Skip to main content

USENIX supports diversity, equity, and inclusion and condemns hate and discrimination.

Home
  • About
  • Conferences
  • Publications
    • Proceedings
    • Author Resources
    • ;login: Online
    • Writing for ;login: Online
    • ;login: Archive
  • Membership
  • Students
  • Search
  • Donate Today
  • Sign In
  • Search
  • About
    • USENIX Board
    • Staff
    • Newsroom
    • Good Works
    • Blog
    • Governance and Financials
    • USENIX Awards
    • USENIX Supporters
    • 2024 Board Election
    • Board Meeting Minutes
    • Annual Fund
  • Conferences
    • Upcoming
    • By Name
    • Calls for Papers
    • Grants
    • Sponsorship
    • Best Papers
    • Test of Time Awards
    • Multimedia
    • Conference Policies
    • Code of Conduct
  • Publications
    • Proceedings
    • Author Resources
    • ;login: Online
    • Writing for ;login: Online
    • ;login: Archive
  • Membership
  • Students
    • Conference Fees
    • Campus Representative Program
    • Student Grant Program
  • Search
  • Donate Today

You are here

Publications
Donate Today
An open access publication driven by the USENIX community
90 Results
October 5, 2022
Provably-Safe Multilingual Software Sandboxing using WebAssembly

WebAssembly’s safety guarantees are only as strong as the implementation enforcing them. We show two approaches to provably sandbox Wasm code, using formal verification and Rust.
Authors: Jay Bosamiya, Wen Shih Lim, Bryan Parno
Article shepherded by:
Rik Farrow
Read article now
October 4, 2022
The Sticky Problem of Measuring Passwords

Designing a tool that can take measurements on password has many challenges. We describe the process behind designing Gossamer, a framework for securely measuring passwords.
Authors: Marina Sanusi Bohuk, Mazharul Islam, Thomas Ristenpart, Rahul Chatterjee
Article shepherded by:
Rik Farrow
Read article now
September 8, 2022
Transcending POSIX: The End of an Era?

We provide a holistic view of the POSIX abstractions by a systematic review of the key factors that drove their evolution, and discuss our perspective of the future.
Authors: Pekka Enberg, Ashwin Rao, Jon Crowcroft, Sasu Tarkoma
Article shepherded by:
Rik Farrow
Read article now
July 25, 2022
Three Years of Crowdsourcing Smart Home Network Traffic

Examining the security and privacy of thousands of real-world smart home networks using IoT Inspector
Authors: Danny Yuxing Huang
Article shepherded by:
Rik Farrow
Read article now
July 18, 2022
Musings, July 2022

There is lots of evidence that there are few really good programmers, and Copilot isn't the solution.
Authors: Rik Farrow
Article shepherded by:
Rik Farrow
Read article now
June 30, 2022
Investigating Managed Language Runtime Performance

We instrumented and benchmarked Python and Node.js, finding out just how much slower they can be than Java, Go or C++ and why
Authors: David Lion, Adrian Chiu, Michael Stumm, Ding Yuan
Article shepherded by:
Rik Farrow
Read article now
June 25, 2022
Redesigning Hardware to Support Security: CHERI

Over a decade of research has resulted in a tool chain and RISC hardware that change pointers from integers to their own, safe, type
Authors: Rik Farrow
Article shepherded by:
Rik Farrow
Read article now
June 20, 2022
Metastable Failures in the Wild

We find that metastable failures are universally observed and provide an insider view of how they happen at Twitter
Authors: Lexiang Huang, Matthew Magnusson, Abishek Bangalore Muralikrishna, Salman Estyak, Rebecca Isaacs, Abutalib Aghayev, Timothy Zhu, Aleksey Charapko
Article shepherded by:
Rik Farrow
Read article now
June 2, 2022
What SRE Could Be

SRE could be - should be - much more than it is today. Please help.
Authors: Niall Murphy
Article shepherded by:
Laura Nolan
Read article now
April 8, 2022
Computer Security and the Internet

This is a security text book that covers a very broad set of topics concisely and clearly.
Authors: Rik Farrow
Article shepherded by:
Rik Farrow
Read article now
April 4, 2022
Jurassic Cloud

Large parts of our “modern” stack are 30+ years old, just like its architectural principles. The result - software dinosaurs roaming the Jurassic Cloud, out of place, out of time.
Authors: Avishai Ish-Shalom
Article shepherded by:
Effie Mouzeli
Read article now
March 29, 2022
Revisiting B+-tree vs. LSM-tree

LSM-trees have been preferred over B+-trees for some database storage but in-storage transparent compression effectively closes their gap
Authors: Yifan Qiao, Xubin Chen, Ning Zheng, Jiangpeng Li, Yang Liu, Tong Zhang
Article shepherded by:
Rik Farrow
Read article now
March 3, 2022
Understanding Software Dynamics

Uncovering the causes of long tail latency, while learning about about the quirks of compilers, CPUs, systems, and how best to observe your systems.
Authors: Rik Farrow
Article shepherded by:
Rik Farrow
Read article now
February 28, 2022
Ferret: Automatically Finding RFC Compliance Bugs in DNS Nameservers

Our SCALE approach jointly generates zone files and corresponding queries to cover RFC behaviors specified by an executable model of DNS resolution
Authors: Siva Kesava Reddy Kakarla, Ryan Beckett, Todd Millstein, George Varghese
Article shepherded by:
Sangeetha Abdu Jyothi
Read article now
February 17, 2022
An Analysis of Open-source Automated Threat Modeling Tools and Their Extensibility from Security into Privacy

Automated tools can lessen the burden of threat modeling for security and privacy, but picking a tool is difficult without insight into functionality and user experience.
Authors: Kristen Tan, Vaibhav Garg
Article shepherded by:
Rik Farrow
Read article now
February 7, 2022
How to Start on Formal Methods and Share It

You might have heard of formal methods. we decided to learn a thing or two about formal method and try to use it in some way in general software development.
Authors: Melby Sjamsuddin, Meimei Liang
Article shepherded by:
Rik Farrow
Read article now
February 3, 2022
ctFS: Converting File Index Traversals to Hardware Memory Translation through Contiguous File Allocation for Persistent Memory

A Persistent Memory Filesystem that uses virtual memory mapping to physical memory to speed up file access
Authors: Ruibin Li, Xiang Ren, Xu Zhao, Siwei He, Michael Stumm, Ding Yuan
Article shepherded by:
Alexandra Fedorova
Read article now
February 2, 2022
Lessons Learned in 10 Years of SRE: Part 1 - Starting SRE

It is vital to have clear motivations, align with business goals, have the right kind of expertise, to pay attention to culture, and to build trust.
Authors: Andrea Spadaccini
Article shepherded by:
Laura Nolan
Read article now

Pages

  • « first
  • ‹ previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • next ›
  • last »
See ;login: editions prior to 2021
Home

© USENIX
Website designed and built
by Giant Rabbit LLC

  • Privacy Policy
  • Contact Us
Sign up for Our Newsletter: