ServiceRouter: Hyperscale and Minimal Cost Service Mesh at Meta [pdf]

Meta’s Microservice Architecture [pdf]

Windows: A software engineering odyssey (2000)

MELF: Multivariant Executables for a Heterogeneous World

Invisinets: Removing Networking from Cloud Networks [pdf]

Every Signature Is Broken: Insecurity of Microsoft Office’s Ooxml Signatures

Every Signature is Broken: On the Insecurity of Microsoft Office’s OOXML Signatures

Off-Path Network Traffic Manipulation via Revitalized ICMP Redirect (2022) [pdf]

Codon: Python Compiler

Bcrypt at 25

Logs Told Us It Was DNS, It Looked like DNS, It Had to Be DNS, It Wasn't DNS

Little Languages for Music (1990) [pdf]

IASO: A Fail-Slow Detection and Mitigation Framework for Storage Services

From Laptop to Lambda: Outsourcing Jobs to Thousands of Functional Containers [pdf]

One Exploit to Rule them All? On the Security of Drop-in Replacement & Counterfeit Microcontrollers

zxcvbn: Low-Budget Password Strength Estimation

Efficient Data Structures for Tamper-Evident Logging (2009)

Quantifying Memory Unsafety and Reactions to It

Little Languages for Music (CLI as DAW, 1990) [pdf]

The Night Watch

James Mickens Keynote, USENIX Security 2018

ACID: A Debugger Built from a Language

Twilight: A Differentially Private Payment Channel Network

Exploring the Unchartered Space of Container Registry Typosquatting

Aquila: Google's New Datacenter Fabric

Feather: Teaching Tcl Objects to Fly (2000)

Transcending Posix: The End of an Era?

Httpt: A Probe-Resistant Proxy – Usenix

Open to a fault: On the passive compromise of TLS keys via transient errors

Paper: Augmenting Decompiler Output with Learned Variable Names and Types

More →