USENIX supports diversity, equity, and inclusion and condemns hate and discrimination.
An open access publication driven by the USENIX community
124 Results
November 26, 2024
Synthetic Monitoring & End-to-End Testing: Two Sides of the Same Coin
Article shepherded by:
Laura Nolan
November 14, 2024
Sieve: Chaos Testing for Kubernetes Controllers
Article shepherded by:
Laura Nolan
October 11, 2024
Gear Shift Hacks: Uncovering the Security Risks of Wireless Technology in Professional Cycling
Article shepherded by:
Rik Farrow
September 30, 2024
Solving the First-Mile Problem
Article shepherded by:
Rik Farrow
September 4, 2024
Navigating the Kubernetes Odyssey
Article shepherded by:
Laura Nolan
August 29, 2024
Artificial Intelligence and the New Economics of Cyberattacks
Article shepherded by:
Rik Farrow
August 15, 2024
Measuring the Great Firewall's Multi-layered Web Filtering Apparatus
Article shepherded by:
Rik Farrow
August 2, 2024
Acto: Push-Button End-to-End Testing for Operation Correctness of Kubernetes Operators
Article shepherded by:
Laura Nolan
July 29, 2024
Consequences of Compliance: The CrowdStrike Outage of 19 July 2024
Article shepherded by:
Rik Farrow
July 16, 2024
Fuzzing BusyBox: Leveraging LLM and Crash Reuse for Embedded Bug Unearthing
Article shepherded by:
Rik Farrow
July 8, 2024
Choose One: Android Performance or Security!
Article shepherded by:
Rik Farrow
July 1, 2024
Data-Only Attacks Are Easier than You Think
Article shepherded by:
Rik Farrow
July 1, 2024
An Empirical Study of Rust-for-Linux: The Success, Dissatisfaction, and Compromise
Article shepherded by:
Rik Farrow
June 27, 2024
Understanding and Improving Web Application Fingerprinting with WASABO
Article shepherded by:
Rik Farrow
June 26, 2024
Telescope: Profiling Memory Access Patterns at the Terabyte-scale
Article shepherded by:
Rik Farrow