Skip to main content
USENIX
Conferences
Students
Sign in
Home
Attend
Venue, Hotel, and Travel
Students and Grants
Co-Located Workshops
Program
At a Glance
Technical Sessions
Poster Session
Activities
Birds-of-a-Feather Sessions
Poster Session
WiPs
Participate
Call for Papers
Important Dates
Symposium Organizers
Symposium Topics
Refereed Papers
Shadow PC
Symposium Activities
Submitting Papers
Instructions for Participants
Sponsorship
About
Symposium Organizers
Services
Questions
Help Promote!
Past Symposia
Home
Attend
Venue, Hotel, and Travel
Students and Grants
Co-Located Workshops
Program
Activities
Participate
Call for Papers
Instructions for Participants
Sponsorship
About
Symposium Organizers
Services
Questions
Help Promote!
Past Symposia
sponsors
Platinum Sponsor
Gold Sponsor
Gold Sponsor
Silver Sponsor
Silver Sponsor
Silver Sponsor
Bronze Sponsor
Bronze Sponsor
General Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Industry Partner
Industry Partner
help promote
Get more
Help Promote graphics!
connect with usenix
Twitter
Facebook
LinkedIn
Google+
YouTube
twitter
Tweets by USENIXSecurity
usenix conference policies
Event Code of Conduct
Conference Network Policy
Statement on Environmental Responsibility Policy
You are here
Home
ยป
Now You're Just Something That I Used to Code
Tweet
connect with us
Now You're Just Something That I Used to Code
Presentations:
Under-Constrained Symbolic Execution: Correctness Checking for Real Code
TaintPipe: Pipelined Symbolic Taint Analysis
Type Casting Verification: Stopping an Emerging Attack Vector
Refereed Papers II
Regency BCD
connect with us