Active
Recent
Comments
Search
Login
Login
usenix.org: 167 stories from 77 submitters
7
Automatic Extraction of Secrets from the Transistor Jungle using Laser-Assisted Side-Channel Attacks
☶
pdf
hardware
security
usenix.org
via
sn
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
8
A Linux Kernel Implementation of the Homa Transport Protocol
☶
pdf
networking
usenix.org
via
knl
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
6
The Road to Less Trusted Code: Lowering the Barrier to In-Process Sandboxing
pdf
security
usenix.org
via
freddyb
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
37
Scalability! But at what COST? (2015)
pdf
performance
scaling
usenix.org
via
vfoley
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
20 comments
20
4
Preventing Use-After-Free Attacks with Fast Forward Allocation
pdf
security
usenix.org
via
fro
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
2
MAZE: Towards Automated Heap Feng Shui
pdf
security
usenix.org
via
fro
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
2
Copysets: Reducing the Frequency of Data Loss in Cloud Storage
distributed
usenix.org
via
ajdecon
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
1
Vulnerable Compliance (2010)
video
security
usenix.org
via
GeoffWozniak
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
3
VScape: Assessing and Escaping Virtual Call Protections
pdf
security
usenix.org
via
fro
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
4
Seeing Like an SRE: Site Reliability Engineering as High Modernism
devops
usenix.org
via
ajdecon
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
2
PrivateDrop: Practical Privacy-Preserving Authentication for Apple AirDrop
pdf
privacy
usenix.org
via
lattera
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
12
Segcache: a memory-efficient and scalable in-memory key-value cache for small objects
distributed
performance
scaling
usenix.org
via
seasidedrum
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
6
Partitioning Oracle Attacks
☶
pdf
cryptography
security
usenix.org
via
eau
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
2
Efficiently Mitigating Transient Execution Attacks using the Unmapped Speculation Contract
security
usenix.org
via
fro
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
8
DIGITAL FX!32: Running 32-Bit x86 Applications on Alpha NT (1997)
pdf
windows
usenix.org
via
calvin
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
5
A System to Transparently Compress Hundreds of Petabytes of Image
slides
video
databases
usenix.org
via
pushcx
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
6
Laser-Based Audio Injection Attacks on Voice-Controllable Systems
☶
pdf
hardware
security
usenix.org
via
pushcx
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
1
OSDI '21 Call for Papers
event
osdev
usenix.org
via
inactive-user
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
19
Everything Old is New Again: Binary Security of WebAssembly
browsers
programming
security
wasm
web
usenix.org
via
andyc
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
5 comments
5
6
Sys: A Static/Symbolic Tool for Finding Good Bugs in Good (Browser) Code
security
usenix.org
via
ceh
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
3
BigMAC: Fine-Grained Policy Analysis of Android Firmware
security
usenix.org
via
crazyloglad
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
2
AURORA: Statistical Crash Analysis for Automated Root Cause Explanation | USENIX
debugging
security
usenix.org
via
crazyloglad
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
4
USENIX ATC '20 Technical Sessions
compsci
usenix.org
via
knl
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
5
V0LTpwn: Attacking x86 Processor Integrity from Software
pdf
security
usenix.org
via
fro
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
2
Evaluating File System Reliability on Solid State Drives
☶
pdf
hardware
usenix.org
via
calvin
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
<< Page 1
|
Page 3 >>