| When One Line Took Thousands of Websites Offline | SREcon23 Europe/Middle East/Africa | Francisco Borges Aurindo Barros, Jack Henschel |
| Journey from Fluent Bit, Fluentd and Prometheus to OpenTelemetry Collector - Lessons Learned | SREcon23 Europe/Middle East/Africa | Marcin "Perk" Stożek |
| How to Make Your Automation a Better Team Player | SREcon23 Europe/Middle East/Africa | Laura Nolan |
| The World Blew Up but We’re All Okay: How We Managed a Massive-scale Incident at Datadog | SREcon23 Europe/Middle East/Africa | Laura de Vesine, Laurent Bernaille |
| The Engineer/Manager Pendulum Goes Mainstream | SREcon23 Europe/Middle East/Africa | Charity Majors |
| Scaling Chef Emotionally | SREcon23 Europe/Middle East/Africa | Brett Pemberton |
| The Incident Is The Way: Using Your Incidents to Win Reliability Investment | SREcon23 Europe/Middle East/Africa | Niall McCarthy |
| Embracing the Multi-Party Dilemma: Incident Response Across Company Boundaries | SREcon23 Europe/Middle East/Africa | Sarah Butt, Alex Elman |
| Reliable Data for Large ML Models: Principles and Practices | SREcon23 Europe/Middle East/Africa | Mary McGlohon |
| Looking at SRE Needs and Trends over Two Decades with a Single Service | SREcon23 Europe/Middle East/Africa | Salim Virji, Murali Suriar |
| When Clouds Stop Raining Discounts: Surviving the Drought | SREcon23 Europe/Middle East/Africa | Max Blaze |
| Over, Under, Around, and Through: A Detailed Comparison of QUIC and HTTP/3 Application Mapping vs. Protocol Encapsulation | SREcon23 Europe/Middle East/Africa | Lucas Pardue |
| New Grads Becoming New SREs: Catalyzing a “Circle of Life” in Ireland | SREcon23 Europe/Middle East/Africa | Jennifer Petoff, Catalina Rete |
| Implementing SRE in a Telco with Reliability Enhancing Procedures | SREcon23 Europe/Middle East/Africa | Florian Kammermann, Romain Bonjour |
| From Sysadmins to (almost) Flying Unicorns | SREcon23 Europe/Middle East/Africa | Guillaume Hérail, Gilberto Müller |
| "Stalking is immoral but not illegal": Understanding Security, Cyber Crimes and Threats in Pakistan | SOUPS 2023 | Afaq Ashraf, - Taha, Nida ul Habib Bajwa, Cornelius J. König, Mobin Javed, Maryam Mustafa |
| Lost in Conversion: Exploit Data Structure Conversion with Attribute Loss to Break Android Systems | USENIX Security '23 | Rui Li, Wenrui Diao, Shishuai Yang, Xiangyu Liu, Shanqing Guo, Kehuan Zhang |
| Practical Intent-driven Routing Configuration Synthesis | NSDI '23 | Sivaramakrishnan Ramanathan, Ying Zhang, Mohab Gawish, Yogesh Mundada, Zhaodong Wang, Sangki Yun, Eric Lippert, Walid Taha, Minlan Yu, Jelena Mirkovic |
| Intender: Fuzzing Intent-Based Networking with Intent-State Transition Guidance | USENIX Security '23 | Jiwon Kim, Benjamin E. Ujcich, Dave (Jing) Tian |
| "Would You Give the Same Priority to the Bank and a Game? I Do Not!" Exploring Credential Management Strategies and Obstacles during Password Manager Setup | SOUPS 2023 | Sabrina Amft, Sandra Höltervennhoff, Nicolas Huaman, Yasemin Acar, Sascha Fahl |
| Securing and Standardizing Data Rights Requests with a Data Rights Protocol | PEPR '23 | Ryan Rix |
| Privacy Requirements and Realities of Digital Public Goods | PEPR '23 | Geetika Gopi |
| Demystifying Access Control in the Modern Data Warehouse | PEPR '23 | Viraj Thakur |
| Bad Metrics and Very Bad Decisions | PEPR '23 | Lea Kissner |
| De-identified, Anonymized, or Aggregated? A Look around the Globe | PEPR '23 | Katharina Koerner |