Bcrypt at 25

Logs Told Us It Was DNS, It Looked like DNS, It Had to Be DNS, It Wasn't DNS

Little Languages for Music (1990) [pdf]

IASO: A Fail-Slow Detection and Mitigation Framework for Storage Services

From Laptop to Lambda: Outsourcing Jobs to Thousands of Functional Containers [pdf]

One Exploit to Rule them All? On the Security of Drop-in Replacement & Counterfeit Microcontrollers

zxcvbn: Low-Budget Password Strength Estimation

Efficient Data Structures for Tamper-Evident Logging (2009)

Quantifying Memory Unsafety and Reactions to It

Little Languages for Music (CLI as DAW, 1990) [pdf]

The Night Watch

James Mickens Keynote, USENIX Security 2018

ACID: A Debugger Built from a Language

Twilight: A Differentially Private Payment Channel Network

Exploring the Unchartered Space of Container Registry Typosquatting

Aquila: Google's New Datacenter Fabric

Feather: Teaching Tcl Objects to Fly (2000)

Transcending Posix: The End of an Era?

Httpt: A Probe-Resistant Proxy – Usenix

Open to a fault: On the passive compromise of TLS keys via transient errors

Paper: Augmenting Decompiler Output with Learned Variable Names and Types

Can Applications Recover from Fsync Failures?

Dos and Don'ts of Machine Learning in Computer Security

Best Papers – Usenix Security 2022

Co-opting Linux Processes for High-Performance Network Simulation

Amazon DynamoDB: A Scalable, Predictably Performant, and Fully Managed NoSQL Database Service (2022)

Jurassic Cloud

Investigating Managed Language Runtime Performance

GhostTouch: Targeted Attacks on Touchscreens Without Physical Touch

Counting in Regexes Considered Harmful: Exposing ReDoS Vulnerability of Nonbacktracking Matchers

More →