Quantifying Memory Unsafety and Reactions to It

Little Languages for Music (CLI as DAW, 1990) [pdf]

The Night Watch

James Mickens Keynote, USENIX Security 2018

ACID: A Debugger Built from a Language

Twilight: A Differentially Private Payment Channel Network

Exploring the Unchartered Space of Container Registry Typosquatting

Aquila: Google's New Datacenter Fabric

Feather: Teaching Tcl Objects to Fly (2000)

Transcending Posix: The End of an Era?

Httpt: A Probe-Resistant Proxy – Usenix

Open to a fault: On the passive compromise of TLS keys via transient errors

Paper: Augmenting Decompiler Output with Learned Variable Names and Types

Can Applications Recover from Fsync Failures?

Dos and Don'ts of Machine Learning in Computer Security

Best Papers – Usenix Security 2022

Co-opting Linux Processes for High-Performance Network Simulation

Amazon DynamoDB: A Scalable, Predictably Performant, and Fully Managed NoSQL Database Service (2022)

Jurassic Cloud

Investigating Managed Language Runtime Performance

GhostTouch: Targeted Attacks on Touchscreens Without Physical Touch

Counting in Regexes Considered Harmful: Exposing ReDoS Vulnerability of Nonbacktracking Matchers

Illuminating the Security Issues Surrounding Lights-Out Server Management (2013)

Firecracker: Lightweight Virtualization for Serverless Applications (2020)

Aquila: A unified, low-latency fabric for datacenter networks

Lend Me Your Ear: Passive Remote Physical Side Channels on PCs

Nearly all websites may breach GDPR

LTrack: Stealthy Tracking of Mobile Phones in LTE

The Elements of Cache Programming Style (2000)

The Web3 Fraud

More →