ARC: A Self-Tuning, Low Overhead Replacement Cache

What Is Linux Kernel Keystore and Why You Should Use It in Your Next Application

The Most Dangerous Codec in the World [pdf]

Simple Testing Can Prevent Most Critical Failures: An Analysis of Production Failures (2014)

MELF: Multivariant Executables for a Heterogeneous World

How to Abuse and Fix Authenticated Encryption Without Key Commitment

FreeBSD on Firecracker

ServiceRouter: Hyperscale and Minimal Cost Service Mesh at Meta [pdf]

Meta’s Microservice Architecture [pdf]

Windows: A software engineering odyssey (2000)

MELF: Multivariant Executables for a Heterogeneous World

Invisinets: Removing Networking from Cloud Networks [pdf]

Every Signature Is Broken: Insecurity of Microsoft Office’s Ooxml Signatures

Every Signature is Broken: On the Insecurity of Microsoft Office’s OOXML Signatures

Off-Path Network Traffic Manipulation via Revitalized ICMP Redirect (2022) [pdf]

Codon: Python Compiler

Bcrypt at 25

Logs Told Us It Was DNS, It Looked like DNS, It Had to Be DNS, It Wasn't DNS

Little Languages for Music (1990) [pdf]

IASO: A Fail-Slow Detection and Mitigation Framework for Storage Services

From Laptop to Lambda: Outsourcing Jobs to Thousands of Functional Containers [pdf]

One Exploit to Rule them All? On the Security of Drop-in Replacement & Counterfeit Microcontrollers

zxcvbn: Low-Budget Password Strength Estimation

Efficient Data Structures for Tamper-Evident Logging (2009)

Quantifying Memory Unsafety and Reactions to It

Little Languages for Music (CLI as DAW, 1990) [pdf]

The Night Watch

James Mickens Keynote, USENIX Security 2018

ACID: A Debugger Built from a Language

Twilight: A Differentially Private Payment Channel Network

More →