Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
|
from
login
Kill It With Fire: dealing with legacy systems. (book review)
(
usenix.org
)
4 points
by
fanf2
5 days ago
|
past
|
1 comment
STPA for Software Systems–Illuminate the Unknown Unknowns
(
usenix.org
)
1 point
by
motxilo
10 days ago
|
past
|
discuss
XFT (cross fault tolerance) and XPaxos: practical fault tolerance beyond crashes [pdf]
(
usenix.org
)
3 points
by
fanf2
15 days ago
|
past
|
1 comment
Kill It With Fire: dealing with legacy systems. (book review)
(
usenix.org
)
3 points
by
fanf2
22 days ago
|
past
|
1 comment
More Is Less: Extra Features in Contactless Payments Break Security [pdf]
(
usenix.org
)
1 point
by
PaulHoule
27 days ago
|
past
OpenLoRa: Validating LoRa Implementations Through an Open-Sourced Framework
(
usenix.org
)
1 point
by
teleforce
36 days ago
|
past
This World of Ours (2014) [pdf]
(
usenix.org
)
246 points
by
xeonmc
45 days ago
|
past
|
191 comments
Do Users Verify SSH Keys? (2011) [pdf]
(
usenix.org
)
49 points
by
8organicbits
49 days ago
|
past
|
68 comments
Stealth BGP Hijacks with URPF Filtering [pdf]
(
usenix.org
)
4 points
by
krizhanovsky
51 days ago
|
past
|
1 comment
FastCDC: Efficient content-defined chunking for data deduplication
(
usenix.org
)
1 point
by
fanf2
64 days ago
|
past
The File System Belongs in the Kernel (1991) [pdf]
(
usenix.org
)
2 points
by
mpweiher
67 days ago
|
past
Scaling IP Lookup to Large Databases Using the Cram Lens
(
usenix.org
)
3 points
by
blakepelton
70 days ago
|
past
|
1 comment
Privacy and Security Risks in the eSIM Ecosystem [pdf]
(
usenix.org
)
282 points
by
walterbell
80 days ago
|
past
|
154 comments
Design Tradeoffs at the Edge
(
usenix.org
)
2 points
by
miggy
84 days ago
|
past
Disentangling the Dual Role of NIC Receive Rings
(
usenix.org
)
1 point
by
blakepelton
84 days ago
|
past
|
1 comment
IRHash: Efficient Multi-Language Compiler Caching by IR-Level Hashing
(
usenix.org
)
32 points
by
matt_d
3 months ago
|
past
|
11 comments
"I'm regretting that I hit run": In-situ Assessment of Potential Malware [pdf]
(
usenix.org
)
1 point
by
PaulHoule
3 months ago
|
past
My ZIP isn't your ZIP: Identifying and exploiting semantic gaps between parsers
(
usenix.org
)
67 points
by
layer8
3 months ago
|
past
|
33 comments
Privacy and Security Risks in the ESIM Ecosystem
(
usenix.org
)
2 points
by
s3graham
3 months ago
|
past
Graham: Synchronizing Clocks by Leveraging Local Clock Properties (2022) [pdf]
(
usenix.org
)
59 points
by
mlerner
4 months ago
|
past
|
13 comments
Principles and Methodologies for Serial Performance Optimization
(
usenix.org
)
1 point
by
limoce
4 months ago
|
past
Synchronizing Clocks by Leveraging Local Clock Properties (2022)
(
usenix.org
)
2 points
by
fanf2
4 months ago
|
past
MakeShift: Security analysis of Shimano Di2 wireless gear shifting (2024)
(
usenix.org
)
35 points
by
motorest
4 months ago
|
past
|
52 comments
Rex: Closing the language-verifier gap with safe and usable kernel extensions
(
usenix.org
)
3 points
by
matt_d
5 months ago
|
past
|
1 comment
Memory safety is table stakes
(
usenix.org
)
90 points
by
comradelion
5 months ago
|
past
|
129 comments
EM Eavesdropping Attack on Digital Microphones Using Pulse Density Modulation
(
usenix.org
)
43 points
by
gnabgib
6 months ago
|
past
|
4 comments
Large scale analysis of 100s of cache clusters at Twitter [pdf]
(
usenix.org
)
1 point
by
emrah
6 months ago
|
past
Silent bugs matter: a study of compiler-introduced security bugs
(
usenix.org
)
1 point
by
fanf2
6 months ago
|
past
|
1 comment
AIOps: Prove It an Open Letter to Vendors Selling AI for SREs
(
usenix.org
)
3 points
by
mooreds
6 months ago
|
past
|
1 comment
Performance and Compatibility in the HongMeng Production Microkernel [pdf]
(
usenix.org
)
4 points
by
rguiscard
6 months ago
|
past
More
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search: