H
F
Articles from www.usenix.org
Articles from www.usenix.org
Channels
Economy
World
Technology
Programming
New/Niche Languages
JavaScript Stack
Chinese
Articles from
www.usenix.org
Open Versus Closed: A Cautionary Tale (2006)
(
www.usenix.org
)
2024-9-25
MakeShift: Security Analysis of Shimano Di2 Wireless Gear Shifting in Bicycles
(
www.usenix.org
)
2024-8-16
InfoSec
A Uniform Name Service for Spring's UNIX Environment (1994)
(
www.usenix.org
)
2024-7-25
Unix
Spring
An Empirical Study of Rust-for-Linux: The Success, Dissatisfaction, and Compromise
(
www.usenix.org
)
2024-7-11
Rust
Linux
MRTG The Multi Router Traffic Grapher (1998)
(
www.usenix.org
)
2024-6-20
Bcrypt at 25: A Retrospective on Password Security
(
www.usenix.org
)
2024-6-4
InfoSec
Password
Itanium — A System Implementor's Tale (2005)
(
www.usenix.org
)
2024-5-5
Security and Privacy Failures in Popular 2FA Apps -- "We identified all general purpose Android TOTP apps in the Google Play Store with at least 100k installs that implemented a backup mechanism (n = 22)."
(
www.usenix.org
)
2024-1-28
Android
Google
InfoSec
Framing Frames: Bypassing Wi-Fi Encryption by Manipulating Transmit Queues
(
www.usenix.org
)
2024-1-25
What Is Linux Kernel Keystore and Why You Should Use It in Your Next Application
(
www.usenix.org
)
2023-12-22
Linux
ARC: A SELF-TUNING, LOW OVERHEAD REPLACEMENT CACHE
(
www.usenix.org
)
2023-12-4
Cache
FreeBSD on Firecracker
(
www.usenix.org
)
2023-8-24
FreeBSD
ServiceRouter: Hyperscale and Minimal Cost Service Mesh at Meta
(
www.usenix.org
)
2023-8-3
Every Signature is Broken: On the Insecurity of Microsoft Office's OOXML Signatures
(
www.usenix.org
)
2023-6-13
Microsoft
Logs Told Us It Was DNS, It Looked like DNS, It Had to Be DNS, It Wasn't DNS
(
www.usenix.org
)
2023-5-17
DNS
One Exploit to Rule them All? On the Security of Drop-in Replacement & Counterfeit Microcontrollers
(
www.usenix.org
)
2023-3-18
InfoSec
zxcvbn: Low-Budget Password Strength Estimation
(
www.usenix.org
)
2023-2-18
Password
Budget
Quantifying Memory Unsafety and Reactions to It
(
www.usenix.org
)
2023-2-16
Efficient Data Structures for Tamper-Evident Logging (2009)
(
www.usenix.org
)
2023-2-13
Logging
James Mickens Keynote, USENIX Security 2018
(
www.usenix.org
)
2022-12-3
InfoSec
ACID: A Debugger Built from a Language
(
www.usenix.org
)
2022-11-30
Feather: Teaching Tcl Objects to Fly (2000)
(
www.usenix.org
)
2022-10-14
HTTPT: A Probe-Resistant Proxy | USENIX
(
www.usenix.org
)
2022-9-27
Transcending Posix: The End of an Era?
(
www.usenix.org
)
2022-9-10
Augmenting Decompiler Output with Learned Variable Names and Types
(
www.usenix.org
)
2022-8-16
Best Papers – Usenix Security 2022
(
www.usenix.org
)
2022-8-16
InfoSec
Can Applications Recover from Fsync Failures?
(
www.usenix.org
)
2022-8-13
Dos and Don'ts of Machine Learning in Computer Security [pdf]
(
www.usenix.org
)
2022-8-12
InfoSec
Open to a fault: On the passive compromise of TLS keys via transient errors [pdf]
(
www.usenix.org
)
2022-8-12
Investigating Managed Language Runtime Performance
(
www.usenix.org
)
2022-7-22
Previous Page
Next Page