Skip to main content

USENIX supports diversity, equity, and inclusion and condemns hate and discrimination.

Home
  • About
  • Conferences
  • Publications
    • Proceedings
    • Author Resources
    • ;login: Online
    • ;login: Archive
  • Membership
  • Students
  • Search
  • Donate Today
  • Sign In
  • Search
  • About
    • USENIX Board
    • Staff
    • Newsroom
    • Good Works
    • Blog
    • Governance and Financials
    • USENIX Awards
    • USENIX Supporters
    • 2022 Board Election
    • Board Meeting Minutes
    • Annual Fund
  • Conferences
    • Upcoming
    • By Name
    • Calls for Papers
    • Grants
    • Sponsorship
    • Best Papers
    • Test of Time Awards
    • Multimedia
    • Conference Policies
    • Code of Conduct
  • Publications
    • Proceedings
    • Author Resources
    • ;login: Online
    • ;login: Archive
  • Membership
  • Students
    • Conference Fees
    • Campus Representative Program
    • Student Grant Program
  • Search
  • Donate Today

You are here

Publications
Donate Today
An open access publication driven by the USENIX community
77 Results
February 28, 2022
Ferret: Automatically Finding RFC Compliance Bugs in DNS Nameservers

Our SCALE approach jointly generates zone files and corresponding queries to cover RFC behaviors specified by an executable model of DNS resolution
Authors: Siva Kesava Reddy Kakarla, Ryan Beckett, Todd Millstein, George Varghese
Article shepherded by:
Sangeetha Abdu Jyothi
Read article now
February 17, 2022
An Analysis of Open-source Automated Threat Modeling Tools and Their Extensibility from Security into Privacy

Automated tools can lessen the burden of threat modeling for security and privacy, but picking a tool is difficult without insight into functionality and user experience.
Authors: Kristen Tan, Vaibhav Garg
Article shepherded by:
Rik Farrow
Read article now
February 7, 2022
How to Start on Formal Methods and Share It

You might have heard of formal methods. we decided to learn a thing or two about formal method and try to use it in some way in general software development.
Authors: Melby Sjamsuddin, Meimei Liang
Article shepherded by:
Rik Farrow
Read article now
February 3, 2022
ctFS: Converting File Index Traversals to Hardware Memory Translation through Contiguous File Allocation for Persistent Memory

A Persistent Memory Filesystem that uses virtual memory mapping to physical memory to speed up file access
Authors: Ruibin Li, Xiang Ren, Xu Zhao, Siwei He, Michael Stumm, Ding Yuan
Article shepherded by:
Alexandra Fedorova
Read article now
February 2, 2022
Lessons Learned in 10 Years of SRE: Part 1 - Starting SRE

It is vital to have clear motivations, align with business goals, have the right kind of expertise, to pay attention to culture, and to build trust.
Authors: Andrea Spadaccini
Article shepherded by:
Laura Nolan
Read article now
January 17, 2022
Getting Zoned Storage out of the Friend Zone

Zone Namespaces provide a new interface to SSDs, giving applications writers the ability to improve SSD efficiency and performance.
Authors: Matias Bjørling, George Amvrosiadis, Bill Jannen, Rik Farrow
Article shepherded by:
Bill Jannen, Rik Farrow
Read article now
January 14, 2022
Imposing a Cyber Penalty Against Attackers with Cyber Deception

This research demonstrates that defensive deception both slows down and helps detect attackers.
Authors: Kimberly Ferguson-Walter
Article shepherded by:
Rik Farrow
Read article now
December 27, 2021
Diciclo: Data-Intensive Container Isolation for Multitenant Clouds

Diciclo is a general framework for building user-level file and network services for container storage.
Authors: Giorgos Kappes, Stergios V. Anastasiadis
Article shepherded by:
Rik Farrow
Read article now
December 22, 2021
Prodspec and Annealing

A technical deep dive into Google's intent-based production management.
Authors: Pierre Palatin, Betsy Beyer
Article shepherded by:
Laura Nolan
Read article now
December 16, 2021
The Web3 Fraud

Web3 is not a revolution in decentralization. It's just an inefficient way to promote cryptocurrencies.
Authors: Nicholas Weaver
Article shepherded by:
Rik Farrow
Read article now
December 14, 2021
A Tutorial on Building Custom Linux Appliances

A tutorial that shows how to easily build a simple Linux environment running with a focus on providing a platform for running experiments in systems research.
Authors: Han Dong, Jonathan Appavoo
Article shepherded by:
Rik Farrow
Read article now
December 9, 2021
Squeezing the Cybersecurity Lemons – A Labeling Regime for IoT Products

IoT security labels must be developed accounting for the diversity of devices and deployment contexts, the sustainability of labeling regimes, and the user experience of consumers.
Authors: Vaibhav Garg, Andreas Kuehn
Article shepherded by:
Rik Farrow
Read article now
December 4, 2021
Practical Doomsday

A thoughtful review of risks faced in developed countries, and what you can do to be prepared.
Authors: Rik Farrow
Article shepherded by:
Rik Farrow
Read article now
December 1, 2021
(How) Do people change their passwords after a breach?

Our research shows that many users ignore serious warnings about the need to change passwords and not reuse them.
Authors: Sruti Bhagavatula, Lujo Bauer, Apu Kapadia
Article shepherded by:
Rik Farrow
Read article now
November 8, 2021
It's Good to be Lazy

Taking good notes allows you to be lazy: you won't have to search for solutions to problems you have already solved before. I also suggest tools that help with note-taking.
Authors: Andreas Gerler
Article shepherded by:
Rik Farrow
Read article now
October 6, 2021
A Vulnerable System

An easy-to-read book covering the history of computer security.
Authors: Rik Farrow
Article shepherded by:
Rik Farrow
Read article now
October 5, 2021
Gazing into the VOID

Laura Nolan argues that reading incident reports can improve our ability to respond to production problems.
Authors: Laura Nolan
Article shepherded by:
Effie Mouzeli
Read article now
September 6, 2021
Improving On-call Fatigue

Daria argues the notion that "On-call shifts should be stressful and trying”, by suggesting ideas on how to spin on-call to be positive, educating, and bring teams together.
Authors: Daria Barteneva
Article shepherded by:
Effie Mouzeli
Read article now

Pages

  • « first
  • ‹ previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • next ›
  • last »
See ;login: editions prior to 2021
Home

© USENIX
Website designed and built
by Giant Rabbit LLC

  • Privacy Policy
  • Contact Us
Sign up for Our Newsletter: