USENIX Security '18-Q: Why Do Keynote Speakers Keep Suggesting That Improving Security Is Possible?
51:22
189.856
USENIX Security '18-Q: Why Do Keynote Speakers Keep Suggesting That Improving Se
USENIX ATC '21/OSDI '21 Joint Keynote Address-It's Time for Operating Systems to Rediscover Hardware
1:06:20
37.321
USENIX ATC '21/OSDI '21 Joint Keynote Address-It's Time for Operating Systems to
USENIX ATC '23 - Arbitor: A Numerically Accurate Hardware Emulation Tool for DNN Accelerators
18:03
275
USENIX ATC '23 - Arbitor: A Numerically Accurate Hardware Emulation Tool for DNN
USENIX ATC '22 - Amazon DynamoDB: A Scalable, Predictably Performant, and Fully Managed NoSQL...
20:11
3.049
USENIX ATC '22 - Amazon DynamoDB: A Scalable, Predictably Performant, and Fully
USENIX Security '23 - DynSQL: Stateful Fuzzing for Database Management Systems with Complex and...
10:51
86
USENIX Security '23 - DynSQL: Stateful Fuzzing for Database Management Systems w
USENIX ATC '19 - Zanzibar: Google’s Consistent, Global Authorization System
21:16
11.469
USENIX ATC '19 - Zanzibar: Google’s Consistent, Global Authorization System
USENIX Security '22 - Creating a Secure Underlay for the Internet
12:24
190
USENIX Security '22 - Creating a Secure Underlay for the Internet
USENIX ATC '19 - LegoOS: A Disseminated, Distributed OS for Hardware Resource Disaggregation
25:38
2.229
USENIX ATC '19 - LegoOS: A Disseminated, Distributed OS for Hardware Resource Di
USENIX Security '19 - 50 Ways to Leak Your Data: An Exploration of Apps'
18:14
4.185
USENIX Security '19 - 50 Ways to Leak Your Data: An Exploration of Apps'
USENIX Security '22 - SCRAPS: Scalable Collective Remote Attestation for Pub-Sub IoT Networks with
13:50
364
USENIX Security '22 - SCRAPS: Scalable Collective Remote Attestation for Pub-Sub
USENIX Security '22 - Dos and Don'ts of Machine Learning in Computer Security
12:11
1.514
USENIX Security '22 - Dos and Don'ts of Machine Learning in Computer Security
USENIX Security '22 - Private Signaling
14:28
378
USENIX Security '22 - Private Signaling
USENIX Security '22 - Zero-Knowledge Middleboxes
11:53
473
USENIX Security '22 - Zero-Knowledge Middleboxes
USENIX Security '19 - Discovering and Understanding the Security Hazards in the
21:31
1.076
USENIX Security '19 - Discovering and Understanding the Security Hazards in the
USENIX Security '22 - Aardvark: An Asynchronous Authenticated Dictionary with Applications to
12:02
162
USENIX Security '22 - Aardvark: An Asynchronous Authenticated Dictionary with Ap
USENIX ATC '22 - Direct Access, High-Performance Memory Disaggregation with DirectCXL
12:19
1.921
USENIX ATC '22 - Direct Access, High-Performance Memory Disaggregation with Dire
USENIX Enigma 2016 - NSA TAO Chief on Disrupting Nation State Hackers
34:56
173.006
USENIX Enigma 2016 - NSA TAO Chief on Disrupting Nation State Hackers
USENIX Security '21 - Automatic Policy Generation for Inter-Service Access Control of Microservices
11:56
409
USENIX Security '21 - Automatic Policy Generation for Inter-Service Access Contr
USENIX Security '21 - Extracting Training Data from Large Language Models
11:28
2.296
USENIX Security '21 - Extracting Training Data from Large Language Models
USENIX Security '20 - NXNSAttack: Recursive DNS Inefficiencies and Vulnerabilities
12:00
1.301
USENIX Security '20 - NXNSAttack: Recursive DNS Inefficiencies and Vulnerabiliti
USENIX Security '19 - Lessons Learned from Evaluating the Robustness of Defenses to
48:15
1.430
USENIX Security '19 - Lessons Learned from Evaluating the Robustness of Defenses
USENIX ATC '22 - High Throughput Replication with Integrated Membership Management
19:49
178
USENIX ATC '22 - High Throughput Replication with Integrated Membership Manageme
USENIX Security '18 - Fear the Reaper: Characterization and Fast Detection of Card Skimmers
21:34
1.810
USENIX Security '18 - Fear the Reaper: Characterization and Fast Detection of Ca
USENIX ATC '20 - Fine-Grained Isolation for Scalable, Dynamic, Multi-tenant Edge Clouds
20:42
466
USENIX ATC '20 - Fine-Grained Isolation for Scalable, Dynamic, Multi-tenant Edge
USENIX Security '22 - MOVERY: A Precise Approach for Modified Vulnerable Code Clone Discovery from
11:03
306
USENIX Security '22 - MOVERY: A Precise Approach for Modified Vulnerable Code Cl
Lightning Talk video USENIX Security'15 - #236 Pellegrino
0:55
207
Lightning Talk video USENIX Security'15 - #236 Pellegrino
USENIX Security '22 - ProFactory: Improving IoT Security via Formalized Protocol Customization
13:03
138
USENIX Security '22 - ProFactory: Improving IoT Security via Formalized Protocol
USENIX Security '22 - PrivGuard: Privacy Regulation Compliance Made Easier
10:47
256
USENIX Security '22 - PrivGuard: Privacy Regulation Compliance Made Easier
USENIX Security '22 - Uninvited Guests: Analyzing the Identity and Behavior of Certificate...
9:21
423
USENIX Security '22 - Uninvited Guests: Analyzing the Identity and Behavior of C
USENIX Security '22 - PoisonedEncoder: Poisoning the Unlabeled Pre-training Data in Contrastive
11:04
153
USENIX Security '22 - PoisonedEncoder: Poisoning the Unlabeled Pre-training Data
USENIX Security '22 - On the Security Risks of AutoML
10:16
178
USENIX Security '22 - On the Security Risks of AutoML
USENIX Security '22 - AMD Prefetch Attacks through Power and Time
11:33
371
USENIX Security '22 - AMD Prefetch Attacks through Power and Time
USENIX ATC '20 - Lightweight Preemptible Functions
26:13
271
USENIX ATC '20 - Lightweight Preemptible Functions
USENIX Security '18 - Enabling Refinable Cross-Host Attack Investigation with Efficient Data Flow...
21:55
197
USENIX Security '18 - Enabling Refinable Cross-Host Attack Investigation with Ef
USENIX Security '15 - Marionette: A Programmable Network Traffic Obfuscation System
30:50
133
USENIX Security '15 - Marionette: A Programmable Network Traffic Obfuscation Sys
USENIX Security '21 - Token-Level Fuzzing
10:32
390
USENIX Security '21 - Token-Level Fuzzing