Usenix papers. Retain current filters .

Usenix papers. Retain current filters .

  • Usenix papers SOUPS further prohibits the submission of substantially similar work to multiple venues. Please suggest significant USENIX Security papers published at least 10 years ago to be considered for the 2025 USENIX Security Test of Time Award. Yes, One-Bit-Flip Matters! Universal DNN Model Inference Depletion with Runtime Code Fault Injection. On the recommendation of a program chair, USENIX may take action against authors who Papers. All presenters must sign a consent to publish form, which allows USENIX to publish any slides, audio, and/or video of your presentation. USENIX Security '24: SOAP: A Social Authentication Protocol: Felix Linker, David Basin: USENIX Security '24: Logic Gone Astray: A Security Analysis Framework for the Control Plane Protocols of 5G Basebands: Kai Tu, Abdullah Al Ishtiaq, Syed Md Mukit Rashid, Yilu Dong, Weixuan Wang, Tianwei Wu, Syed Rafiul Hussain: USENIX Security '24 USENIX Security '24: Don't Waste My Efforts: Pruning Redundant Sanitizer Checks by Developer-Implemented Type Checks: Yizhuo Zhai, Zhiyun Qian, Chengyu Song, Manu Sridharan, Trent Jaeger, Paul Yu, Srikanth V. Conference Title Author(s) USENIX Security '24: USENIX ATC '20: Libnvmmio: Reconstructing Software IO Path with Failure-Atomic Memory-Mapped Interface: Jungsik Papers. Brought to you by USENIX, thanks to our open access policy. Conference Title Author(s) Feedback Computing '14: USENIX Security '24: Learning with Semantics: Towards a Semantics-Aware Routing Anomaly Detection System: Yihao Chen, Qilei Yin, Qi Li, Zhuotao Liu, Ke Xu, Yi Xu, Mingwei Xu, Ziqian Liu, Jianping Wu 2022 USENIX Annual Technical Conference will take place July 11–13, 2022, at the Omni La Costa Resort & Spa in Carlsbad, CA, USA. Conference Title Author(s) USENIX Security '24: Defending Against Data Reconstruction Attacks in Federated Learning: An Information Theory Approach: Qi Tan, Qi Li, Yi Zhao, Zhuotao Liu, Xiaobing Guo, Ke Xu: USENIX Security '24: USENIX Security '23: Humans vs. Morley Mao: USENIX Security '24: Practical Data-Only Attack Generation: Brian Johannesmeyer, Asia Slowinska, Herbert Bos, Cristiano Giuffrida: USENIX Papers. Important Dates. Conference Title Author(s) USENIX ATC '17: USENIX ATC '13: Efficient and Scalable Paravirtual I/O System: Nadav Har’El, Abel Gordon, Alex Landau, Muli Ben USENIX Security brings together researchers, practitioners, system programmers, and others to share and explore the latest advances in the security and privacy of computer systems and networks. Schwartz, Bogdan Vasilescu, Claire Le Goues: USENIX Security '24: Racing for TLS Certificate Validation: A Hijacker's Guide to the Android TLS Galaxy: Sajjad Pourali, Xiufen Yu, Lianying Zhao, Mohammad Mannan, Amr Youssef: USENIX Security '24 Papers. Cardenas The Challenges of Bringing Cryptography from Research Papers to Products: Results from an Interview Study with Experts: Konstantin Fischer, Ivana Trummová, Phillip Gajland, Yasemin Papers. Brucker-Hahn, Bradley Fidler, Alexandru G. USENIX Security '23 is SOLD OUT. Enter terms . Ranasinghe: USENIX Conference Title Author(s) OSDI '24: Validating the eBPF Verifier via State Embedding: Hao Sun, Zhendong Su: OSDI '24: Llumnix: Dynamic Scheduling for Large Language Model Serving Papers. Conference Title Author(s) USENIX Security '24: Transferability of White-box Perturbations: Query-Efficient Adversarial Attacks against Commercial DNN Services: Meng Shen, Changyue Li, Qi Li, Hao Lu, Liehuang Zhu, Ke Xu: USENIX Security '24: ResolverFuzz: Automated Discovery of DNS Resolver Vulnerabilities with Query-Response Fuzzing: Qifan Zhang, Xuesong Bai, Xiang Li, Haixin Duan, Qi Li, Zhou Li: USENIX Security '24: Mudjacking: Patching Backdoor Vulnerabilities in Foundation Models: Hongbin Liu, Michael K. Biega: USENIX Security '24: MultiFuzz: A Multi-Stream Fuzzer For Testing Monolithic Firmware: Michael Chesser, Surya Nepal, Damith C. Conference Title Author(s) USENIX Security '24: AI Psychiatry: Forensic Investigation of Deep Learning Networks in Memory Images: David Oygenblik, Carter Yagemann, Joseph Zhang, Arianna Mastali, Jeman Park, Brendan Saltaformaggio: Conference Title Author(s) NSDI '23: Enabling Users to Control their Internet: Ammar Tahir, Radhika Mittal: NSDI '23: Nu: Achieving Microsecond-Scale Resource Fungibility with Logical Processes Papers. Please do not plan to walk into the venue and register on site. MVP: Detecting Vulnerabilities using Patch-Enhanced Vulnerability Signatures. Krishnamurthy: USENIX Security '24: Formalizing Soundness Proofs of Linear PCP SNARKs: Bolton Bailey, Andrew Miller: USENIX Security '24 Papers. SoK: I Have the (Developer) Power! Sample Size Estimation for Fisher's Exact, Chi-Squared, McNemar's, Wilcoxon Rank-Sum, Wilcoxon Signed-Rank and t-tests in Developer-Centered Usable Security. The papers will be available online to everyone beginning on the first day of the symposium, August 16, 2017. Conference Title Author(s) USENIX Security '24: DeepEclipse: How to Break White-Box DNN-Watermarking Schemes: Alessandro Pegoraro, Carlotta Segna, Kavita Papers. Garcia, and Baris Ege. NSDI focuses on the design principles, implementation, and practical evaluation of networked and distributed systems. Hutchinson, Samuel T. Conference Title Author(s) USENIX Security '24: Fuzzing BusyBox: Leveraging LLM and Crash Reuse for Embedded Bug Unearthing: Yaroslav Oliinyk, Michael Scott, Ryan Tsang, Chongzhou Fang, Houman Homayoun: USENIX Security '24: USENIX Security '24: SOAP: A Social Authentication Protocol: Felix Linker, David Basin: USENIX Security '24: Logic Gone Astray: A Security Analysis Framework for the Control Plane Protocols of 5G Basebands: Kai Tu, Abdullah Al Ishtiaq, Syed Md Mukit Rashid, Yilu Dong, Weixuan Wang, Tianwei Wu, Syed Rafiul Hussain: USENIX Security '24 The 20th USENIX Conference on File and Storage Technologies (FAST '22) will take place on February 22–24, 2022, at the Hyatt Regency Santa Clara in Santa Clara, CA, USA. Patterson: USENIX Security '00: Shibboleth: Private Mailing List Manager: Matt Curtin: USENIX Security '00: A Chosen Ciphertext Attack Against Several E-Mail Encryption Protocols: Jonathan Katz, Bruce Schneier: LISA '98: Mailman: The GNU Mailing List USENIX Security '20: Drift with Devil: Security of Multi-Sensor Fusion based Localization in High-Level Autonomous Driving under GPS Spoofing: Junjie Shen, Jun Yeon Won, Zeyuan Chen, Qi Alfred Chen: USENIX Security '20: Horizontal Privilege Escalation in Trusted Applications: Darius Suciu, Stephen McLaughlin, Laurent Simon, Radu Sion: USENIX Papers. Please review and e-sign this form. Conference Title Author(s) USENIX Security '24 USENIX Security '24 "These results must be false": A usability evaluation of constant-time analysis tools: Marcel Fourné, Daniel De Almeida Braga, Jan Jancar, Mohamed Sabt, Peter Schwabe, Gilles Barthe, Pierre-Alain Papers. USENIX Security '24: SoK: Security of Programmable Logic Controllers: Efrén López-Morales, Ulysse Planta, Carlos Rubio-Medrano, Ali Abbasi, Alvaro A. Presentations: Towards Generic Database Management System Fuzzing. Ranasinghe: USENIX Conference Title Author(s) HotOS XV: Recommendations for Randomness in the Operating System, or How to Keep Evil Children out of Your Pool and Other Random Facts USENIX Security brings together researchers, practitioners, system administrators, system programmers, and others to share and explore the latest advances in the security and privacy of computer systems and networks. Zhao, Haitao Zheng: USENIX Security '24: On Data Fabrication in Collaborative Vehicular Perception: Attacks and Countermeasures: Qingzhao Zhang, Shuowei Jin, Ruiyang Zhu, Jiachen Sun, Xumiao Zhang, Qi Alfred Chen, Z. The event has reached maximum physical capacity, and we will not be able to accommodate any additional registrations. USENIX Security '22 Winter Accepted Papers. Cortes, J. 20,000+ pieces of conference content such as videos and refereed papers. M. The USENIX Journal of Election Technology and USENIX ATC '01: Extending Heterogeneity to RAID Level 5: T. If you are USENIX is committed to Open Access to the research presented at our events. Conference Title Author(s) USENIX Security '24: DARKFLEECE: Probing the Dark Side of Android Subscription Apps: Chang Yue, Chen Zhong, Kai Chen, Zhiyu Zhang, Yeonjoon Lee: USENIX Security '24: Papers. USENIX Security '19 had two submission deadlines. Chung, Brendan Saltaformaggio, Wenke Lee: USENIX Security '23: Egg Hunt in Tesla Infotainment: A First Look at Reverse Engineering of Qt Binaries: Haohuang Wen, Zhiqiang Lin Papers. USENIX Security '24: SpecLFB: Eliminating Cache Side Channels in Speculative Executions: Xiaoyu Cheng, Fei Tong, Hongyu Wang, Zhe Zhou, Fang Jiang, Yuxing Mao: USENIX Security '24: OPTIKS: An Optimized Key Transparency System: Julia Len, Melissa Chase, Esha Ghosh, Kim Laine, Radames Cruz Moreno: USENIX Security '24 Motivated by rising conference costs and increasing numbers of submitted and accepted papers, USENIX Security '25 will implement a new approach to presenting accepted papers and fostering interactions at the conference. Conference Title Author(s) USENIX ATC '14: Reliable Writeback for Client-side Flash Caches: USENIX ATC '19: INSIDER: Designing In-Storage Computing System for Emerging High-Performance Drive: Zhenyuan Ruan, Tong He, Jason Cong Papers. Laborta: USENIX ATC '00: Towards Availability Benchmarks: A Case Study of Software RAID Systems: David A. Filter List View By: Year . Conference Title Author(s) USENIX Security '21: Mind Your Weight(s): A Large-scale Study on Insufficient Machine Learning Model Protection in Mobile Apps: Zhichuang Sun, Ruimin Sun, Long Lu, Alan Mislove: USENIX Security '22:. Barr, Rebecca Smith, Scott Rixner: USENIX Security '23: Sherlock on Specs: Building LTE Conformance Tests through Automated Reasoning: Yi Chen, Di Tang, Yepeng Yao, Mingming Zha, XiaoFeng Wang, Xiaozhong Liu, Haixu Tang, Baoxu Liu: USENIX Security '23 USENIX ATC '03: Undo for Operators: Building an Undoable E-mail Store: Aaron B. Find out more below. Conference Title Author(s) USENIX Security '21: EOSAFE: Security Analysis of EOSIO Smart Contracts: Ningyu He, Ruiyi Zhang, Haoyu Wang, Lei Wu, Xiapu Luo, Papers. Conference Title Author(s) HealthTech '13: USENIX Security '10: Automatic Generation of Remediation Procedures for Malware Infections: Roberto Paleari, Lorenzo Martignoni, Emanuele Passerini, Drew Davidson, Matt Fredrikson, Jon Giffin, Somesh Jha Papers. As at all USENIX conferences, papers that analyze problem areas and draw important conclusions from practical experience are especially welcome. See All Content. Conference Title Author(s) USENIX Security '23: TreeSync: Authenticated Group Management for Messaging Layer Security: Théophile Wallez, Jonathan Protzenko, Benjamin Beurdouche, Karthikeyan Bhargavan: USENIX Security '23: Papers. USENIX USENIX Security '24: SHiFT: Semi-hosted Fuzz Testing for Embedded Applications: Alejandro Mera, Changming Liu, Ruimin Sun, Engin Kirda, Long Lu: USENIX Security '24: A Friend's Eye is A Good Mirror: Synthesizing MCU Peripheral Models from Peripheral Drivers: Chongqing Lei, Zhen Ling, Yue Zhang, Yan Yang, Junzhou Luo, Xinwen Fu: USENIX Security '23 Papers. USENIX Security '24 Summer Accepted Papers | USENIX USENIX Security '23: Squirrel: A Scalable Secure Two-Party Computation Framework for Training Gradient Boosting Decision Tree: Wen-jie Lu, Zhicong Huang, Qizhi Zhang, Yuchen Wang, Cheng Hong: USENIX Security '23: Authenticated private information retrieval: Simone Colombo, Kirill Nikitin, Henry Corrigan-Gibbs, David J. Zhao, Haitao Zheng Papers. USENIX Security '24 Web Platform Threats: Automated Detection of Web Security Issues With WPT Pedro Bernardo, Lorenzo Veronese, Valentino Dalla Valle, Stefano Calzavara, Marco Fixing Null Pointer Dereference With Contextual Check. org - December 10, 2024 - 4:03 pm Papers. Conference Title Author(s) USENIX ATC '20: USENIX ATC '20: DupHunter: Flexible High-Performance Deduplication for Docker Registries: Nannan Zhao, Hadeel Albahar, Subil Abraham, Keren Chen, Vasily Tarasov, Dimitrios Skourtis, Lukas Rupprecht, Ali Anwar, Ali R. Become a Sponsor: Sponsorship exposes your brand to highly qualified attendees, funds our grants program, supports open access to our conference content, and keeps USENIX conferences affordable. Thomas Hou, Ning Zhang: USENIX Security '23: Eos: Efficient Private Delegation of zkSNARK Provers: Alessandro Chiesa, Ryan Lehmkuhl, Pratyush Mishra, Yinuo Zhang: USENIX Security '23 USENIX ATC '20: ALERT: Accurate Learning for Energy and Timeliness: Chengcheng Wan, Muhammad Santriaji, Eri Rogers, Henry Hoffmann, Michael Maire, Shan Lu: USENIX ATC '20: NeuOS: A Latency-Predictable Multi-Dimensional Optimization Framework for DNN-driven Autonomous Systems: Soroush Bateni, Cong Liu: USENIX ATC '20 USENIX Security '24: Don't Waste My Efforts: Pruning Redundant Sanitizer Checks by Developer-Implemented Type Checks: Yizhuo Zhai, Zhiyun Qian, Chengyu Song, Manu Sridharan, Trent Jaeger, Paul Yu, Srikanth V. Conference Title Author(s) USENIX Security '23: A Data-free Backdoor Injection Approach in Neural Networks: Peizhuo Lv, Chang Yue, Ruigang Liang, Yunfei Yang, Shengzhi Zhang, Hualong Ma, Kai Chen: USENIX Security '23: Papers. Conference Acronym . Specific questions about submissions may be sent to the program co-chairs at sec17chairs@usenix. USENIX Security brings together researchers, practitioners, system administrators, system programmers, and The 19th USENIX Symposium on Networked Systems Design and Implementation (NSDI '22) will take place April 4–6, 2022, at the Hyatt Regency Lake Washington in Renton, WA, USA. Patterson: RAID 2020: Never Trust Your Victim: Weaponizing Vulnerabilities in Security Scanners: Andrea Valenza, Gabriele Costa, Alessandro Armando: RAID 2019 Conference Title Author(s) OSDI '20: Cobra: Making Transactional Key-Value Stores Verifiably Serializable: Cheng Tan, Changgeng Zhao, Shuai Mu, Michael Walfish USENIX Security '20 has four submission deadlines. King, Benjamin Livshits USENIX Security brings together researchers, practitioners, system programmers, and others to share and explore the latest advances in the security and privacy of computer systems and networks. Paper submissions due: Thursday, September 23, 2021, 11:59 pm PDT Author response period begins: Monday, USENIX Security '24 has three submission deadlines. 2025 USENIX Security Test of Time Award: Call for Nominations. Conference Title Author(s) USENIX Security '24: Loopy Hell(ow): Infinite Traffic Loops at the Application Layer: Yepeng Pan, Anna Ascheman, Christian Rossow: USENIX Security '24: Fingerprinting Obfuscated Proxy Traffic with Encapsulated TLS Handshakes: USENIX Best Papers. Butt USENIX Security '24 "I'm not convinced that they don't collect more than is necessary": User-Controlled Data Minimization Design in Search Engines: Tanusree Sharma, Lin Kyi, Yang Wang, Asia J. Conference Title Author(s) USENIX Security '24: USENIX Security '22: Jenny: Securing Syscalls for PKU-based Memory Isolation Systems: David Schrammel, Samuel USENIX Security '23: Work-From-Home and COVID-19: Trajectories of Endpoint Security Management in a Security Operations Center: Kailani R. Conference Title Author(s) USENIX Security '24: Unleashing the Power of Type-Based Call Graph Construction by Using Regional Pointer Information: Yuandao Cai, Yibo Jin, USENIX Security '23: ARI: Attestation of Real-time Mission Execution Integrity: Jinwen Wang, Yujie Wang, Ao Li, Yang Xiao, Ruide Zhang, Wenjing Lou, Y. The chairs will respond to This paper analyzes traces for millions of disks from production systems at Google, NetApp, and Backblaze to expose and understand transition overload as a roadblock to disk-adaptive redundancy: transition IO under existing approaches can consume 100% cluster IO continuously for several weeks. The USENIX WOOT Conference aims to present a broad picture of offense and its contributions, bringing together researchers and practitioners across all areas of computer security. Rothblum, Eran Omri, Junye Chen, Kunal Talwar: USENIX USENIX 1994 High-Speed Networking Symposium: A Framework for the Non-Monolithic Implementation of Protocols in the x-kernel : Parag K. Papers for the deployed systems track (occasionally referred to as the operational systems track in other USENIX conferences) need not present new ideas or results to be accepted but should convey All papers will be available online to registered attendees no earlier than Thursday, January 26, 2023. The list of accepted papers from the spring If your accepted paper should not be published prior to the event, please notify production@usenix. This state-of-the-art approach for WCD detection injects markers into The 20th USENIX Symposium on Networked Systems Design and Implementation (NSDI '23) will take place April 17–19, 2023, at the Boston Marriott Long Wharf in Boston, MA, USA. USENIX publishes ;login: and is the first technical membership association to offer open access to research, our events cover sysadmin, security, systems, & more. ;login:, the USENIX magazine, is published 6 times The USENIX Journal of Election Technology and Systems (JETS) is a new hybrid journal/conference where papers receive a journal-style reviewing process and online-only publication. Conference Title Author(s) USENIX Security '24: USENIX Security '24: ModelGuard: Information-Theoretic Defense Against Model Extraction Attacks: Minxue Tang, Anna Dai, Louis DiValentin, Aolin Ding, Amin Hass, Neil Zhenqiang Gong, Yiran Chen, Hai "Helen" Li USENIX Security brings together researchers, practitioners, system administrators, In a USENIX Security 2020 paper titled "Cached and Confused: Web Cache Deception in the Wild", researchers presented the first systematic exploration of the attack over 340 websites. Conference Title Author(s) USENIX Security '24: USENIX Security '24: ModelGuard: Information-Theoretic Defense Against Model Extraction Attacks: Minxue Tang, Anna Dai, Louis DiValentin, Aolin Ding, Amin Hass, Neil Zhenqiang Gong, Yiran Chen, Hai "Helen" Li Papers. Conference Title Author(s) USENIX Security '24: Closed-Form Bounds for DP-SGD against Record-level Inference Attacks: Giovanni Cherubin, Boris Köpf, Andrew Paverd, Shruti Tople, Lukas Wutschitz, Santiago Zanella-Béguelin: USENIX Security '24: Query Recovery from Easy to Hard: Jigsaw Attack against SSE: Hao Nie, Wei Wang, Peng Xu, Xianglong Zhang, Laurence T. The full program will be available in May 2020. Conference Title Author(s) USENIX Security '24: Speculative Denial-of-Service Attacks In Ethereum: Aviv Yaish, Kaihua Qin, Liyi Zhou, Aviv Zohar, Arthur Gervais: USENIX Security '23: Overlap with Previous Papers: USENIX policy prohibits simultaneous submission of the same work to multiple venues, submission of previously published work, and plagiarism. Building on the insights drawn, we present Papers. USENIX Security '24 Summer USENIX Security '23: ARI: Attestation of Real-time Mission Execution Integrity: Jinwen Wang, Yujie Wang, Ao Li, Yang Xiao, Ruide Zhang, Wenjing Lou, Y. The full program will be available soon. Thomas Hou, Ning Zhang: USENIX Security '23: Eos: Efficient Private Delegation of zkSNARK Provers: Alessandro Chiesa, Ryan Lehmkuhl, Pratyush Mishra, Yinuo Zhang: USENIX Security '23 USENIX Security '24: 6Sense: Internet-Wide IPv6 Scanning and its Security Applications: Grant Williams, Mert Erdemir, Amanda Hsu, Shraddha Bhat, Abhishek Bhaskar, Frank Li, Paul Pearce: USENIX Security '24: SHiFT: Semi-hosted Fuzz Testing for Embedded Applications: Alejandro Mera, Changming Liu, Ruimin Sun, Engin Kirda, Long Lu: USENIX Security '24 View the Call for Papers. All papers will be available on Wednesday, August 14, 2019. Jones, Dalton A. i10 runs on commodity hardware, allows unmodified applications to operate directly on kernel's TCP/IP network stack, and yet, saturates a 100Gbps link for remote accesses using CPU utilization similar to state-of-the Overlap with Previous Papers: USENIX policy prohibits simultaneous submission of the same work to multiple venues, submission of previously published work, and plagiarism. Any video, audio, and/or slides that are posted after the event are also free and open to everyone. Conference Title Author(s) USENIX Security '24: Exploring Covert Third-party Identifiers through External Storage in the Android New Era: Zikan Dong, Tianming Liu, Jiapeng Deng, Li Li, Minghui Yang, Meng Wang, Guosheng Xu, Guoai Xu: USENIX Security '24: Neural Network Semantic Backdoor Detection and Mitigation: A Causality-Based Approach: Bing Sun, Jun Sun, Wayne Koh, Jie Shi: USENIX Security '24: MAGIC: Detecting Advanced Persistent Threats via Masked Graph Representation Learning: Zian Jia, Yun Xiong, Yuhong Nan, Yao Zhang, Jinjing Zhao, Mi Wen: USENIX Security '24 The USENIX Journal of Election Technology and Systems (JETS) is a new hybrid journal/conference where papers receive a journal-style reviewing process and online-only publication. And growing. If your accepted paper should not be published prior to the event, please notify production@usenix. N. Conference Title Author(s) Feedback Computing '14: USENIX Security '24: Learning with Semantics: Towards a Semantics-Aware Routing Anomaly Detection System: Yihao Chen, Qilei Yin, Qi Li, Zhuotao Liu, Ke Xu, Yi Xu, Mingwei Xu, Ziqian Liu, Jianping Wu Please join us for the 30th USENIX Security Symposium, which will be held as a virtual event on August 11–13, 2021. Krishnamurthy: USENIX Security '24: Formalizing Soundness Proofs of Linear PCP SNARKs: Bolton Bailey, Andrew Miller: USENIX Security '24 USENIX Security '24: Fast RS-IOP Multivariate Polynomial Commitments and Verifiable Secret Sharing: Zongyang Zhang, Weihan Li, Yanpei Guo, Kexin Shi, Sherman S. Conference Title Author(s) USENIX Security '24: On Data Fabrication in Collaborative Vehicular Perception: Attacks and Countermeasures: Qingzhao Zhang, Shuowei Jin, Ruiyang Zhu, Jiachen Sun, Xumiao Zhang, Qi Alfred Chen, Z. Reiter, Mahmood Sharif: USENIX Security '23 USENIX Security '23: Humans vs. Support USENIX and our commitment to Open Access. USENIX Security '24: MAGIC: Detecting Advanced Persistent Threats via Masked Graph Representation Learning: Zian Jia, Yun Xiong, Yuhong Nan, Yao Zhang, Jinjing Zhao, Mi Wen: USENIX Security '24: Unleashing the Power of Type-Based Call Graph Construction by Using Regional Pointer Information: Yuandao Cai, Yibo Jin, Charles Zhang: USENIX Security '24 Papers. Conference Title Author(s) USENIX Security '24: Scalable Zero-knowledge Proofs for Non-linear Functions in Machine Learning: Meng Hao, Hanxiao Chen, Hongwei Li, Chenkai Weng, Yuan Zhang, Haomiao Yang, Tianwei Zhang: Please join us for the 30th USENIX Security Symposium, which will be held as a virtual event on August 11–13, 2021. Wu, Bryan Ford: USENIX Conference Title Author(s) NSDI '24: Habitus: Boosting Mobile Immersive Content Delivery through Full-body Pose Tracking and Multipath Networking: Anlan Zhang, Chendong Wang, Yuming Hu, Ahmad Hassan, Zejun Zhang, Bo Han, Feng Qian, Shichang Xu Conference Title Author(s) USENIX Security '23: PROGRAPHER: An Anomaly Detection System based on Provenance Graph Embedding: Fan Yang, Jiacen Xu, Chunlin Xiong, Zhou Li, Kehuan Zhang The 1999 USENIX Technical Conference Program Committee seeks original and innovative papers about the applications, architecture, implementation, and performance of modern computing systems. Please do not plan to walk into the venue and Special Paper Presentation: At 9:00 pm there will be a presentation of the USENIX Security '13 paper "Dismantling Megamos Crypto: Wirelessly Lockpicking a Vehicle Immobilizer,” by Roel Verdult, Flavio D. USENIX Security '24: Neural Network Semantic Backdoor Detection and Mitigation: A Causality-Based Approach: Bing Sun, Jun Sun, Wayne Koh, Jie Shi: USENIX Security '24: MAGIC: Detecting Advanced Persistent Threats via Masked Graph Representation Learning: Zian Jia, Yun Xiong, Yuhong Nan, Yao Zhang, Jinjing Zhao, Mi Wen: USENIX Security '24 USENIX Security '22: Membership Inference Attacks and Defenses in Neural Network Pruning: Xiaoyong Yuan, Lan Zhang: USENIX Security '22: Efficient Differentially Private Secure Aggregation for Federated Learning via Hardness of Learning with Errors: Timothy Stevens, Christian Skalka, Christelle Vincent, John Ring, Samuel Clark, Joseph Near USENIX Security brings together researchers, practitioners, system programmers, and others to share and explore the latest advances in the security and privacy of computer systems and networks. Over the past decade, the Program Committees from many of the USENIX conferences and workshops have given out Best Paper, Best Student Paper, and Best USENIX Security '24 6Sense: Internet-Wide IPv6 Scanning and its Security Applications Grant Williams, Mert Erdemir, Amanda Hsu, Shraddha Bhat, Abhishek Bhaskar, Frank Li, Paul Pearce USENIX ATC'20: 2020 USENIX Conference on Usenix Annual Technical Conference July 15 - 17, 2020 USENIX Security '23: Forming Faster Firmware Fuzzers: USENIX Security '23: PUMM: Preventing Use-After-Free Using Execution Unit Partitioning: Carter Yagemann, Simon P. Conference Title Author(s) USENIX Security '24: d-DSE: Distinct Dynamic Searchable Encryption Resisting Volume Leakage in Encrypted Databases: USENIX Security '23: HECO: Fully Homomorphic Encryption Compiler: Alexander Viand, Patrick Jattke, Miro Haller, Anwar Papers. Papers. Conference Title Author(s) USENIX Security '24: UIHash: Detecting Similar Android UIs through Grid-Based Visual Appearance Representation: Jiawei Li, Jian Mao, Jun Zeng, Qixiao Lin, USENIX Security brings together researchers, practitioners, system administrators, Prepublication versions of the accepted papers from the fall submission deadline are available below. This paper focuses on 5G RAN slicing, where the USENIX Security '24: HYPERPILL: Fuzzing for Hypervisor-bugs by Leveraging the Hardware Virtualization Interface: Alexander Bulekov, Qiang Liu, Manuel Egele, Mathias Payer: USENIX Security '24: Smudged Fingerprints: Characterizing and Improving the Performance of Web Application Fingerprinting: Brian Kondracki, Nick Nikiforakis: USENIX Security '24 Conference Title Author(s) NSDI '24: Horus: Granular In-Network Task Scheduler for Cloud Datacenters: Parham Yassini, Khaled Diab, Saeed Mahloujifar, Mohamed Hefeeda Papers. USENIX ATC '23 will bring together leading systems researchers for cutting-edge systems research and the opportunity to gain insight into a This paper presents design, implementation and evaluation of i10, a new remote storage stack implemented entirely in the kernel. jasmine@usenix. Conference Title Author(s) USENIX Security '24: USENIX Security '24: AttackGNN: Red-Teaming GNNs in Hardware Security Using Reinforcement Learning: Vasudev Gohil, Satwik Patnaik, Dileep Kalathil, Jeyavijayan Rajendran: USENIX Security brings together researchers, practitioners, system administrators, USENIX Security '23 Summer Accepted Papers. Papers and proceedings are freely available to everyone once the event begins. Conference Title Author(s) USENIX Security '24 "Belt and suspenders" or "just red tape"?: Investigating Early Artifacts and User Perceptions of IoT App Security Certification: Prianka Mandal, Amit Seal Ami, Victor Olaiya, Sayyed Hadi Razmjo, Adwait Nadkarni USENIX Security brings together researchers, practitioners, system administrators, USENIX Security '23 Summer Accepted Papers. Chanson: USENIX 1994 High-Speed Networking Symposium: TCP/IP and HIPPI Performance in the CASA Gigabit Testbed : Bilal Chinoy, Kevin Fall: USENIX 1994 High-Speed Networking Conference Title Author(s) NSDI '24: Flow Scheduling with Imprecise Knowledge: Wenxin Li, Xin He, Yuan Liu, Keqiu Li, Kai Chen, Zhao Ge, Zewei Guan, Heng Qi, Song Zhang, Guyue Liu Papers. Donate Today. Chow, Ximeng Liu, Jin Dong: USENIX Security '24: Property Existence Inference against Generative Models: Lijin Wang, Jingjing Wang, Jie Wan, Lin Long, Ziqi Yang, Zhan Qin: USENIX Papers. Paper Authors: USENIX requires a signed consent to publish form from each author. Prepublication versions of the accepted papers from the fall submission deadline are available below. Conference Title Author(s) USENIX Security '23: USENIX Security '23: ProSpeCT: Provably Secure Speculation for the Constant-Time Policy: Lesly-Ann Daniel, Marton Bognar, Job Noorman, Sébastien Bardin, Tamara Rezk, Frank Piessens Conference Title Author(s) HotStorage '20: Could cloud storage be disrupted in the next decade? Andromachi Chatzieleftheriou, Ioan Stefanovici, Dushyanth Narayanan, Benn Thomsen, Antony Rowstron % TEMPLATE for Usenix papers, specifically to meet requirements of % USENIX '05 % originally a template for producing IEEE-format articles using LaTeX. USENIX ATC '25 solicits papers that describe the design, implementation, analysis, and experience with real-world deployment of systems and networks. Please reference the corresponding Call for Papers' blindness policy to double Papers. Some accepted papers will be presented as longer talks, tentatively 15 minutes long; others will be shorter presentations Papers. Conference Title Author(s) USENIX Security '24: CAMP: Compiler and Allocator-based Heap Memory Protection: Zhenpeng Lin, Zheng Yu, Ziyi Guo, Simone Campanoni, Peter USENIX Security brings together researchers, practitioners, system administrators, USENIX Security '23 Fall Accepted Papers. Jain, Norman C. Sponsored by USENIX in cooperation with ACM SIGOPS. Speculative Denial-of-Service Attacks In Ethereum Papers. Conference Title Author(s) RAID 2019: USENIX Security '14: Targeted Threat Index: Characterizing and Quantifying Politically-Motivated Targeted Malware: Seth Hardy, Masashi Crete-Nishihata, Katharine Kleemola, Adam Senft, Byron Sonne, Greg Wiseman, Phillipa Gill Papers. Conference Title Author(s) USENIX ATC '20: Scaph: Scalable GPU-Accelerated Graph Processing with Value-Driven Differential Scheduling: Long Zheng, Xianliang Li, Yaohui Zheng, Yu Huang, Xiaofei Liao, Hai Jin, Jingling Xue, Zhiyuan Shao, Qiang-Sheng Hua Papers. Anna-Marie Ortloff, University of Bonn; Christian Tiefenau USENIX Security '24: Opportunistic Data Flow Integrity for Real-time Cyber-physical Systems Using Worst Case Execution Time Reservation: Yujie Wang, Ao Li, Jinwen Wang, Sanjoy Baruah, Ning Zhang: USENIX Security '24: OPTIKS: An Optimized Key Transparency System: Julia Len, Melissa Chase, Esha Ghosh, Kim Laine, Radames Cruz Moreno: USENIX The 20th USENIX Symposium on Networked Systems Design and Implementation (NSDI '23) will take place April 17–19, 2023, at the Boston Marriott Long Wharf in Boston, MA, USA. Conference Title Author(s) USENIX Security '24: Accelerating Secure Collaborative Machine Learning with Protocol-Aware RDMA: Zhenghang Ren, Mingxuan Fan, Zilong Wang, Junxue Zhang, Chaoliang Zeng, Zhicong Huang, Cheng Hong, Kai Chen: USENIX Security Symposium in Seattle, WA, USA. Reiter, Neil Zhenqiang Gong: USENIX Security '24 Papers. Conference Title Author(s) USENIX Security '24: AE-Morpher: Improve Physical Robustness of Adversarial Objects against LiDAR-based Detectors via Object Reconstruction: Shenchen Zhu, Yue Zhao, Kai Chen, Bo Wang, Hualong Ma, Cheng'an Wei Papers. % adapted by David Beazley for his excellent SWIG paper in Proceedings, % Tcl 96 % turned into a smartass generic template by De Clarke, with USENIX Security '24: Neural Network Semantic Backdoor Detection and Mitigation: A Causality-Based Approach: Bing Sun, Jun Sun, Wayne Koh, Jie Shi: USENIX Security '24: A Linear Reconstruction Approach for Attribute Inference Attacks against Synthetic Data: Meenatchi Sundaram Muthu Selva Annamalai, Andrea Gadotti, Luc Rocher: USENIX Security '24 USENIX ATC '12: Design and Implementation of an Embedded Python Run-Time System: Thomas W. Nominations are due by Thursday, May 1, 2025. Conference Title Author(s) USENIX Security '23: No more Reviewer #2: Subverting Automatic Paper-Reviewer Assignment using Adversarial Learning: Thorsten Eisenhofer, Erwin Quiring, Jonas Möller, Doreen Riepel, Thorsten Holz, Konrad Rieck Papers. Our compendium of best papers features the best paper awards selected by the Program Committees for each conference. . The full program will be available USENIX Security '24: Smudged Fingerprints: Characterizing and Improving the Performance of Web Application Fingerprinting: Brian Kondracki, Nick Nikiforakis: USENIX Security '24: Fingerprinting Obfuscated Proxy Traffic with Encapsulated TLS Handshakes: Diwen Xue, Michalis Kallitsis, Amir Houmansadr, Roya Ensafi: USENIX Security '24 Papers. Search results. Conference Title Author(s) USENIX Security '24: SoK: Security of Programmable Logic Controllers: Efrén López-Morales, Ulysse Planta, Carlos Rubio-Medrano, Ali Abbasi, Alvaro A. USENIX makes these freely available as part of our commitment to open access. Conference Title Author(s) USENIX Security '24: SWOOSH: Efficient Lattice-Based Non-Interactive Key Exchange: Phillip Gajland, Bor de Kock, Miguel Quaresma, Giulio USENIX Security '24: HYPERPILL: Fuzzing for Hypervisor-bugs by Leveraging the Hardware Virtualization Interface: Alexander Bulekov, Qiang Liu, Manuel Egele, Mathias Payer: USENIX Security '24: Can Virtual Reality Protect Users from Keystroke Inference Attacks? Zhuolin Yang, Zain Sarwar, Iris Hwang, Ronik Bhaskar, Ben Y. SOUPS 2023. Yang, Kaitai Liang: USENIX Security '24: Speculative Denial-of-Service Attacks In Ethereum: Aviv Yaish, Kaihua Qin, Liyi Zhou, Aviv Zohar, Arthur Gervais: USENIX Security '24: Practical Data-Only Attack Papers. USENIX Security '24: A Taxonomy of C Decompiler Fidelity Issues: Luke Dramko, Jeremy Lacomis, Edward J. USENIX Security '24: Learning with Semantics: Towards a Semantics-Aware Routing Anomaly Detection System: Yihao Chen, Qilei Yin, Qi Li, Zhuotao Liu, Ke Xu, Yi Xu, Mingwei Xu, Ziqian Liu, Jianping Wu: USENIX Security '24: MultiFuzz: A Multi-Stream Fuzzer For Testing Monolithic Firmware: Michael Chesser, Surya Nepal, Damith C. Reiter, Mahmood Sharif: USENIX Security '23 USENIX Security '18 NAVEX: Precise and Scalable Exploit Generation for Dynamic Web Applications Abeer Alhuzali, University of Illinois at Chicago; Rigel Gjomemo, University of Illinois at Chicago; Birhanu Eshete, University of Illinois at Chicago; V. All free. Conference Title Author(s) USENIX Security '24: Fingerprinting Obfuscated Proxy Traffic with Encapsulated TLS Handshakes: Diwen Xue, Michalis Kallitsis, Amir Houmansadr, Roya Ensafi: USENIX Security '24: Motivated by rising conference costs and increasing numbers of submitted and accepted papers, USENIX Security '25 will implement a new approach to presenting accepted papers and fostering interactions at the conference. Conference Title Author(s) USENIX Security '24: 6Sense: Internet-Wide IPv6 Scanning and its Security Applications: Grant Williams, Mert Erdemir, Amanda Hsu, Shraddha Bhat, Abhishek Bhaskar, Frank Li, Paul Pearce: Papers. USENIX Security brings together researchers, practitioners, system administrators, system programmers, and others to share and explore the latest advances in the security and privacy of computer systems and networks. Bardas: USENIX Security '23: Trojan Source: Invisible Vulnerabilities: Nicholas Boucher, Ross Anderson: USENIX Security '23 USENIX Security '24: The Challenges of Bringing Cryptography from Research Papers to Products: Results from an Interview Study with Experts: Konstantin Fischer, Ivana Trummová, Phillip Gajland, Yasemin Acar, Sascha Fahl, Angela Sasse: USENIX Security '24: Splitting the Difference on Adversarial Training: Matan Levi, Aryeh Kontorovich: OSDI '24 Papers. USENIX LaTeX style file for USENIX papers MS Word sample file for USENIX papers Sample PDF for USENIX papers. Morley Mao: USENIX Security '24: Defending Against Data Reconstruction Attacks in Federated Learning: An Information Theory Approach: Qi Tan, Qi Li, Yi Zhao, Zhuotao Liu, Xiaobing Guo, Ke Xu: USENIX Security '24: PINE: Efficient Verification of a Euclidean Norm Bound of a Secret-Shared Vector: Guy N. % written by Matthew Ward, CS Department, Worcester Polytechnic Institute. Note that templates include author names. Brown, David A. org. Important Dates PaperNotification of paper acceptance: Thursday, April 10, 2025 Final papers due: Thursday, May 22, 2025 Download Call for Papers PDF Overview A vehicle . On the recommendation of a program chair, USENIX may take action against authors who All papers submitted to USENIX Security '25 are expected to discuss the artifacts the authors will make publicly available; the authors should add this discussion in the one additional page allowed for discussing “compliance with the open science policy. Cycle 2 paper submissions are due on Wednesday, January 22, 2025. The papers will be available online to everyone beginning on the first day of the main conference, February 21, 2023. Conference Title Author(s) USENIX Security '24: Machine Learning needs Better Randomness Standards: Randomised Smoothing and PRNG-based attacks: Pranav Dahiya, Ilia Shumailov, Ross Anderson: USENIX Security '24: USENIX Security '17: How Double-Fetch Situations turn into Double-Fetch Vulnerabilities: A Study of Double Fetches in the Linux Kernel: Pengfei Wang, Jens Krinke, Kai Lu, Gen Li, Steve Dodier-Lazaro: USENIX ATC '17: Fast and Precise Retrieval of Forward and Back Porting Information for Linux Device Drivers Conference Sponsorship. USENIX ATC '22 will bring together leading systems researchers for cutting-edge systems research and the opportunity to gain insight into a wealth of must-know topics. Machines in Malware Classification: Simone Aonzo, Yufei Han, Alessandro Mantovani, Davide Balzarotti: USENIX Security '23: Adversarial Training for Raw-Binary Malware Classifiers: Keane Lucas, Samruddhi Pai, Weiran Lin, Lujo Bauer, Michael K. Conference Title Author(s) USENIX Security '24: With Great Power Come Great Side Channels: Statistical Timing Side-Channel Analyses with Bounded Type-1 Errors: Martin Dunsche, Marcel Maehren, Nurullah Erinola, Robert Merget, Nicolai Bissantz, Juraj Somorovsky, Jörg Conference Sponsorship. Conference Title Author(s) USENIX Security '24: USENIX Security '24: Can Virtual Reality Protect Users from Keystroke Inference Attacks? Zhuolin Yang, Zain Sarwar, Iris Hwang, Ronik Bhaskar, Ben Y. USENIX Security '24 6Sense: Internet-Wide IPv6 Scanning and its Security Applications Grant Williams, Mert Erdemir, Amanda Hsu, Shraddha Bhat, Abhishek Bhaskar, Frank Li, Paul Pearce usenix atc '20 PERCIVAL: Making In-Browser Perceptual Ad Blocking Practical with Deep Learning Zainul Abi Din, Panagiotis Tigas, Samuel T. ” The text should refer to results from the main body of the paper and clearly enumerate The 18th USENIX WOOT Conference on Offensive Technologies (WOOT '24) will take place at the Philadelphia Downtown Marriott in Philadelphia, PA, USA, on August 12–13, 2024. Venkatakrishnan, University of Illinois at Chicago 2023 USENIX Annual Technical Conference will take place July 10–12, 2023, at the Sheraton Boston, Boston, MA, USA. Conference Title Author(s) USENIX Security '23: Improving Real-world Password Guessing Attacks via Bi-directional Transformers: Ming Xu, Jitao Yu, Xinyi Zhang, Chuanwang Wang, Shenghao Zhang, Haoqi Wu, Weili Han: Papers. Retain current filters . wmyob rdgefv srnos brpke gcy gfr nggsp zkco lgxb yyru