Skip to main content

USENIX supports diversity, equity, and inclusion and condemns hate and discrimination.

Home
  • About
  • Conferences
  • Publications
    • Proceedings
    • Author Resources
    • ;login: Online
    • Writing for ;login: Online
    • ;login: Archive
  • Membership
  • Students
  • Search
  • Donate Today
  • Sign In
  • Search
  • About
    • USENIX Board
    • Staff
    • Newsroom
    • Good Works
    • Blog
    • Governance and Financials
    • USENIX Awards
    • USENIX Supporters
    • 2024 Board Election
    • Board Meeting Minutes
    • Donate
  • Conferences
    • Upcoming
    • By Name
    • Calls for Papers
    • Grants
    • Sponsorship
    • Best Papers
    • Test of Time Awards
    • Multimedia
    • Conference FAQ
    • Conference Policies
    • Code of Conduct
  • Publications
    • Proceedings
    • Author Resources
    • ;login: Online
    • Writing for ;login: Online
    • ;login: Archive
  • Membership
  • Students
    • Conference Fees
    • Campus Representative Program
    • Student Grant Program
  • Search
  • Donate Today

You are here

Publications
Donate Today
124 Results
November 26, 2024
Synthetic Monitoring & End-to-End Testing: Two Sides of the Same Coin

Monitoring-as-code can help to support better communication and collaboration between development, operations, and testing, as well as reduce cost and complexity.
Authors: Carly Richmond
Article shepherded by:
Laura Nolan
Read article now
November 14, 2024
Sieve: Chaos Testing for Kubernetes Controllers

Ensuring Kubernetes controller correctness and reliability is challenging, and chaos testing can uncover many severe bugs.
Authors: Xudong Sun, Wenqing Luo, Jiawei Tyler Gu, Aishwarya Ganesan, Ramnatthan Alagappan, Michael Gasch, Lalith Suresh, Tianyin Xu
Article shepherded by:
Laura Nolan
Read article now
October 11, 2024
Gear Shift Hacks: Uncovering the Security Risks of Wireless Technology in Professional Cycling

In the midst of the Tour de France, the race leader faces unexpected gear malfunctions while climbing L’Alpe D’Huez. Is it a mere technical glitch or a sign of high-tech foul play?
Authors: Maryam Motallebighomi, Earlence Fernandes, Aanjhan Ranganathan
Article shepherded by:
Rik Farrow
Read article now
October 7, 2024
Exploiting Smartphones

Some history of exploiting smartphones, starting with the iPhone, and a description of a paper about Android and Linux kernel defenses and where they are lacking.
Authors: Rik Farrow
Article shepherded by:
Rik Farrow
Read article now
September 30, 2024
Solving the First-Mile Problem

If side channels are like mind reading, this is mind control. Using lasers to execute arbitrary code.
Authors: Joe Loughry
Article shepherded by:
Rik Farrow
Read article now
September 4, 2024
Navigating the Kubernetes Odyssey

How ThousandEyes went from running in a bunch of servers in a garage, to being a full fledged, cloud native, multi-region platform in Kubernetes.
Authors: Raúl Benencia
Article shepherded by:
Laura Nolan
Read article now
August 29, 2024
Artificial Intelligence and the New Economics of Cyberattacks

A careful examination of the way that AI will affect both attackers and defenders
Authors: Vaibhav Garg, Jayati Dev
Article shepherded by:
Rik Farrow
Read article now
August 15, 2024
Measuring the Great Firewall's Multi-layered Web Filtering Apparatus

Authors: Nguyen Phong Hoang, Nick Feamster
Article shepherded by:
Rik Farrow
Read article now
August 2, 2024
Acto: Push-Button End-to-End Testing for Operation Correctness of Kubernetes Operators

Acto is an open-source end-to-end testing tool for correctness in Kubernetes operators.
Authors: Jiawei Tyler Gu, Xudong Sun, Zhen Tang, Chen Wang, Mandana Vaziri, Owolabi Legunsen, Tianyin Xu
Article shepherded by:
Laura Nolan
Read article now
July 30, 2024
Analysis of USENIX Paper Downloads

An analysis of the millions of paper and presentation downloads occurring in the summer of 2024, and what makes papers more popular.
Authors: Rik Farrow
Read article now
July 29, 2024
Consequences of Compliance: The CrowdStrike Outage of 19 July 2024

Taking stock of the largest digital systems outage in history
Authors: Laura Nolan
Article shepherded by:
Rik Farrow
Read article now
July 16, 2024
Fuzzing BusyBox: Leveraging LLM and Crash Reuse for Embedded Bug Unearthing

Using LLMs to create seeds for fuzzing IoT binaries works well, as does keeping track of crashes occurring during the fuzzing of similar binaries.
Authors: Asmita, Yaroslav Oliinyk, Michael Scott, Ryan Tsang, Chongzhou Fang, Houman Homayoun
Article shepherded by:
Rik Farrow
Read article now
July 8, 2024
Choose One: Android Performance or Security!

Memory safety security mitigations on Android are undermined by its performance-driven system architecture, affecting even the newly introduced hardened memory allocator.
Authors: Philipp Mao, Mathias Payer
Article shepherded by:
Rik Farrow
Read article now
July 1, 2024
Data-Only Attacks Are Easier than You Think

Once considered too sophisticated and niche to pose a practical threat, data-only attacks can now be generated automatically with surprising ease.
Authors: Brian Johannesmeyer, Herbert Bos, Cristiano Giuffrida, Asia Slowinska
Article shepherded by:
Rik Farrow
Read article now
July 1, 2024
An Empirical Study of Rust-for-Linux: The Success, Dissatisfaction, and Compromise

Rust-for-Linux may not be as safe as it seems. We examine current experiences including performance Rust-for-Linux.
Authors: Hongyu Li, Liwei Guo, Yexuan Yang, Shangguang Wang, Mengwei Xu
Article shepherded by:
Rik Farrow
Read article now
June 27, 2024
Interview with Arnold Robbins

Arnold Robbins has been the maintainer of gawk for over three decades; he has also written or revised more than ten books related to Unix systems.
Authors: Rik Farrow, Arnold Robbins
Article shepherded by:
Rik Farrow
Read article now
June 27, 2024
Understanding and Improving Web Application Fingerprinting with WASABO

Web application fingerprinting tools can help both defenders and attackers. But how well do they actually work? We tested them in the lab and in the wild.
Authors: Nick Nikiforakis, Brian Kondracki
Article shepherded by:
Rik Farrow
Read article now
June 26, 2024
Telescope: Profiling Memory Access Patterns at the Terabyte-scale

Telescope is a new memory access profiling tool that can detect access patterns for terabytes-large working sets quickly, precisely and at low overheads.
Authors: Alan Nair, Sandeep Kumar, Aravinda Prasad
Article shepherded by:
Rik Farrow
Read article now

Pages

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • next ›
  • last »
See ;login: editions prior to 2021
Home

© USENIX
Website designed and built
by Giant Rabbit LLC

  • Privacy Policy
  • Contact Us
Sign up for Our Newsletter: