![]() |
Usenix Security 23 Hashtag Hashbased Integrity Protection For Tagged Architectures USENIX | 14:32 | 11.98 MB Download |
![]() |
Srecon25 Americas Beyond Sequential A Recipe For Async Pipeline Observability And Alerting USENIX | 35:47 | 4.77 MB Download |
![]() |
Usenix Atc 22 Amazon Dynamodb A Scalable Predictably Performant And Y Managed Nosql USENIX | 20:11 | 16.63 MB Download |
![]() |
Usenix Atc 19 Zanzibar Googles Consistent Global Authorization System USENIX | 21:16 | 17.52 MB Download |
![]() |
Usenix Security 24 Calculatency Leveraging Crosslayer Network Latency Measurements To Detect USENIX | 11:22 | 9.37 MB Download |
![]() |
Usenix Security 23 Inception Exposing New Attack Surfaces With Training In Transient Execution USENIX | 11:59 | 9.87 MB Download |
![]() |
Usenix Atc 24 Limitations And Opportunities Of Modern Hardware Isolation Mechanisms USENIX | 19:30 | 16.07 MB Download |
![]() |
Usenix Security 24 Soap A Social Authentication Protocol USENIX | 11:45 | 9.68 MB Download |
![]() |
Usenix Security 19 The Spies Hacking Our Phones Are Going Dark And Were All In Trouble USENIX | 54:57 | 4.08 MB Download |
![]() |
Usenix Security 23 Isolated And Exhausted Attacking Operating Systems Via Site Isolation In USENIX | 11:31 | 9.49 MB Download |
![]() |
Usenix Security 24 What Was Your Prompt A Remote Keylogging Attack On Ai Assistants USENIX | 13:15 | 10.92 MB Download |
![]() |
Usenix Security 24 Hermes Unlocking Security Analysis Of Cellular Network Protocols By USENIX | 12:53 | 10.62 MB Download |
![]() |
Usenix Security 24 Engaging Company Developers In Security Research Studies A Comprehensive USENIX | 11:41 | 9.63 MB Download |
![]() |
Usenix Atc 23 Lifting The Veil On Metas Microservice Architecture Analyses Of Topology And USENIX | 19:46 | 16.29 MB Download |
![]() |
Usenix Security 24 Record A Receptiononly Region Determination Attack On Leo Satellite Users USENIX | 11:15 | 9.27 MB Download |
![]() |
Usenix Security 24 Whisperfuzz Whitebox Fuzzing For Detecting And Locating Timing USENIX | 11:40 | 9.61 MB Download |
![]() |
Usenix Security 24 Critical Code Guided Directed Greybox Fuzzing For Commits USENIX | 10:27 | 8.61 MB Download |
![]() |
Usenix Security 21 The Circle Of Life A Largescale Study Of The Iot Malware Lifecycle USENIX | 12:25 | 10.23 MB Download |