A whole new look is coming
Check back again soon!
Menu
Toggle menu visibility
About
Conferences
Upcoming
By Name
Calls for Papers
Grants
Sponsorship
Best Papers
Test of Time Awards
Multimedia
Conference FAQ
Conference Policies
Code of Conduct
Publications
Membership
Students
Search
Donate Today
Sign In
Search
About
USENIX Board
Staff
Good Works
Blog
Governance and Financials
USENIX Awards
USENIX Supporters
2024 Board Election
Board Meeting Minutes
Donate
Conferences
Upcoming
By Name
Calls for Papers
Grants
Sponsorship
Best Papers
Test of Time Awards
Multimedia
Conference FAQ
Conference Policies
Code of Conduct
Publications
Proceedings
Author Resources
;login: Online
Writing for ;login: Online
;login: Archive
Membership
Students
Conference Fees
Student Grant Program
Search
Donate Today
Conferences
Multimedia
Conferences
Donate Today
Enter terms
Retain current filters
Search results
Title
Conference
Speaker(s)
NetAuth: Supporting User-Based Network Services
USENIX Security '08
Manigandan Radhakrishnan, Jon A. Solworth
Hypervisor Support for Identifying Covertly Executing Binaries
USENIX Security '08
Lionel Litty, H. Andrés Lagar-Cavilla, David Lie
Selective Versioning in a Secure Disk System
USENIX Security '08
Swaminathan Sundararaman, Gopalan Sivathanu, Erez Zadok
Hackernomics
USENIX Security '08
Hugh Thompson
Privacy-Preserving Location Tracking of Lost or Stolen Devices: Cryptographic Techniques and Replacing Trusted Third Parties with DHTs
USENIX Security '08
Thomas Ristenpart, Gabriel Maganis, Arvind Krishnamurthy
Panalyst: Privacy-Aware Remote Error Analysis on Commodity Software
USENIX Security '08
Rui Wang, XiaoFeng Wang, Zhuowei Li
Multi-flow Attacks Against Network Flow Watermarking Schemes
USENIX Security '08
Negar Kiyavash, Amir Houmansadr, Nikita Borisov
Setting DNS's Hair on Fire
USENIX Security '08
David Dagon, Paul Vixie
Verifying Compliance of Trusted Programs
USENIX Security '08
Sandra Rueda, Dave King, Trent Jaeger
Helios: Web-based Open-Audit Voting
USENIX Security '08
Ben Adida
VoteBox: A Tamper-evident, Verifiable Electronic Voting System
USENIX Security '08
Daniel Sandler, Kyle Derr, Dan S. Wallach
The Ghost in the Browser and Other Frightening Stories About Web Malware
USENIX Security '08
Niels Provos
An Empirical Security Study of the Native Code in the JDK
USENIX Security '08
Gang Tan, Jason Croft
AutoISES: Automatically Inferring Security Specification and Detecting Violations
USENIX Security '08
Lin Tan, Xiaolan Zhang, Xiao Ma, Weiwei Xiong, Yuanyuan Zhou
Real-World Buffer Overflow Protection for Userspace & Kernelspace
USENIX Security '08
Michael Dalton, Hari Kannan, Christos Kozyrakis
Managing Insecurity: Practitioner Reflections on Social Costs of Security
USENIX Security '08
Darren Lacey
Decoupling Dynamic Program Analysis from Execution in Virtual Environments
USENIX ATC '08
Jim Chow, Tal Garfinkel, Peter M. Chen
Protection Strategies for Direct Access to Virtualized I/O Devices
USENIX ATC '08
Paul Willmann, Scott Rixner, Alan L. Cox
Bridging the Gap between Software and Hardware Techniques for I/O Virtualization
USENIX ATC '08
Jose Renato Santos, Yoshio Turner, G. (John) Janakiraman, Ian Pratt
Free and Open Source as Viewed by a Processor Developer
USENIX ATC '08
Peter Kronowitt
Idle Read After Write—IRAW
USENIX ATC '08
Alma Riska, Erik Riedel
Design Tradeoffs for SSD Performance
USENIX ATC '08
Nitin Agrawal, Vijayan Prabhakaran, Ted Wobber, John D. Davis, Mark Manasse, Rina Panigrahy
Context-Aware Mechanisms for Reducing Interactive Delays of Energy Management in Disks
USENIX ATC '08
Igor Crk, Chris Gniady
From Flapping Birds to Space Telescopes: The Modern Science of Origami
USENIX ATC '08
Robert J. Lang
Optimizing TCP Receive Performance
USENIX ATC '08
Aravind Menon, Willy Zwaenepoel
Pages
« first
‹ previous
…
5
6
7
8
9
10
11
12
13
…
next ›
last »