Differentially-Private Control-Flow Node Coverage for Software Usage Analysis. Zhang, H., Latif, S., Bassily, R., & Rountev, A. In Capkun, S. & Roesner, F., editors, 29th USENIX Security Symposium, USENIX Security 2020, August 12-14, 2020, pages 1021–1038, 2020. USENIX Association.
Paper bibtex 33 downloads @inproceedings{DBLP:conf/uss/0006LBR20,
author = {Hailong Zhang and
Sufian Latif and
Raef Bassily and
Atanas Rountev},
editor = {Srdjan Capkun and
Franziska Roesner},
title = {Differentially-Private Control-Flow Node Coverage for Software Usage
Analysis},
booktitle = {29th {USENIX} Security Symposium, {USENIX} Security 2020, August 12-14,
2020},
pages = {1021--1038},
publisher = {{USENIX} Association},
year = {2020},
url = {https://www.usenix.org/conference/usenixsecurity20/presentation/zhang-hailong},
timestamp = {Fri, 29 Jan 2021 22:08:55 +0100},
biburl = {https://dblp.org/rec/conf/uss/0006LBR20.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Downloads: 33
{"_id":"HvcC5cbgBwBbLR5Mt","bibbaseid":"zhang-latif-bassily-rountev-differentiallyprivatecontrolflownodecoverageforsoftwareusageanalysis-2020","authorIDs":["3fAYhPArqLJrvtaFj","3gueB8aAREQefPQQR","3tAkYwhAXkzqGfdfr","45dESSyABDfpzof2N","4LkJPeNBshSKWEHcm","56ZkaRbkmdxdcjGxW","5FELXsv7GMKCkgJka","5WrjWvrnJ2Cjkk4sv","6hhWatWDnMKpQKQNz","7mFvJPKfEK9mWL8JW","7vFMQTBz28c83vpTh","82qJxipQAnhTFKLks","8Y6g86Zq9aXAuczBr","Aw34Kprs9hqbp8tyo","DEfS4bugbHApmQTYi","DJXa6F5EvYCf9fcXZ","FDRBX7hHtZmP8GTeE","G9g2KwPxaWH7rDRzw","GMuH8AmmHPWtPP2pP","HhRZGAK4EQR3fAPkt","JBWqkDc3Mzaktsks4","JWw8dy2TS6py9dmBc","JegYLRnQL4YGiTjyu","JhXv8sPjFeyv8kHdH","N4ane6Fv6Dvcbz4Pz","NqX2RpNFzXkScxgA8","PPWDKiQBphPs6aK5S","QydMnK2foo4C9rQKy","RCB85bsDGRwiPxrzG","SmFvs3hRFZiWKz4Nb","Tecpce2SNoMu59taE","W4HcYPNpLARWW8iab","WCLWvGkeRAgYMkdyY","WDYtAdKWSmHeQbfEn","WsE6uSzaFCA7Zy4L6","Z2dDoJ2FKohRRvFF9","ZXqm4eCqbXeXu96Bd","ak6FmLvsPnj2qmaEk","bCNcZ3NraXhLTwZBF","bbq8LtFg8EkZw5SKo","dPJtn4MwZhC9LYPZg","evnbRaTD6atNkr2kc","gDpgrYC8tk78QnD6w","gjDN3FWXjReiT6dYK","jvginBJXvMspbdSk8","jxLFTimeAe95n7ATx","me6PRJP3uP9wRgxXT","oMmdQrB5Rj5CPNw6p","ojY2Gh3QxzGb2Fn5j","ryzGa3bkiLW9Gg2Ys","sJRpr29NkuYTp4MSb","sSXPwokSmdDA8QTSv","ssb4onz8zmiamjZa2","suFnTDAEEB6fq5fzj","tggJHkkEQp3jjEB6E","u2S5JJwik2QL5JwSo","vnAT3mbeRTQc9sMiT","vv2tD2EsKb9HeLtzs","wLxi8bQGgL6HPN3ph","wcpivkKRmsaJr3CXm","yNeoJMqDK5CdBCnT3","zxrtmm4YuwqPQyAFN"],"author_short":["Zhang, H.","Latif, S.","Bassily, R.","Rountev, A."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","author":[{"firstnames":["Hailong"],"propositions":[],"lastnames":["Zhang"],"suffixes":[]},{"firstnames":["Sufian"],"propositions":[],"lastnames":["Latif"],"suffixes":[]},{"firstnames":["Raef"],"propositions":[],"lastnames":["Bassily"],"suffixes":[]},{"firstnames":["Atanas"],"propositions":[],"lastnames":["Rountev"],"suffixes":[]}],"editor":[{"firstnames":["Srdjan"],"propositions":[],"lastnames":["Capkun"],"suffixes":[]},{"firstnames":["Franziska"],"propositions":[],"lastnames":["Roesner"],"suffixes":[]}],"title":"Differentially-Private Control-Flow Node Coverage for Software Usage Analysis","booktitle":"29th USENIX Security Symposium, USENIX Security 2020, August 12-14, 2020","pages":"1021–1038","publisher":"USENIX Association","year":"2020","url":"https://www.usenix.org/conference/usenixsecurity20/presentation/zhang-hailong","timestamp":"Fri, 29 Jan 2021 22:08:55 +0100","biburl":"https://dblp.org/rec/conf/uss/0006LBR20.bib","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@inproceedings{DBLP:conf/uss/0006LBR20,\n author = {Hailong Zhang and\n Sufian Latif and\n Raef Bassily and\n Atanas Rountev},\n editor = {Srdjan Capkun and\n Franziska Roesner},\n title = {Differentially-Private Control-Flow Node Coverage for Software Usage\n Analysis},\n booktitle = {29th {USENIX} Security Symposium, {USENIX} Security 2020, August 12-14,\n 2020},\n pages = {1021--1038},\n publisher = {{USENIX} Association},\n year = {2020},\n url = {https://www.usenix.org/conference/usenixsecurity20/presentation/zhang-hailong},\n timestamp = {Fri, 29 Jan 2021 22:08:55 +0100},\n biburl = {https://dblp.org/rec/conf/uss/0006LBR20.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Zhang, H.","Latif, S.","Bassily, R.","Rountev, A."],"editor_short":["Capkun, S.","Roesner, F."],"key":"DBLP:conf/uss/0006LBR20","id":"DBLP:conf/uss/0006LBR20","bibbaseid":"zhang-latif-bassily-rountev-differentiallyprivatecontrolflownodecoverageforsoftwareusageanalysis-2020","role":"author","urls":{"Paper":"https://www.usenix.org/conference/usenixsecurity20/presentation/zhang-hailong"},"metadata":{"authorlinks":{"zhang, h":"https://bibbase.org/show?bib=https://dblp.org/pid/59/2151-6.bib"}},"downloads":33},"bibtype":"inproceedings","biburl":"https://dblp.org/pid/59/2151-6.bib","creationDate":"2020-04-03T20:49:26.319Z","downloads":33,"keywords":[],"search_terms":["differentially","private","control","flow","node","coverage","software","usage","analysis","zhang","latif","bassily","rountev"],"title":"Differentially-Private Control-Flow Node Coverage for Software Usage Analysis","year":2020,"dataSources":["ijrSdJjcox8KyJikf","9jR95iQxwh6oQ9upL"]}