Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleAugust 2023
Auditory eyesight: demystifying µs-precision keystroke tracking attacks on unconstrained keyboard inputs
SEC '23: Proceedings of the 32nd USENIX Conference on Security SymposiumArticle No.: 11, Pages 175–192In various scenarios from system login to writing emails, documents, and forms, keyboard inputs carry alluring data such as passwords, addresses, and IDs. Due to commonly existing non-alphabetic inputs, punctuation, and typos, users' natural inputs rarely ...
- doctoral_thesisJanuary 2020
Detecting Consistency Violations in Distributed Storage Systems
AbstractAs cloud computing becomes increasingly popular, there is a growing need for replicated distributed storage systems. These distributed storage systems provide various consistency models for client applications. Nonetheless, potential software bugs ...
- ArticleDecember 2008
Defending Against Attacks on Main Memory Persistence
ACSAC '08: Proceedings of the 2008 Annual Computer Security Applications ConferencePages 65–74https://doi.org/10.1109/ACSAC.2008.45Main memory contains transient information for all resident applications. However, if memory chip contents survives power-off, e.g., via freezing DRAM chips, sensitive data such as passwords and keys can be extracted. Main memory persistence will soon be ...
- ArticleAugust 1999
A Performance Broker for CORBA
CORBA applications can transparently use service instances running on the client's machine, on the local-area network, or across the Internet. Standard CORBA services help the application locate service instances, but do not provide a mechanism to ...