Home
Recent
Comments
Search
Login
Search
Search:
Stories
Comments
Order By:
Relevance
Newest
Points
70 results for "domain:usenix.org"
4
The Design and Implementation of Hyperupcalls
☶
pdf
performance
security
virtualization
usenix.org
via
ceh
29 days ago
|
cached
|
no comments
0
2
Spiffy: Enabling File-System Aware Storage Applications
☶
pdf
c
compsci
programming
usenix.org
via
nickpsecurity
1 month ago
|
cached
|
no comments
0
3
Battle of the Schedulers: FreeBSD ULE vs. Linux CFS
pdf
freebsd
linux
usenix.org
via
vermaden
1 month ago
|
cached
|
1 comment
1
4
Design and Evaluation of a Continuous Consistency Model for Replicated Services
pdf
distributed
usenix.org
via
jtfmumm
4 months ago
|
cached
|
no comments
0
1
Secure Deletion of Data from Magnetic and Solid-State Memory (1996)
historical
security
usenix.org
via
mjturner
5 months ago
|
cached
|
no comments
0
3
Lock-in-Pop: Securing Privileged Operating System Kernels by Keeping on the Beaten Path
☶
pdf
linux
security
unix
virtualization
usenix.org
via
nickpsecurity
5 months ago
|
cached
|
no comments
0
3
Fail-Slow at Scale: Evidence of Hardware Performance Faults in Large Production Systems
pdf
distributed
usenix.org
via
antifuchs
6 months ago
|
cached
|
1 comment
1
3
An Evolutionary Study of Linux Memory Management for Fun and Profit (2016)
pdf
linux
programming
security
usenix.org
via
nickpsecurity
6 months ago
|
cached
|
no comments
0
2
FlexSC: Flexible System Call Scheduling with Exception-Less System Calls (2010)
pdf
compsci
usenix.org
via
rzhikharevich
7 months ago
|
cached
|
no comments
0
1
CuriOS: Improving Reliability through Operating System Structure (2008)
compsci
usenix.org
via
nickpsecurity
8 months ago
|
cached
|
no comments
0
9
Psychological Safety in Operation Teams
pdf
practices
usenix.org
via
enn
8 months ago
|
cached
|
no comments
0
3
GSMem: Data Exfiltration from Air-Gapped Computers over GSM Frequencies (2015)
pdf
hardware
networking
security
usenix.org
via
pushcx
9 months ago
|
cached
|
2 comments
2
3
Experiences from a Decade of TinyOS Development (2012)
pdf
hardware
programming
usenix.org
via
nickpsecurity
9 months ago
|
cached
|
no comments
0
3
The Million-Key Question—Investigating the Origins of RSA Public Keys
pdf
security
visualization
usenix.org
via
friendlysock
10 months ago
|
cached
|
no comments
0
2
Micro-Reboot: A Technique for Cheap Recovery (2004)
pdf
compsci
java
programming
usenix.org
via
nickpsecurity
11 months ago
|
cached
|
no comments
0
6
Exploitations of Uninitialized Uses on macOS Sierra
pdf
mac
security
usenix.org
via
avisaven
1 year ago
|
cached
|
no comments
0
4
A filesystem attack vector for rowhammer-like attacks
☶
pdf
hardware
security
usenix.org
via
jcs
1 year ago
|
cached
|
no comments
0
3
Watchdogs: Extending UNIX Filesystem
☶
pdf
unix
usenix.org
via
hoelzro
1 year ago
|
cached
|
no comments
0
13
Portals in 4.4BSD (1995)
☶
networking
unix
usenix.org
via
seschwar
1 year ago
|
cached
|
2 comments
2
1
FIE on Firmware: Finding Vulnerabilities in Embedded Systems Using Symbolic Execution (2013)
pdf
slides
programming
security
usenix.org
via
nickpsecurity
1 year ago
|
cached
|
1 comment
1
Page:
1
2
3
4