Contact
DMCA
Privacy
Robuta
Sponsor of the Day:
Jerkmate
https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/meyer
Revisiting SSL/TLS Implementations: New Bleichenbacher Side Channels and Attacks | USENIX
ssl tls
side channels
attacks usenix
revisiting
implementations
https://www.usenix.org/conference/usenixsecurity22/presentation/kogler-minefield
Minefield: A Software-only Protection for SGX Enclaves against DVFS Attacks | USENIX
sgx enclaves
attacks usenix
minefield
software
protection
https://www.usenix.org/conference/7th-usenix-security-symposium/stackguard-automatic-adaptive-detection-and-prevention
StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks | USENIX
buffer overflow
attacks usenix
stackguard
automatic
adaptive
https://www.usenix.org/conference/usenixsecurity19/presentation/werner
ScatterCache: Thwarting Cache Attacks via Cache Set Randomization | USENIX
cache attacks
thwarting
via
set
randomization
https://www.usenix.org/conference/atc12/technical-sessions/presentation/papadogiannakis
Tolerating Overload Attacks Against Packet Capturing Systems | USENIX
systems usenix
tolerating
overload
attacks
packet
https://www.usenix.org/conference/usenixsecurity25/presentation/de-ridder
Posthammer: Pervasive Browser-based Rowhammer Attacks with Postponed Refresh Commands | USENIX
browser based
pervasive
rowhammer
attacks
postponed
https://www.usenix.org/conference/usenixsecurity19/presentation/canella
A Systematic Evaluation of Transient Execution Attacks and Defenses | USENIX
systematic evaluation
transient execution
attacks
defenses
usenix
https://www.usenix.org/conference/12th-usenix-security-symposium/remote-timing-attacks-are-practical
Remote Timing Attacks Are Practical | USENIX
timing attacks
remote
practical
usenix
https://www.usenix.org/conference/usenixsecurity22/presentation/lipp
AMD Prefetch Attacks through Power and Time | USENIX
time usenix
amd
prefetch
attacks
power
https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/vila
Loophole: Timing Attacks on Shared Event Loops in Chrome | USENIX
timing attacks
event loops
loophole
shared
chrome