Active
Recent
Comments
Search
Login
Login
usenix.org: 179 stories from 83 submitters
1
Open Versus Closed: A Cautionary Tale (2006)
pdf
performance
usenix.org
via
eatonphil
2 months ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
5
MakeShift: Security Analysis of Shimano Di2 Wireless Gear Shifting in Bicycles
pdf
reversing
usenix.org
via
df
3 months ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
6
A Uniform Name Service for Spring's UNIX Environment (1994)
unix
usenix.org
via
manuel
4 months ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
13
An Empirical Study of Rust-for-Linux: The Success, Dissatisfaction, and Compromise
rust
usenix.org
via
adaszko
4 months ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
13 comments
13
7
MRTG The Multi Router Traffic Grapher (1998)
☶
pdf
networking
performance
usenix.org
via
kuijsten
5 months ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
3 comments
3
7
Bcrypt at 25: A Retrospective on Password Security
security
usenix.org
via
fanf
6 months ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
7
Itanium — A System Implementor’s Tale (2005)
pdf
assembly
osdev
usenix.org
via
calvin
7 months ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
13
ARC: A Self-Tuning, Low Overhead Replacement Cache
pdf
compsci
usenix.org
via
friendlysock
1 year ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
8 comments
8
7
Simple Testing Can Prevent Most Critical Failures: An Analysis of Production Failures (2014)
pdf
databases
distributed
testing
usenix.org
via
eatonphil
1 year ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
4
How to Abuse and Fix Authenticated Encryption Without Key Commitment
cryptography
usenix.org
via
bowyakka
1 year ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
33
FreeBSD on Firecracker
freebsd
usenix.org
via
abhi9u
1 year ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
5 comments
5
4
Every Signature is Broken: On the Insecurity of Microsoft Office’s OOXML Signatures
☶
pdf
cryptography
security
usenix.org
via
calvin
1 year ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
7
Logs Told Us It Was DNS, It Looked like DNS, It Had to Be DNS, It Wasn't DNS
video
debugging
distributed
usenix.org
via
knl
1 year ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
6 comments
6
3
One Exploit to Rule them All? On the Security of Drop-in Replacement & Counterfeit Microcontrollers
pdf
hardware
security
usenix.org
via
calvin
1 year ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
8
zxcvbn: Low-Budget Password Strength Estimation
☶
cryptography
security
web
usenix.org
via
cos
1 year ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
5 comments
5
5
Quantifying Memory Unsafety and Reactions to It
slides
video
programming
usenix.org
via
edoput
1 year ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
6
Efficient Data Structures for Tamper-Evident Logging (2009)
pdf
merkle-trees
usenix.org
via
calvin
1 year ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
37
James Mickens Keynote, USENIX Security 2018
security
usenix.org
via
barathr
2 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
8 comments
8
11
ACID: A Debugger Built from a Language
debugging
usenix.org
via
lcapaldo
2 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
1
Feather: Teaching Tcl Objects to Fly (2000)
pdf
plt
usenix.org
via
lorddimwit
2 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
2
HTTPT: A Probe-Resistant Proxy
networking
privacy
security
usenix.org
via
maxb
2 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
29
Transcending POSIX: The End of an Era?
historical
unix
usenix.org
via
gerikson
2 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
12 comments
12
2
Augmenting Decompiler Output with Learned Variable Names and Types
pdf
reversing
usenix.org
via
crazyloglad
2 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
3
Open to a fault: On the passive compromise of TLS keys via transient errors
pdf
cryptography
security
usenix.org
via
calvin
2 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
3
Co-opting Linux Processes for High-Performance Network Simulation
pdf
networking
testing
usenix.org
via
adaszko
2 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
Page 2 >>