Skip to main content
Home
  • About
  • Conferences
  • Publications
    • Proceedings
    • Author Resources
    • ;login: Online
    • Writing for ;login: Online
    • ;login: Archive
  • Membership
  • Students
  • Search
  • Donate Today
  • Sign In
  • Search
  • About
    • USENIX Board
    • Staff
    • Newsroom
    • Good Works
    • Blog
    • Governance and Financials
    • USENIX Awards
    • USENIX Supporters
    • 2024 Board Election
    • Board Meeting Minutes
    • Donate
  • Conferences
    • Upcoming
    • By Name
    • Calls for Papers
    • Grants
    • Sponsorship
    • Best Papers
    • Test of Time Awards
    • Multimedia
    • Conference FAQ
    • Conference Policies
    • Code of Conduct
  • Publications
    • Proceedings
    • Author Resources
    • ;login: Online
    • Writing for ;login: Online
    • ;login: Archive
  • Membership
  • Students
    • Conference Fees
    • Student Grant Program
  • Search
  • Donate Today

You are here

Publications
Donate Today
128 Results
January 24, 2025
NVLog: an Elegant Approach to Integrate NVM

Researchers have been attempting to redesign various system infrastructures for NVM, but is redesigning everything really the only solution? NVLog offers a different perspective...
Authors: Guoyu Wang, Juncheng Hu
Article shepherded by:
Rik Farrow
Read article now
January 13, 2025
Quantum Computing Notes: Why Is It Always Ten Years Away?

Written for software engineers, an overview of the advantages, challenges, and limitations of Quantum Computing. Is the technology ready to become a disruptive force?
Authors: Konstantin V. Shvachko
Article shepherded by:
Rik Farrow
Read article now
December 18, 2024
The Evolution of SRE at Google

In response to the vast increase in scale of their systems, Google SREs have been using the STAMP (System-Theoretic Accident Model and Processes) framework for finding problems.
Authors: Tim Falzone, Ben Treynor Sloss
Article shepherded by:
Rik Farrow
Read article now
December 16, 2024
Enabling Reproducibility through the SPHERE Research Infrastructure

SPHERE transforms cybersecurity and privacy research by enabling reproducible, sophisticated experiments, fostering peer review, and accelerating scientific progress
Authors: Jelena Mirkovic, Brian Kocoloski, David Balenson
Article shepherded by:
Rik Farrow
Read article now
November 26, 2024
Synthetic Monitoring & End-to-End Testing: Two Sides of the Same Coin

Monitoring-as-code can help to support better communication and collaboration between development, operations, and testing, as well as reduce cost and complexity.
Authors: Carly Richmond
Article shepherded by:
Laura Nolan
Read article now
November 14, 2024
Sieve: Chaos Testing for Kubernetes Controllers

Ensuring Kubernetes controller correctness and reliability is challenging, and chaos testing can uncover many severe bugs.
Authors: Xudong Sun, Wenqing Luo, Jiawei Tyler Gu, Aishwarya Ganesan, Ramnatthan Alagappan, Michael Gasch, Lalith Suresh, Tianyin Xu
Article shepherded by:
Laura Nolan
Read article now
October 11, 2024
Gear Shift Hacks: Uncovering the Security Risks of Wireless Technology in Professional Cycling

In the midst of the Tour de France, the race leader faces unexpected gear malfunctions while climbing L’Alpe D’Huez. Is it a mere technical glitch or a sign of high-tech foul play?
Authors: Maryam Motallebighomi, Earlence Fernandes, Aanjhan Ranganathan
Article shepherded by:
Rik Farrow
Read article now
October 7, 2024
Exploiting Smartphones

Some history of exploiting smartphones, starting with the iPhone, and a description of a paper about Android and Linux kernel defenses and where they are lacking.
Authors: Rik Farrow
Article shepherded by:
Rik Farrow
Read article now
September 30, 2024
Solving the First-Mile Problem

If side channels are like mind reading, this is mind control. Using lasers to execute arbitrary code.
Authors: Joe Loughry
Article shepherded by:
Rik Farrow
Read article now
September 4, 2024
Navigating the Kubernetes Odyssey

How ThousandEyes went from running in a bunch of servers in a garage, to being a full fledged, cloud native, multi-region platform in Kubernetes.
Authors: Raúl Benencia
Article shepherded by:
Laura Nolan
Read article now
August 29, 2024
Artificial Intelligence and the New Economics of Cyberattacks

A careful examination of the way that AI will affect both attackers and defenders
Authors: Vaibhav Garg, Jayati Dev
Article shepherded by:
Rik Farrow
Read article now
August 15, 2024
Measuring the Great Firewall's Multi-layered Web Filtering Apparatus

Authors: Nguyen Phong Hoang, Nick Feamster
Article shepherded by:
Rik Farrow
Read article now
August 2, 2024
Acto: Push-Button End-to-End Testing for Operation Correctness of Kubernetes Operators

Acto is an open-source end-to-end testing tool for correctness in Kubernetes operators.
Authors: Jiawei Tyler Gu, Xudong Sun, Zhen Tang, Chen Wang, Mandana Vaziri, Owolabi Legunsen, Tianyin Xu
Article shepherded by:
Laura Nolan
Read article now
July 30, 2024
Analysis of USENIX Paper Downloads

An analysis of the millions of paper and presentation downloads occurring in the summer of 2024, and what makes papers more popular.
Authors: Rik Farrow
Read article now
July 29, 2024
Consequences of Compliance: The CrowdStrike Outage of 19 July 2024

Taking stock of the largest digital systems outage in history
Authors: Laura Nolan
Article shepherded by:
Rik Farrow
Read article now
July 16, 2024
Fuzzing BusyBox: Leveraging LLM and Crash Reuse for Embedded Bug Unearthing

Using LLMs to create seeds for fuzzing IoT binaries works well, as does keeping track of crashes occurring during the fuzzing of similar binaries.
Authors: Asmita, Yaroslav Oliinyk, Michael Scott, Ryan Tsang, Chongzhou Fang, Houman Homayoun
Article shepherded by:
Rik Farrow
Read article now
July 8, 2024
Choose One: Android Performance or Security!

Memory safety security mitigations on Android are undermined by its performance-driven system architecture, affecting even the newly introduced hardened memory allocator.
Authors: Philipp Mao, Mathias Payer
Article shepherded by:
Rik Farrow
Read article now
July 1, 2024
Data-Only Attacks Are Easier than You Think

Once considered too sophisticated and niche to pose a practical threat, data-only attacks can now be generated automatically with surprising ease.
Authors: Brian Johannesmeyer, Herbert Bos, Cristiano Giuffrida, Asia Slowinska
Article shepherded by:
Rik Farrow
Read article now

Pages

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • next ›
  • last »
See ;login: editions prior to 2021
Home

© USENIX
Website designed and built
by Giant Rabbit LLC

  • Privacy Policy
  • Contact Us
Sign up for Our Newsletter: