X

Vous n'êtes pas connecté

Rubriques :

Maroc Maroc - ITSECURITYNEWS.INFO - A La Une - 17/Sep 16:32

USENIX NSDI ’24 – Horus: Granular In-Network Task Scheduler for Cloud Datacenters

Authors/Presenters:Parham Yassini, Khaled Diab, Saeed Zangeneh, Mohamed Hefeeda Our sincere thanks to USENIX, and the Presenters & Authors for publishing their superb 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI ’24) content, placing the organizations enduring commitment to…

Articles similaires

Sorry! Image not available at this time

USENIX Security ’23 – Collide+Power: Leaking Inaccessible Data with Software-based Power Side Channels

itsecuritynews.info - 08/Sep 19:32

Authors/Presenters:Andreas Kogler, Jonas Juffinger, Lukas Giner, Lukas Gerlach, Martin Schwarzl, Michael Schwarz, Daniel Gruss, Stefan Mangard Many...

Sorry! Image not available at this time

USENIX Security ’23 – ProSpeCT: Provably Secure Speculation for the Constant-Time Policy

itsecuritynews.info - 04/Sep 15:32

Authors/Presenters:Lesly-Ann Daniel, Marton Bognar, Job Noorman, Sébastien Bardin, Tamara Rezk, Sophia Antipolis; Frank Piessens Many thanks to...

Sorry! Image not available at this time

USENIX Security ’23 – ProSpeCT: Provably Secure Speculation for the Constant-Time Policy

itsecuritynews.info - 04/Sep 15:32

Authors/Presenters:Lesly-Ann Daniel, Marton Bognar, Job Noorman, Sébastien Bardin, Tamara Rezk, Sophia Antipolis; Frank Piessens Many thanks to...

Sorry! Image not available at this time

USENIX Security ’23 – UnGANable: Defending Against GAN-based Face Manipulation

itsecuritynews.info - 06/Sep 00:33

Authors/Presenters:Zheng Li, Ning Yu, Ahmed Salem, Michael Backes, Mario Fritz, Yang Zhang Many thanks to USENIX for publishing their outstanding...

Sorry! Image not available at this time

USENIX Security ’23 – Security Analysis of MongoDB Queryable Encryption

itsecuritynews.info - 13/Sep 19:32

Authors/Presenters:Zichen Gui, Kenneth G. Paterson, Tianxin Tang Many thanks to USENIX for publishing their outstanding USENIX Security ’23...

Sorry! Image not available at this time

USENIX Security ’23 – On the Feasibility of Malware Unpacking via Hardware-assisted Loop Profiling

itsecuritynews.info - 14/Sep 18:31

Authors/Presenters:Binlin Cheng, Erika A Leal, Haotian Zhang, Jiang Mingy Many thanks to USENIX for publishing their outstanding USENIX Security ’23...

Sorry! Image not available at this time

USENIX Security ’23 – On the Feasibility of Malware Unpacking via Hardware-assisted Loop Profiling

itsecuritynews.info - 14/Sep 18:31

Authors/Presenters:Binlin Cheng, Erika A Leal, Haotian Zhang, Jiang Mingy Many thanks to USENIX for publishing their outstanding USENIX Security ’23...

Sorry! Image not available at this time

USENIX Security ’23 – Multiview: Finding Blind Spots in Access-Deny Issues Diagnosis

itsecuritynews.info - 15/Sep 20:02

Authors/Presenters:Bingyu Shen, Tianyi Shan, Yuanyuan Zhou Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s...

Sorry! Image not available at this time

USENIX Security ’23 – Multiview: Finding Blind Spots in Access-Deny Issues Diagnosis

itsecuritynews.info - 15/Sep 20:02

Authors/Presenters:Bingyu Shen, Tianyi Shan, Yuanyuan Zhou Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s...

Sorry! Image not available at this time

USENIX Security ’23 – (M)WAIT for It: Bridging the Gap between Microarchitectural and Architectural Side Channels

itsecuritynews.info - 07/Sep 18:32

Authors/Presenters:Ruiyi Zhang, Taehyun Kim, Daniel Weber, Michael Schwarz Many thanks to USENIX for publishing their outstanding USENIX Security...