Media Summary: Searching Encrypted Data with Size-Locked Indexes Min Xu, University of Chicago; Armin Namavari, Cornell University; David ... Sebastian Zimmeck, Carnegie Mellon University; Jie S. Li and Hyungtae Kim, unaffiliated; Steven M. Bellovin and Tony Jebara, ...

Usenix Security 20 Remote Side - Detailed Analysis & Overview

Searching Encrypted Data with Size-Locked Indexes Min Xu, University of Chicago; Armin Namavari, Cornell University; David ... Sebastian Zimmeck, Carnegie Mellon University; Jie S. Li and Hyungtae Kim, unaffiliated; Steven M. Bellovin and Tony Jebara, ...

Photo Gallery

USENIX Security '20 - Remote Side-Channel Attacks on Anonymous Transactions
USENIX Security ’20 - NetWarden: Mitigating Network Covert Channels while Preserving Performance
USENIX Security '23 - HOMESPY: The Invisible Sniffer of Infrared Remote Control of Smart TVs
USENIX Security '20 - Understanding security mistakes developers make: Qualitative analysis...
USENIX Security '20 - TPM-FAIL: TPM meets Timing and Lattice Attacks
USENIX Security '20 - Achieving Keyless CDNs with Conclaves
USENIX Security '20 - Scaling Verifiable Computation Using Efficient Set Accumulators
USENIX Security '20 - Analysis of DTLS Implementations Using Protocol State Fuzzing
USENIX Security '20 - From Needs to Actions to Secure Apps? The Effect of Requirements...
USENIX Security '20 - Timeless Timing Attacks: Exploiting Concurrency to Leak Secrets over Remote
USENIX Security '20 - Light Commands: Laser-Based Audio Injection Attacks on Voice-Controllable
USENIX Security '20 - Donky: Domain Keys – Efficient In-Process Isolation for RISC-V and x86
View Detailed Profile
USENIX Security '20 - Remote Side-Channel Attacks on Anonymous Transactions

USENIX Security '20 - Remote Side-Channel Attacks on Anonymous Transactions

Remote Side

USENIX Security ’20 - NetWarden: Mitigating Network Covert Channels while Preserving Performance

USENIX Security ’20 - NetWarden: Mitigating Network Covert Channels while Preserving Performance

View the full

USENIX Security '23 - HOMESPY: The Invisible Sniffer of Infrared Remote Control of Smart TVs

USENIX Security '23 - HOMESPY: The Invisible Sniffer of Infrared Remote Control of Smart TVs

USENIX Security

USENIX Security '20 - Understanding security mistakes developers make: Qualitative analysis...

USENIX Security '20 - Understanding security mistakes developers make: Qualitative analysis...

View the full

USENIX Security '20 - TPM-FAIL: TPM meets Timing and Lattice Attacks

USENIX Security '20 - TPM-FAIL: TPM meets Timing and Lattice Attacks

View the full

USENIX Security '20 - Achieving Keyless CDNs with Conclaves

USENIX Security '20 - Achieving Keyless CDNs with Conclaves

View the full

USENIX Security '20 - Scaling Verifiable Computation Using Efficient Set Accumulators

USENIX Security '20 - Scaling Verifiable Computation Using Efficient Set Accumulators

View the full

USENIX Security '20 - Analysis of DTLS Implementations Using Protocol State Fuzzing

USENIX Security '20 - Analysis of DTLS Implementations Using Protocol State Fuzzing

View the full

USENIX Security '20 - From Needs to Actions to Secure Apps? The Effect of Requirements...

USENIX Security '20 - From Needs to Actions to Secure Apps? The Effect of Requirements...

View the full

USENIX Security '20 - Timeless Timing Attacks: Exploiting Concurrency to Leak Secrets over Remote

USENIX Security '20 - Timeless Timing Attacks: Exploiting Concurrency to Leak Secrets over Remote

USENIX Security

USENIX Security '20 - Light Commands: Laser-Based Audio Injection Attacks on Voice-Controllable

USENIX Security '20 - Light Commands: Laser-Based Audio Injection Attacks on Voice-Controllable

View the full

USENIX Security '20 - Donky: Domain Keys – Efficient In-Process Isolation for RISC-V and x86

USENIX Security '20 - Donky: Domain Keys – Efficient In-Process Isolation for RISC-V and x86

View the full

USENIX Security '21 - You Autocomplete Me: Poisoning Vulnerabilities in Neural Code Completion

USENIX Security '21 - You Autocomplete Me: Poisoning Vulnerabilities in Neural Code Completion

USENIX Security

USENIX Security '22 - Bedrock: Programmable Network Support for Secure RDMA Systems

USENIX Security '22 - Bedrock: Programmable Network Support for Secure RDMA Systems

USENIX Security

USENIX Security '21 - Searching Encrypted Data with Size-Locked Indexes

USENIX Security '21 - Searching Encrypted Data with Size-Locked Indexes

Searching Encrypted Data with Size-Locked Indexes Min Xu, University of Chicago; Armin Namavari, Cornell University; David ...

USENIX Security '20 - Programmable In-Network Security for Context-aware BYOD Policies

USENIX Security '20 - Programmable In-Network Security for Context-aware BYOD Policies

View the full

USENIX Security '22 - FUGIO: Automatic Exploit Generation for PHP Object Injection Vulnerabilities

USENIX Security '22 - FUGIO: Automatic Exploit Generation for PHP Object Injection Vulnerabilities

USENIX Security

USENIX Security '17 - A Privacy Analysis of Cross-device Tracking

USENIX Security '17 - A Privacy Analysis of Cross-device Tracking

Sebastian Zimmeck, Carnegie Mellon University; Jie S. Li and Hyungtae Kim, unaffiliated; Steven M. Bellovin and Tony Jebara, ...

USENIX Security '19 - Less is More: Quantifying the Security Benefits of Debloating Web Applications

USENIX Security '19 - Less is More: Quantifying the Security Benefits of Debloating Web Applications

Less is More: Quantifying the