Skip to main content

USENIX supports diversity, equity, and inclusion and condemns hate and discrimination.

Home
  • About
  • Conferences
  • Publications
    • Proceedings
    • Author Resources
    • ;login: Online
    • Writing for ;login: Online
    • ;login: Archive
  • Membership
  • Students
  • Search
  • Donate Today
  • Sign In
  • Search
  • About
    • USENIX Board
    • Staff
    • Newsroom
    • Good Works
    • Blog
    • Governance and Financials
    • USENIX Awards
    • USENIX Supporters
    • 2024 Board Election
    • Board Meeting Minutes
    • Annual Fund
  • Conferences
    • Upcoming
    • By Name
    • Calls for Papers
    • Grants
    • Sponsorship
    • Best Papers
    • Test of Time Awards
    • Multimedia
    • Conference Policies
    • Code of Conduct
  • Publications
    • Proceedings
    • Author Resources
    • ;login: Online
    • Writing for ;login: Online
    • ;login: Archive
  • Membership
  • Students
    • Conference Fees
    • Campus Representative Program
    • Student Grant Program
  • Search
  • Donate Today

You are here

Publications
Donate Today
An open access publication driven by the USENIX community
90 Results
September 5, 2023
Reimagining Correctness SLOs: When 100% Means Failure

What do you do when user happiness isn't only about availability? A creative approach to correctness SLOs can improve collaboration between the business and IT.
Authors: Adam Newman
Article shepherded by:
Laura Nolan
Read article now
August 22, 2023
FreeBSD on Firecracker

Porting FreeBSD to Firecracker dropped the boot time to 20 ms, revealing bugs in the boot process and Firecracker, and is an example of porting a kernel.
Authors: Colin Percival
Article shepherded by:
Rik Farrow
Read article now
August 2, 2023
Computer Security Research, Moral Dilemmas, and Ethical Frameworks

When making moral decisions in computer security research, people may disagree. When that happens, the tools of ethics and moral philosophy can help.
Authors: Tadayoshi Kohno, Yasemin Acar, Wulf Loh
Article shepherded by:
Rik Farrow
Read article now
July 31, 2023
Diving into Robocall Content with SnorCall

We provide insights from accurate, automated analysis of 232,0000 robocalls, including tools that authorities can use to get to the source of the problem.
Authors: Sathvik Prasad, Brad Reaves
Article shepherded by:
Rik Farrow
Read article now
July 27, 2023
Measuring the Risk Password Reuse Poses for a University

Reuse of passwords poses a greater threat than weak passwords based on research into compromised passwords at the University of Chicago.
Authors: Alexandra Nisenoff, Maximilian Golla, Blase Ur
Article shepherded by:
Rik Farrow
Read article now
July 27, 2023
Going Beyond an Incident Report with TLA+

Human reasoning capability is limited - SREs can benefit from using modelling specification languages to understand system behavior.
Authors: Finn Hackett, Joshua Rowe, Markus Alexander Kuppe
Article shepherded by:
Laura Nolan
Read article now
July 5, 2023
Enabling Realms with the Arm Confidential Compute Architecture

ARMv9 will include Realms, a combination of hardware and firmware that creates a mechanism for isolating memory from reading or writing even by the OS or hypervisor.
Authors: Xupeng Li, Xuheng Li, Christoffer Dall, Ronghui Gu, Jason Nieh, Yousuf Sait, Gareth Stockwell
Article shepherded by:
Rik Farrow
Read article now
June 5, 2023
BeyondCorp and the long tail of Zero Trust

After successfully transitioning most of the Google's workflows to BeyondCorp, we were left with a long tail of specific or challenging situations to resolve.
Authors: Guilherme Gonçalves, Kyle O'Malley, Betsy Beyer, Max Saltonstall
Article shepherded by:
Rik Farrow
Read article now
June 2, 2023
NSDI'23 Test of Time Award

A graduate research project turned into a popular web browser plug-in, used by millions
Authors: Franzi Roesner, Gennie Gebhart, Rik Farrow
Article shepherded by:
Rik Farrow
Read article now
May 22, 2023
Bcrypt at 25: A Retrospective on Password Security

Celebrating 25 years of bcrypt! Dive into its journey, enduring impact on password security, and unique ways it's shaping the future.
Authors: Niels Provos
Article shepherded by:
Rik Farrow
Read article now
May 8, 2023
Responding to and Learning from Distributed Incidents

Step through a distributed systems incident and see how teams can learn from these events.
Authors: Philipp Böschen
Article shepherded by:
Laura Nolan
Read article now
April 25, 2023
Codon: Python Compiler

Codon is a compiler for Python scripts that produces optimized code suitable for analyzing large amounts of data, with some limitations.
Authors: Rik Farrow
Article shepherded by:
Laura Nolan
Read article now
April 18, 2023
A Study in Practical Deduplication

Using data collected from 875 Microsoft employees' desktops and servers, the authors analyzed file metadata and potential deduplication strategies.
Authors: Dutch Meyer, Bill Bolosky, Rik Farrow
Article shepherded by:
Rik Farrow
Read article now
March 15, 2023
You don’t have a production environment

Your staging environment cannot accurately replicate your production environment. Multi-tenancy can solve this problem.
Authors: Avishai Ish-Shalom
Article shepherded by:
Laura Nolan
Read article now
March 7, 2023
Mistrust Plugins You Must: A Large-Scale Study Of Malicious Plugins In WordPress Marketplaces

Authors: Ranjita Pai Sridhar, Jonathan Fuller, Yiting Sun, Omar Chabklo, Andres Rodriguez, Jeman Park, Brendan Saltaformaggio
Article shepherded by:
Rik Farrow
Read article now
March 5, 2023
Musings on Operating Systems

Why is Windows on the desktop, while Linux rules the cloud?
Authors: Rik Farrow
Article shepherded by:
Rik Farrow, Laura Nolan
Read article now
February 27, 2023
Workload Security Rings

Authors: Michał Czapiński , Rainer Wolafka
Article shepherded by:
Laura Nolan
Read article now
February 21, 2023
CI is Alerting

Adding lots of alerts during the early stages of development can pay off later in an Continuous Integration environment.
Authors: Titus Winters
Article shepherded by:
Rik Farrow, Laura Nolan
Read article now

Pages

  • 1
  • 2
  • 3
  • 4
  • 5
  • next ›
  • last »
See ;login: editions prior to 2021
Home

© USENIX
Website designed and built
by Giant Rabbit LLC

  • Privacy Policy
  • Contact Us
Sign up for Our Newsletter: