usenix

USENIX Security '22 - Fuzzware: Using Precise MMIO Modeling for Effective Firmware Fuzzing

USENIX Security '21 - Nyx: Greybox Hypervisor Fuzzing using Fast Snapshots and Affine Types

USENIX Security '19 - Less is More: Quantifying the Security Benefits of Debloating Web Applications

NSDI '24 - Horus: Granular In-Network Task Scheduler for Cloud Datacenters

USENIX Security '17 - Computer Security, Privacy, and DNA Sequencing...

USENIX Security '17 - Phoenix: Rebirth of a Cryptographic Password-Hardening Service

DEMO: Sound-Proof: Usable Two-Factor Authentication Based on Ambient Sound (USENIX Security 2015)

USENIX Security '19 - Tracing Transactions Across Cryptocurrency Ledgers

USENIX ATC '19 - Not So Fast: Analyzing the Performance of WebAssembly vs. Native Code

USENIX Security '20 - Sunrise to Sunset: Analyzing the End-to-end Life Cycle and Effectiveness...

USENIX Security '20 - The Industrial Age of Hacking

USENIX Security '22 - On the Security Risks of AutoML

USENIX Security ’17 - Understanding the Mirai Botnet

USENIX Security '20 - Pixel: Multi-signatures for Consensus

USENIX Security '22 - Communication-Efficient Triangle Counting under Local Differential Privacy

USENIX Security '22 - Binoculars: Contention-Based Side-Channel Attacks Exploiting the Page Walker

USENIX Security '21 - Collective Information Security in Large-Scale Urban Protests

USENIX Security '22 - Security and Privacy Perceptions of Third-Party Application Access for Google

USENIX Security '22 - Rapid Prototyping for Microarchitectural Attacks

USENIX Security '20 - Who's Calling? Characterizing Robocalls through Audio and Metadata Analysis

USENIX Security '22 - Secure Poisson Regression

USENIX Security '22 - SYMSAN: Time and Space Efficient Concolic Execution via Dynamic Data-flow

USENIX Security '22 - Characterizing the Security of Github CI Workflows

USENIX ATC '22 - Amazon DynamoDB: A Scalable, Predictably Performant, and Fully Managed NoSQL...