Hacker Newsnew | past | comments | ask | show | jobs | submit | fromlogin
Kill It With Fire: dealing with legacy systems. (book review) (usenix.org)
4 points by fanf2 5 days ago | past | 1 comment
STPA for Software Systems–Illuminate the Unknown Unknowns (usenix.org)
1 point by motxilo 10 days ago | past | discuss
XFT (cross fault tolerance) and XPaxos: practical fault tolerance beyond crashes [pdf] (usenix.org)
3 points by fanf2 15 days ago | past | 1 comment
Kill It With Fire: dealing with legacy systems. (book review) (usenix.org)
3 points by fanf2 22 days ago | past | 1 comment
More Is Less: Extra Features in Contactless Payments Break Security [pdf] (usenix.org)
1 point by PaulHoule 27 days ago | past
OpenLoRa: Validating LoRa Implementations Through an Open-Sourced Framework (usenix.org)
1 point by teleforce 36 days ago | past
This World of Ours (2014) [pdf] (usenix.org)
246 points by xeonmc 45 days ago | past | 191 comments
Do Users Verify SSH Keys? (2011) [pdf] (usenix.org)
49 points by 8organicbits 49 days ago | past | 68 comments
Stealth BGP Hijacks with URPF Filtering [pdf] (usenix.org)
4 points by krizhanovsky 51 days ago | past | 1 comment
FastCDC: Efficient content-defined chunking for data deduplication (usenix.org)
1 point by fanf2 64 days ago | past
The File System Belongs in the Kernel (1991) [pdf] (usenix.org)
2 points by mpweiher 67 days ago | past
Scaling IP Lookup to Large Databases Using the Cram Lens (usenix.org)
3 points by blakepelton 70 days ago | past | 1 comment
Privacy and Security Risks in the eSIM Ecosystem [pdf] (usenix.org)
282 points by walterbell 80 days ago | past | 154 comments
Design Tradeoffs at the Edge (usenix.org)
2 points by miggy 84 days ago | past
Disentangling the Dual Role of NIC Receive Rings (usenix.org)
1 point by blakepelton 84 days ago | past | 1 comment
IRHash: Efficient Multi-Language Compiler Caching by IR-Level Hashing (usenix.org)
32 points by matt_d 3 months ago | past | 11 comments
"I'm regretting that I hit run": In-situ Assessment of Potential Malware [pdf] (usenix.org)
1 point by PaulHoule 3 months ago | past
My ZIP isn't your ZIP: Identifying and exploiting semantic gaps between parsers (usenix.org)
67 points by layer8 3 months ago | past | 33 comments
Privacy and Security Risks in the ESIM Ecosystem (usenix.org)
2 points by s3graham 3 months ago | past
Graham: Synchronizing Clocks by Leveraging Local Clock Properties (2022) [pdf] (usenix.org)
59 points by mlerner 4 months ago | past | 13 comments
Principles and Methodologies for Serial Performance Optimization (usenix.org)
1 point by limoce 4 months ago | past
Synchronizing Clocks by Leveraging Local Clock Properties (2022) (usenix.org)
2 points by fanf2 4 months ago | past
MakeShift: Security analysis of Shimano Di2 wireless gear shifting (2024) (usenix.org)
35 points by motorest 4 months ago | past | 52 comments
Rex: Closing the language-verifier gap with safe and usable kernel extensions (usenix.org)
3 points by matt_d 5 months ago | past | 1 comment
Memory safety is table stakes (usenix.org)
90 points by comradelion 5 months ago | past | 129 comments
EM Eavesdropping Attack on Digital Microphones Using Pulse Density Modulation (usenix.org)
43 points by gnabgib 6 months ago | past | 4 comments
Large scale analysis of 100s of cache clusters at Twitter [pdf] (usenix.org)
1 point by emrah 6 months ago | past
Silent bugs matter: a study of compiler-introduced security bugs (usenix.org)
1 point by fanf2 6 months ago | past | 1 comment
AIOps: Prove It an Open Letter to Vendors Selling AI for SREs (usenix.org)
3 points by mooreds 6 months ago | past | 1 comment
Performance and Compatibility in the HongMeng Production Microkernel [pdf] (usenix.org)
4 points by rguiscard 6 months ago | past

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: