-
1
White-Stingray: Evaluating IMSI Catchers Detection Applications
Published 2017“…USENIX…”
Conference item -
2
SLAP: improving physical adversarial examples with short-lived adversarial perturbations
Published 2021“…USENIX…”
Conference item -
3
The KNOB is broken: Exploiting low entropy in the encryption key negotiation of Bluetooth BR/EDR
Published 2019“…USENIX…”
Conference item -
4
-
5
-
6
-
7
Losing the car keys: wireless PHY-layer insecurity in EV charging
Published 2019“…USENIX…”
Conference item -
8
Cliffhanger: Scaling Performance Cliffs in Web Memory Caches
Published 2017“…USENIX Association…”
Get full text
Get full text
Article -
9
Multi-person localization via RF body reflections
Published 2018“…USENIX Association…”
Get full text
Get full text
Get full text
Get full text
Article -
10
Just in time delivery: Leveraging operating systems knowledge for better datacenter congestion control
Published 2020“…USENIX Association…”
Get full text
Article -
11
Static checking of dynamically-varying security policies in database-backed applications
Published 2021“…USENIX Association…”
Get full text
Article -
12
Wishbone: Profile-based Partitioning for Sensornet Applications
Published 2010“…USENIX Association…”
Get full text
Get full text
Get full text
Get full text
Article -
13
Vpriv: Protecting Privacy in Location-Based Vehicular Services
Published 2010“…USENIX Association…”
Get full text
Get full text
Article -
14
Flexible, Wide-Area Storage for Distributed Systems with WheelFS
Published 2011“…USENIX Association…”
Get full text
Get full text
Get full text
Article -
15
Whanau: A Sybil-Proof Distributed Hash Table
Published 2011“…USENIX Association…”
Get full text
Get full text
Article -
16
Census: Location-Aware Membership Management for Large-Scale Distributed Systems
Published 2011“…USENIX Association…”
Get full text
Get full text
Article -
17
Intrusion Recovery Using Selective Re-execution
Published 2011“…USENIX Association…”
Get full text
Get full text
Get full text
Article -
18
Nemesis: Preventing Authentication & [and] Access Control Vulnerabilities in Web Applications
Published 2011“…USENIX Association…”
Get full text
Get full text
Article -
19
An Analysis of Linux Scalability to Many Cores
Published 2011“…USENIX Association…”
Get full text
Get full text
Get full text
Get full text
Article -
20
Separating Web Applications from User Data Storage with BSTORE
Published 2011“…USENIX Association…”
Get full text
Get full text
Article