FreeBSD on Firecracker
Porting FreeBSD to Firecracker dropped the boot time to 20 ms, revealing bugs in the boot process and Firecracker, and is an example of porting a kernel.
Authors: Colin Percival
Article shepherded by: Rik Farrow
Observing CAPTCHAS “in the Wild”
CAPTCHAs continue to be annoying—we enlisted people to see how long CAPTCHAs took to solve, which types were easiest for people, and how often people quit without finishing.
Authors: Andrew Searles, Gene Tsudik
Article shepherded by: Rik Farrow
Computer Security Research, Moral Dilemmas, and Ethical Frameworks
When making moral decisions in computer security research, people may disagree. When that happens, the tools of ethics and moral philosophy can help.
Authors: Tadayoshi Kohno, Yasemin Acar, Wulf Loh
Article shepherded by: Rik Farrow
Diving into Robocall Content with SnorCall
We provide insights from accurate, automated analysis of 232,0000 robocalls, including tools that authorities can use to get to the source of the problem.
Authors: Sathvik Prasad, Brad Reaves
Article shepherded by: Rik Farrow
Measuring the Risk Password Reuse Poses for a University
Reuse of passwords poses a greater threat than weak passwords based on research into compromised passwords at the University of Chicago.
Authors: Alexandra Nisenoff, Maximilian Golla, Blase Ur
Article shepherded by: Rik Farrow
Going Beyond an Incident Report with TLA+
Human reasoning capability is limited - SREs can benefit from using modelling specification languages to understand system behavior.
Authors: Finn Hackett, Joshua Rowe, Markus Alexander Kuppe
Article shepherded by: Laura Nolan
Enabling Realms with the Arm Confidential Compute Architecture
ARMv9 will include Realms, a combination of hardware and firmware that creates a mechanism for isolating memory from reading or writing even by the OS or hypervisor.
Authors: Xupeng Li, Xuheng Li, Christoffer Dall, Ronghui Gu, Jason Nieh, Yousuf Sait, Gareth Stockwell
Article shepherded by: Rik Farrow
BeyondCorp and the long tail of Zero Trust
After successfully transitioning most of the Google's workflows to BeyondCorp, we were left with a long tail of specific or challenging situations to resolve.
Authors: Guilherme Gonçalves, Kyle O'Malley, Betsy Beyer, Max Saltonstall
Article shepherded by: Rik Farrow
NSDI'23 Test of Time Award
A graduate research project turned into a popular web browser plug-in, used by millions
Authors: Franzi Roesner, Gennie Gebhart, Rik Farrow
Article shepherded by: Rik Farrow
Bcrypt at 25: A Retrospective on Password Security
Celebrating 25 years of bcrypt! Dive into its journey, enduring impact on password security, and unique ways it's shaping the future.
Authors: Niels Provos
Article shepherded by: Rik Farrow
Responding to and Learning from Distributed Incidents
Step through a distributed systems incident and see how teams can learn from these events.
Authors: Philipp Böschen
Article shepherded by: Laura Nolan
Codon: Python Compiler
Codon is a compiler for Python scripts that produces optimized code suitable for analyzing large amounts of data, with some limitations.
Authors: Rik Farrow
Article shepherded by: Laura Nolan
A Study in Practical Deduplication
Using data collected from 875 Microsoft employees' desktops and servers, the authors analyzed file metadata and potential deduplication strategies.
Authors: Dutch Meyer, Bill Bolosky, Rik Farrow
Article shepherded by: Rik Farrow
You don’t have a production environment
Your staging environment cannot accurately replicate your production environment. Multi-tenancy can solve this problem.
Authors: Avishai Ish-Shalom
Article shepherded by: Laura Nolan
Mistrust Plugins You Must: A Large-Scale Study Of Malicious Plugins In WordPress Marketplaces
Authors: Ranjita Pai Sridhar, Jonathan Fuller, Yiting Sun, Omar Chabklo, Andres Rodriguez, Jeman Park, Brendan Saltaformaggio
Article shepherded by: Rik Farrow
Musings on Operating Systems
Why is Windows on the desktop, while Linux rules the cloud?
Authors: Rik Farrow
Article shepherded by: Rik Farrow, Laura Nolan
Workload Security Rings
Authors: Michał Czapiński , Rainer Wolafka
Article shepherded by: Laura Nolan
CI is Alerting
Adding lots of alerts during the early stages of development can pay off later in an Continuous Integration environment.
Authors: Titus Winters
Article shepherded by: Rik Farrow, Laura Nolan