Open to a fault: On the passive compromise of TLS keys via transient errors

Paper: Augmenting Decompiler Output with Learned Variable Names and Types

Can Applications Recover from Fsync Failures?

Dos and Don'ts of Machine Learning in Computer Security

Best Papers – Usenix Security 2022

Co-opting Linux Processes for High-Performance Network Simulation

Amazon DynamoDB: A Scalable, Predictably Performant, and Fully Managed NoSQL Database Service (2022)

Jurassic Cloud

Investigating Managed Language Runtime Performance

GhostTouch: Targeted Attacks on Touchscreens Without Physical Touch

Counting in Regexes Considered Harmful: Exposing ReDoS Vulnerability of Nonbacktracking Matchers

Illuminating the Security Issues Surrounding Lights-Out Server Management (2013)

Firecracker: Lightweight Virtualization for Serverless Applications (2020)

Aquila: A unified, low-latency fabric for datacenter networks

Lend Me Your Ear: Passive Remote Physical Side Channels on PCs

Nearly all websites may breach GDPR

LTrack: Stealthy Tracking of Mobile Phones in LTE

The Elements of Cache Programming Style (2000)

The Web3 Fraud

Slicer: Auto-Sharding for Datacenter Applications

The Web3 Fraud

Shinjuku: Preemptive Scheduling for μsecond-scale Tail Latency

Virtual Machine Showdown: Stack Versus Registers (2005)

Argus: Debugging Performance Issues with Annotated Causal Tracing

Prodspec and Annealing

Fuzzware: Using Precise MMIO Modeling for Effective Firmware Fuzzing | USENIX

Gazing into the VOID

Automatic Extraction of Secrets from the Transistor Jungle Using Laser-Assisted

How great is the great firewall? Measuring China’s DNS censorship

Segcache: a memory-efficient and scalable in-memory key-value cache for small objects

More →