| Panel: Engineering Onboarding | SREcon21 | Daria Barteneva, Jennifer Petoff, Anne Hamilton, Sandi Friend, Ilse White |
| Panel: Observability | SREcon21 | Daria Barteneva, Liz Fong-Jones, Gabe Wishnie, Štěpán Davidovic, Richard Waid, Partha Kanuparthy |
| When Linux Memory Accounting Goes Wrong | SREcon21 | Minhaj Ahammed |
| A Political Scientist's View on Site Reliability | SREcon21 | Michael Krax |
| Capacity Management for Fun & Profit | SREcon21 | Aly Fulton |
| Latency Distributions and Micro-Benchmarking to Identify and Characterize Kernel Hotspots | SREcon21 | Danny Chen |
| Sparking Joy for Engineers with Observability | SREcon21 | Zac Delagrange |
| What To Do When SRE is Just a New Job Title? | SREcon21 | Benjamin Bütikofer |
| Let the Chaos Begin—SRE Chaos Engineering Meets Cybersecurity | SREcon21 | Francesco Sbaraglia, Adriana Petrich |
| Spike Detection in Alert Correlation at LinkedIn | SREcon21 | Nishant Singh |
| 10 Lessons Learned in 10 Years of SRE | SREcon21 | Andrea Spadaccini |
| What's the Cost of a Millisecond? | SREcon21 | Avishai Ish-Shalom |
| "Don't Follow Leaders" or "All Models Are Wrong (and So Am I)" | SREcon21 | Niall Murphy |
| PTAuth: Temporal Memory Safety via Robust Points-to Authentication | USENIX Security '21 | Reza Mirzazade Farkhani, Mansour Ahmadi, Long Lu |
| VoltPillager: Hardware-based fault injection attacks against Intel SGX Enclaves using the SVID voltage scaling interface | USENIX Security '21 | Zitai Chen, Georgios Vasilakis, Kit Murdock, Edward Dean, David Oswald, Flavio D. Garcia |
| PEARL: Plausibly Deniable Flash Translation Layer using WOM coding | USENIX Security '21 | Chen Chen, Anrin Chakraborti, Radu Sion |
| CURE: A Security Architecture with CUstomizable and Resilient Enclaves | USENIX Security '21 | Raad Bahmani, Ferdinand Brasser, Ghada Dessouky, Patrick Jauernig, Matthias Klimmek, Ahmad-Reza Sadeghi, Emmanuel Stapf |
| Protecting Cryptography Against Compelled Self-Incrimination | USENIX Security '21 | Sarah Scheffler, Mayank Varia |
| Hiding the Access Pattern is Not Enough: Exploiting Search Pattern Leakage in Searchable Encryption | USENIX Security '21 | Simon Oya, Florian Kerschbaum |
| Why Older Adults (Don't) Use Password Managers | USENIX Security '21 | Hirak Ray, Flynn Wolf, Ravi Kuber, Adam J. Aviv |
| Charger-Surfing: Exploiting a Power Line Side-Channel for Smartphone Information Leakage | USENIX Security '21 | Patrick Cronin, Xing Gao, Chengmo Yang, Haining Wang |
| PriSEC: A Privacy Settings Enforcement Controller | USENIX Security '21 | Rishabh Khandelwal, Thomas Linden, Hamza Harkous, Kassem Fawaz |
| Effective Notification Campaigns on the Web: A Matter of Trust, Framing, and Support | USENIX Security '21 | Max Maass, Alina Stöver, Henning Pridöhl, Sebastian Bretthauer, Dominik Herrmann, Matthias Hollick, Indra Spiecker |
| UNIFUZZ: A Holistic and Pragmatic Metrics-Driven Platform for Evaluating Fuzzers | USENIX Security '21 | Yuwei Li, Shouling Ji, Yuan Chen, Sizhuang Liang, Wei-Han Lee, Yueyao Chen, Chenyang Lyu, Chunming Wu, Raheem Beyah, Peng Cheng, Kangjie Lu, Ting Wang |
| Stealing Links from Graph Neural Networks | USENIX Security '21 | Xinlei He, Jinyuan Jia, Michael Backes, Neil Zhenqiang Gong, Yang Zhang |