USENIX Security '18-Q: Why Do Keynote Speakers Keep Suggesting That Improving Security Is Possible? USENIX 51:22 5 years ago 192 027 Скачать Далее
USENIX ATC '21/OSDI '21 Joint Keynote Address-It's Time for Operating Systems to Rediscover Hardware USENIX 1:06:20 3 years ago 38 541 Скачать Далее
USENIX Security '23 - How the Great Firewall of China Detects and Blocks Fully Encrypted Traffic USENIX 12:18 8 months ago 1 630 Скачать Далее
NSDI '24 - Horus: Granular In-Network Task Scheduler for Cloud Datacenters USENIX 17:33 2 months ago 605 Скачать Далее
USENIX Security '19 - Discovering and Understanding the Security Hazards in the USENIX 21:31 4 years ago 1 103 Скачать Далее
USENIX Security '17 - REM: Resource-Efficient Mining for Blockchains USENIX 30:35 6 years ago 977 Скачать Далее
USENIX Security '19 - 50 Ways to Leak Your Data: An Exploration of Apps' USENIX 18:14 4 years ago 4 247 Скачать Далее
USENIX Security '22 - How and Why People Use Virtual Private Networks USENIX 11:21 1 year ago 775 Скачать Далее
USENIX Security '19 - The KNOB is Broken: Exploiting Low Entropy in the Encryption Key USENIX 19:40 4 years ago 10 523 Скачать Далее
USENIX Security '19 - Leaky Images: Targeted Privacy Attacks in the Web USENIX 20:01 4 years ago 1 266 Скачать Далее
USENIX Security '19 - Terminal Brain Damage: Exposing the Graceless Degradation in Deep USENIX 18:44 4 years ago 482 Скачать Далее
USENIX Security '19 - Less is More: Quantifying the Security Benefits of Debloating Web Applications USENIX 18:50 4 years ago 454 Скачать Далее
USENIX Security '22 - Watching the Watchers: Practical Video Identification Attack in LTE Networks USENIX 10:56 1 year ago 690 Скачать Далее
SREcon24 Americas - "Logs Told Us It Was Kernel – It Wasn't" USENIX 30:18 3 months ago 637 Скачать Далее
USENIX Security '22 - TheHuzz: Instruction Fuzzing of Processors Using Golden-Reference Models for USENIX 12:28 1 year ago 614 Скачать Далее
USENIX ATC '17: Visualizing Performance with Flame Graphs USENIX 1:02:00 6 years ago 49 868 Скачать Далее