Counting in Regexes Considered Harmful: Exposing ReDoS Vulnerability of Nonbacktracking Matchers

Illuminating the Security Issues Surrounding Lights-Out Server Management (2013)

Firecracker: Lightweight Virtualization for Serverless Applications (2020)

Aquila: A unified, low-latency fabric for datacenter networks

Lend Me Your Ear: Passive Remote Physical Side Channels on PCs

Nearly all websites may breach GDPR

LTrack: Stealthy Tracking of Mobile Phones in LTE

The Elements of Cache Programming Style (2000)

The Web3 Fraud

Slicer: Auto-Sharding for Datacenter Applications

The Web3 Fraud

Shinjuku: Preemptive Scheduling for μsecond-scale Tail Latency

Virtual Machine Showdown: Stack Versus Registers (2005)

Argus: Debugging Performance Issues with Annotated Causal Tracing

Prodspec and Annealing

Fuzzware: Using Precise MMIO Modeling for Effective Firmware Fuzzing | USENIX

Gazing into the VOID

Automatic Extraction of Secrets from the Transistor Jungle Using Laser-Assisted

How great is the great firewall? Measuring China’s DNS censorship

Segcache: a memory-efficient and scalable in-memory key-value cache for small objects

BMC: Accelerating Memcached using Safe In-kernel Caching and Pre-stack Processing

Injection Attacks Reloaded: Tunnelling Malicious Payloads over DNS

It's Time for Operating Systems to Rediscover Hardware

A Review of “Kill It with Fire: Manage Aging Computer Systems”

It's Time for Operating Systems to Rediscover Hardware – ATC/OSDI 2021 Keynote

James Mickens: This World of Ours

A Linux Kernel Implementation of the Homa Transport Protocol

The Road to Less Trusted Code: Lowering the Barrier to In-Process Sandboxing

Kind Engineering: How to Engineer Kindness

Crash-Only Software (2003)

More →