Loading...

Tag trends are in beta. Feedback? Thoughts? Email me at [email protected]

It's time for operating systems to rediscover hardware

Open Versus Closed: A Cautionary Tale (2006)

MakeShift: Security Analysis of Shimano Di2 Wireless Gear Shifting in Bicycles

Debugging operating systems with time-traveling virtual machines (2005) [pdf]

An Empirical Study of Rust-for-Linux: The Success, Dissatisfaction, and Compromise

A Uniform Name Service for Spring's UNIX Environment (1994)

Inference of Error Specifications and Bug Detection Using Structural Similarity [pdf]

Understanding Software Dynamics [book review]

Sieve: Cache eviction can be simple, effective, and scalable

MRTG The Multi Router Traffic Grapher (1998)

Bcrypt at 25: A Retrospective on Password Security

Itanium — A System Implementor’s Tale (2005)

Security and Privacy Failures in Popular 2FA Apps -- "We identified all general purpose Android TOTP apps in the Google Play Store with at least 100k installs that implemented a backup mechanism (n = 22)."

Framing Frames: Bypassing wi-fi encryption by manipulating transmit queues

Replication Prohibited: Attacking Restricted Keyways with 3D Printing [pdf]

ARC: A Self-Tuning, Low Overhead Replacement Cache

What Is Linux Kernel Keystore and Why You Should Use It in Your Next Application

The Most Dangerous Codec in the World [pdf]

Simple Testing Can Prevent Most Critical Failures: An Analysis of Production Failures (2014)

MELF: Multivariant Executables for a Heterogeneous World

How to Abuse and Fix Authenticated Encryption Without Key Commitment

FreeBSD on Firecracker

ServiceRouter: Hyperscale and Minimal Cost Service Mesh at Meta [pdf]

Meta’s Microservice Architecture [pdf]

Windows: A software engineering odyssey (2000)

MELF: Multivariant Executables for a Heterogeneous World

Invisinets: Removing Networking from Cloud Networks [pdf]

Every Signature Is Broken: Insecurity of Microsoft Office’s Ooxml Signatures

Every Signature is Broken: On the Insecurity of Microsoft Office’s OOXML Signatures

Off-Path Network Traffic Manipulation via Revitalized ICMP Redirect (2022) [pdf]

More →