Search results

    Rethinking the SDLCSREcon21Emily Freeman
    Panel: Engineering OnboardingSREcon21Daria Barteneva, Jennifer Petoff, Anne Hamilton, Sandi Friend, Ilse White
    Panel: ObservabilitySREcon21Daria Barteneva, Liz Fong-Jones, Gabe Wishnie, Štěpán Davidovic, Richard Waid, Partha Kanuparthy
    When Linux Memory Accounting Goes WrongSREcon21Minhaj Ahammed
    A Political Scientist's View on Site ReliabilitySREcon21Michael Krax
    Capacity Management for Fun & ProfitSREcon21Aly Fulton
    Latency Distributions and Micro-Benchmarking to Identify and Characterize Kernel HotspotsSREcon21Danny Chen
    Sparking Joy for Engineers with ObservabilitySREcon21Zac Delagrange
    What To Do When SRE is Just a New Job Title?SREcon21Benjamin Bütikofer
    Let the Chaos Begin—SRE Chaos Engineering Meets CybersecuritySREcon21Francesco Sbaraglia, Adriana Petrich
    Spike Detection in Alert Correlation at LinkedInSREcon21Nishant Singh
    10 Lessons Learned in 10 Years of SRESREcon21Andrea Spadaccini
    What's the Cost of a Millisecond?SREcon21Avishai Ish-Shalom
    "Don't Follow Leaders" or "All Models Are Wrong (and So Am I)"SREcon21Niall Murphy
    PTAuth: Temporal Memory Safety via Robust Points-to AuthenticationUSENIX Security '21Reza Mirzazade Farkhani, Mansour Ahmadi, Long Lu
    VoltPillager: Hardware-based fault injection attacks against Intel SGX Enclaves using the SVID voltage scaling interfaceUSENIX Security '21Zitai Chen, Georgios Vasilakis, Kit Murdock, Edward Dean, David Oswald, Flavio D. Garcia
    PEARL: Plausibly Deniable Flash Translation Layer using WOM codingUSENIX Security '21Chen Chen, Anrin Chakraborti, Radu Sion
    CURE: A Security Architecture with CUstomizable and Resilient EnclavesUSENIX Security '21Raad Bahmani, Ferdinand Brasser, Ghada Dessouky, Patrick Jauernig, Matthias Klimmek, Ahmad-Reza Sadeghi, Emmanuel Stapf
    Protecting Cryptography Against Compelled Self-IncriminationUSENIX Security '21Sarah Scheffler, Mayank Varia
    Hiding the Access Pattern is Not Enough: Exploiting Search Pattern Leakage in Searchable EncryptionUSENIX Security '21Simon Oya, Florian Kerschbaum
    Why Older Adults (Don't) Use Password ManagersUSENIX Security '21Hirak Ray, Flynn Wolf, Ravi Kuber, Adam J. Aviv
    Charger-Surfing: Exploiting a Power Line Side-Channel for Smartphone Information LeakageUSENIX Security '21Patrick Cronin, Xing Gao, Chengmo Yang, Haining Wang
    PriSEC: A Privacy Settings Enforcement ControllerUSENIX Security '21Rishabh Khandelwal, Thomas Linden, Hamza Harkous, Kassem Fawaz
    Effective Notification Campaigns on the Web: A Matter of Trust, Framing, and SupportUSENIX Security '21Max Maass, Alina Stöver, Henning Pridöhl, Sebastian Bretthauer, Dominik Herrmann, Matthias Hollick, Indra Spiecker
    UNIFUZZ: A Holistic and Pragmatic Metrics-Driven Platform for Evaluating FuzzersUSENIX Security '21Yuwei Li, Shouling Ji, Yuan Chen, Sizhuang Liang, Wei-Han Lee, Yueyao Chen, Chenyang Lyu, Chunming Wu, Raheem Beyah, Peng Cheng, Kangjie Lu, Ting Wang