资讯

We develop 5GBaseChecker— an efficient, scalable, and dynamic security analysis framework based on differential testing for analyzing 5G basebands' control plane protocol interactions. 5GBaseChecker ...
Recent advancements in generative AI have enabled ubiquitous access to large language models (LLMs). Empowered by their exceptional capabilities to understand and generate human-like text, these ...
Sponsored by USENIX, the Advanced Computing Systems Association. All authors of accepted USENIX Security '24 papers (including shepherd-approved papers) are encouraged to submit artifacts for Artifact ...
USENIX celebrates its 50th anniversary in 2025. We celebrate decades of innovations, experiments, and gatherings of the advanced computing system community. And in the spirit of our ever-evolving ...
The 2025 USENIX Annual Technical Conference will take place on July 7–9, 2025, at the Sheraton Boston in Boston, MA, USA. USENIX ATC brings together leading systems researchers for the presentation of ...
OSDI brings together professionals from academic and industrial backgrounds in what has become a premier forum for discussing the design, implementation, and implications of systems software. The ...
Billions of people around the world use Google’s products every day, and they count on those products to work reliably. Behind the scenes, Google’s services have increased dramatically in scale over ...
Amazon DynamoDB is a NoSQL cloud database service that provides consistent performance at any scale. Hundreds of thousands of customers rely on DynamoDB for its fundamental properties: consistent ...
The increasing deployment of data-intensive applications on mobile devices poses a formidable challenge in designing flash-based file systems tailored to these needs. Studies have shown that adopting ...
The SPHERE project is building an advanced research infrastructure (see Figure 1) to support cybersecurity and privacy research and education. Led by the team that built and operated the Deterlab ...
Measuring the GFW's censorship presents significant challenges due to its sophisticated and evolving mechanisms. Prior measurement efforts have been limited by scope, time, and/or methodology. Most ...
Information security is hard in part because of the underlying economics of attack and defense. Different economic models result in distinct equilibria: some favor attackers, whereas others advantage ...