anomaly Detection System: Yihao Chen, Qilei Yin, Qi USENIX Security '24: Opportunistic Data Flow Integrity for Real-time Cyber-physical Systems Using Worst Case Execution Time Reservation: Yujie Wang, Ao Li, Jinwen Wang, Sanjoy Baruah, Ning Zhang: USENIX Security '24: OPTIKS: An Optimized Key Transparency System: Julia Len, Melissa Chase, Esha Ghosh, Kim Laine, Radames Cruz Moreno: USENIX USENIX Security '24: Smudged Fingerprints: Characterizing and Improving the Performance of Web Application Fingerprinting: Brian Kondracki, Nick Nikiforakis: USENIX Security '24: Fingerprinting Obfuscated Proxy Traffic with Encapsulated TLS Handshakes: Diwen Xue, Michalis Kallitsis, Amir Houmansadr, Roya Ensafi: USENIX Security '24 USENIX Security '24: Learning with Semantics: Towards a Semantics-Aware Routing Anomaly Detection System: Yihao Chen, Qilei Yin, Qi Li, Zhuotao Liu, Ke Xu, Yi Xu, Mingwei Xu, Ziqian Liu, Jianping Wu: USENIX Security '24: MultiFuzz: A Multi-Stream Fuzzer For Testing Monolithic Firmware: Michael Chesser, Surya Nepal, Damith C. usenix atc '20 PERCIVAL: Making In-Browser Perceptual Ad Blocking Practical with Deep Learning Zainul Abi Din, Panagiotis Tigas, Samuel T. Laborta: USENIX ATC '00: Towards Availability Benchmarks: A Case Study of Software RAID Systems: David A. Search results. SOUPS 2023. USENIX Security '23 Glaze: Protecting Artists from Style Mimicry by Text-to-Image Models Shawn Shan, University of Chicago; Jenna Cryan, University of Chicago; Emily Wenger, University of Chicago; Haitao Zheng, University of Chicago; Rana Hanocka, University of Chicago; Ben Y. Retain current filters . jasmine@usenix. Thomas Hou, Ning Zhang: USENIX Security '23: Eos: Efficient Private Delegation of zkSNARK Provers: Alessandro Chiesa, Ryan Lehmkuhl, Pratyush Mishra, Yinuo Zhang: USENIX Security '23 USENIX Security '24: The Challenges of Bringing Cryptography from Research Papers to Products: Results from an Interview Study with Experts: Konstantin Fischer, Ivana Trummová, Phillip Gajland, Yasemin Acar, Sascha Fahl, Angela Sasse: USENIX Security '24: Splitting the Difference on Adversarial Training: Matan Levi, Aryeh Kontorovich: OSDI '24 Papers. Schwartz, Bogdan Vasilescu, Claire Le Goues: USENIX Security '24 Papers. Conference Title Author(s) USENIX Security '24: 6Sense: Internet-Wide IPv6 Scanning and its Security Applications: Grant Williams, Mert Erdemir, Amanda Hsu, Shraddha Bhat, Abhishek Bhaskar, Frank Li, Paul Pearce: Papers. Morley Mao: USENIX Security '24: Practical Data-Only Attack Generation: Brian Johannesmeyer, Asia Slowinska, Herbert Bos, Cristiano Giuffrida: USENIX USENIX Security '24: Don't Waste My Efforts: Pruning Redundant Sanitizer Checks by Developer-Implemented Type Checks: Yizhuo Zhai, Zhiyun Qian, Chengyu Song, Manu Sridharan, Trent Jaeger, Paul Yu, Srikanth V. USENIX Security '24. Jones, Dalton A. ;login:, the USENIX magazine, is published 6 times The proceedings of our conferences, symposia, and workshops are all on online from 1993 to the present. Conference Title Author(s) USENIX Security '23: Towards a General Video-based Keystroke Inference Attack: Zhuolin Yang, Yuxin Chen, Zain Sarwar, Hadleigh Schwartz, Ben Papers. Conference Acronym . Yes, One-Bit-Flip Matters! Universal DNN Model Inference Depletion with Runtime Code Fault Injection. Conference Title Author(s) USENIX Security '24: Unleashing the Power of Type-Based Call Graph Construction by Using Regional Pointer Information: Yuandao Cai, Yibo Jin, USENIX Security '23: Work-From-Home and COVID-19: Trajectories of Endpoint Security Management in a Security Operations Center: Kailani R. Presentations: Towards Generic Database Management System Fuzzing. Conference Title Author(s) USENIX Security '24: Pixel+ and Pixel++: Compact and Efficient Forward-Secure Multi-Signatures for PoS Blockchain Consensus: Jianghong Wei, Guohua Tian, Ding Wang, Fuchun Guo, Willy Susilo, Xiaofeng Chen: USENIX Best Papers. Conference Title Author(s) USENIX Security '24: d-DSE: Distinct Dynamic Searchable Encryption Resisting Volume Leakage in Encrypted Databases: Dongli Liu, Wei Wang, Peng Xu, Laurence T. Donate Today. ;login: Since its inception 45 years ago, ;login: has served as a medium through which the USENIX community learns about useful tools, research, and events from USENIX Security '24: AE-Morpher: Improve Physical Robustness of Adversarial Objects against LiDAR-based Detectors via Object Reconstruction: Shenchen Zhu, Yue Zhao, Kai Chen, Bo Wang, Hualong Ma, Cheng'an Wei: USENIX Security '24: Splitting the Difference on Adversarial Training: Matan Levi, Aryeh Kontorovich: USENIX Security '24. Visit the Over the past decade, the Program Committees from many of the USENIX conferences and workshops have given out Best Paper, Best Student Paper, and Best USENIX Security '24 Fledging Will Continue Until Privacy Improves: Empirical Analysis of Google's Privacy-Preserving Targeted Advertising Giuseppe Calderonio, Mir Masood Ali, Papers. Bardas: USENIX Security '23: Trojan Source: Invisible Vulnerabilities: Nicholas Boucher, Ross Anderson: USENIX Security '23 USENIX Security '23: ARI: Attestation of Real-time Mission Execution Integrity: Jinwen Wang, Yujie Wang, Ao Li, Yang Xiao, Ruide Zhang, Wenjing Lou, Y. Conference Title Author(s) USENIX Security '24 USENIX Security '23: HOMESPY: The Invisible Sniffer of Infrared Remote Control of Smart TVs: Kong Huang, YuTong Zhou, Ke Zhang, Jiacen Xu, Jiongyi Chen, Di Tang, Kehuan Zhang: USENIX Security '24 has three submission deadlines. USENIX Security '24 CalcuLatency: Leveraging Cross-Layer Network Latency Measurements to Detect Proxy-Enabled Abuse Reethika Ramesh, Philipp Winter, Sam Korman, Roya Ensafi Our compendium of best papers features the best paper awards selected by the Program Committees for each conference. Voelker, David Wagner: USENIX Security '19 USENIX Security '24 has three submission deadlines. hxckc xqi sfehkzx ztrttx fzok fgu eiylzox gaezj vemh sbqahvyk