News

Timing vulnerabilities in processors have emerged as a potent threat. As processors are the foundation of any computing system, identifying these flaws is imperative. Recently fuzzing techniques, ...
Kai Tu, Abdullah Al Ishtiaq, Syed Md Mukit Rashid, Yilu Dong, Weixuan Wang, Tianwei Wu, and Syed Rafiul Hussain, Pennsylvania State University ...
@inproceedings {298254, author = {Zhiyuan Yu and Xiaogeng Liu and Shunning Liang and Zach Cameron and Chaowei Xiao and Ning Zhang}, title = {Don{\textquoteright}t Listen To Me: Understanding and ...
The IETF released RFC 8446 in 2018 as the new TLS 1.3 standard, which recommends using X25519 for key exchange and Ed25519 for identity verification. These computations are the most time-consuming ...
@inproceedings {298158, author = {Alexander Bulekov and Qiang Liu and Manuel Egele and Mathias Payer}, title = {{HYPERPILL}: Fuzzing for Hypervisor-bugs by Leveraging the Hardware Virtualization ...
Multi-modal embeddings encode texts, images, thermal images, sounds, and videos into a single embedding space, aligning representations across different modalities (e.g., associate an image of a dog ...
USENIX Security '23 is SOLD OUT. Please do not plan to walk into the venue and register on site.
These instructions are for authors of accepted papers at the 34th USENIX Security Symposium.If you wish to submit a paper or deliver a talk at another upcoming USENIX event, please review the open ...
Next, we examined the behavior of server buffer cache accesses in terms of frequency. While it is clear that server buffer cache accesses represent misses from client buffer caches, the distribution ...