Active
Recent
Comments
Search
Login
Login
usenix.org: 166 stories from 77 submitters
3
One Exploit to Rule them All? On the Security of Drop-in Replacement & Counterfeit Microcontrollers
pdf
hardware
security
usenix.org
via
calvin
7 days ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
8
zxcvbn: Low-Budget Password Strength Estimation
☶
cryptography
security
web
usenix.org
via
cos
1 month ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
5 comments
5
5
Quantifying Memory Unsafety and Reactions to It
slides
video
programming
usenix.org
via
edoput
1 month ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
6
Efficient Data Structures for Tamper-Evident Logging (2009)
pdf
merkle-trees
usenix.org
via
calvin
1 month ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
37
James Mickens Keynote, USENIX Security 2018
security
usenix.org
via
barathr
3 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
8 comments
8
11
ACID: A Debugger Built from a Language
debugging
usenix.org
via
lcapaldo
3 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
1
Feather: Teaching Tcl Objects to Fly (2000)
pdf
plt
usenix.org
via
lorddimwit
5 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
2
HTTPT: A Probe-Resistant Proxy
networking
privacy
security
usenix.org
via
maxb
5 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
29
Transcending POSIX: The End of an Era?
historical
unix
usenix.org
via
gerikson
6 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
12 comments
12
2
Augmenting Decompiler Output with Learned Variable Names and Types
pdf
reversing
usenix.org
via
crazyloglad
7 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
3
Open to a fault: On the passive compromise of TLS keys via transient errors
pdf
cryptography
security
usenix.org
via
calvin
7 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
3
Co-opting Linux Processes for High-Performance Network Simulation
pdf
networking
testing
usenix.org
via
adaszko
8 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
10
Amazon DynamoDB: A Scalable, Predictably Performant, and Fully Managed NoSQL Database Service (2022)
pdf
databases
historical
usenix.org
via
asymptote
8 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
2
Counting in Regexes Considered Harmful: Exposing ReDoS Vulnerability of Nonbacktracking Matchers
pdf
performance
security
usenix.org
via
lorddimwit
9 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
1
Aquila: A unified, low-latency fabric for datacenter networks
networking
usenix.org
via
adsouza
10 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
15
Lend Me Your Ear: Passive Remote Physical Side Channels on PCs
cryptography
security
usenix.org
via
crazyloglad
11 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
5 comments
5
6
Prodspec and Annealing
distributed
scaling
usenix.org
via
fenlix
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
2 comments
2
82
The Web3 Fraud
distributed
finance
merkle-trees
usenix.org
via
gcollazo
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
65 comments
65
9
Virtual Machine Showdown: Stack Versus Registers (2005)
pdf
performance
usenix.org
via
calvin
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
6 comments
6
5
Fuzzware: Using Precise MMIO Modeling for Effective Firmware Fuzzing | USENIX
security
usenix.org
via
crazyloglad
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
1
Gazing into the VOID
devops
usenix.org
via
ajdecon
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
5
Segcache: a memory-efficient and scalable in-memory key-value cache for small objects
pdf
databases
usenix.org
via
xcombelle
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
2 comments
2
3
BMC: Accelerating Memcached using Safe In-kernel Caching and Pre-stack Processing
performance
usenix.org
via
sanxiyn
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
5
Injection Attacks Reloaded: Tunnelling Malicious Payloads over DNS
security
usenix.org
via
xojoc
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
7
Automatic Extraction of Secrets from the Transistor Jungle using Laser-Assisted Side-Channel Attacks
☶
pdf
hardware
security
usenix.org
via
sn
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
Page 2 >>