Hacker Newsnew | past | comments | ask | show | jobs | submit | fromlogin
MakeShift: Security analysis of Shimano Di2 wireless gear shifting (2024) (usenix.org)
35 points by motorest 16 days ago | past | 52 comments
Rex: Closing the language-verifier gap with safe and usable kernel extensions (usenix.org)
3 points by matt_d 23 days ago | past | 1 comment
Memory safety is table stakes (usenix.org)
90 points by comradelion 38 days ago | past | 129 comments
EM Eavesdropping Attack on Digital Microphones Using Pulse Density Modulation (usenix.org)
43 points by gnabgib 52 days ago | past | 4 comments
Large scale analysis of 100s of cache clusters at Twitter [pdf] (usenix.org)
1 point by emrah 58 days ago | past
Silent bugs matter: a study of compiler-introduced security bugs (usenix.org)
1 point by fanf2 58 days ago | past | 1 comment
AIOps: Prove It an Open Letter to Vendors Selling AI for SREs (usenix.org)
3 points by mooreds 69 days ago | past | 1 comment
Performance and Compatibility in the HongMeng Production Microkernel [pdf] (usenix.org)
4 points by rguiscard 76 days ago | past
Weaver Codes: Highly Fault Tolerant Erasure Codes for Storage Systems (2005) (usenix.org)
1 point by panrobo 80 days ago | past
Weaver Codes: Highly Fault Tolerant Erasure Codes for Storage Systems (2005) (usenix.org)
11 points by Tomte 81 days ago | past | 1 comment
Usenix ATC Announcement (usenix.org)
113 points by eatbitseveryday 87 days ago | past | 12 comments
A Formal Analysis of Apple's iMessage PQ3 Protocol [pdf] (usenix.org)
161 points by luu 87 days ago | past | 134 comments
Usenix Announces the Discontinuation of ATC Conference (usenix.org)
8 points by septicmk 89 days ago | past
Technical debt as theory building and practice (usenix.org)
2 points by fanf2 89 days ago | past
A discipline of error handling [pdf] (usenix.org)
4 points by fanf2 3 months ago | past
Cognitive SSD: A Deep Learning Engine for In-Storage Data Retrieval [pdf] (usenix.org)
2 points by rbanffy 3 months ago | past
The Process File System and Process Model in Unix System V [pdf] (1991) (usenix.org)
4 points by naltun 3 months ago | past | 2 comments
Technical Debt as Theory Building and Practice (usenix.org)
1 point by todsacerdoti 3 months ago | past
Silent Bugs Matter: A Study of Compiler-Introduced Security Bugs (usenix.org)
8 points by todsacerdoti 3 months ago | past | 1 comment
Running Disaster Recovery Plan Tabletop Exercises (usenix.org)
2 points by jruohonen 3 months ago | past
Graham: Synchronizing Clocks by Leveraging Local Clock Properties (usenix.org)
6 points by todsacerdoti 3 months ago | past
Using PDDL to find privilege escalation paths (usenix.org)
7 points by peperunas 3 months ago | past
Postfix, past present and future (2010) [pdf] (usenix.org)
1 point by jruohonen 4 months ago | past
Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0 (usenix.org)
1 point by b-man 4 months ago | past
The File System Belongs in the Kernel [pdf] (1991) (usenix.org)
2 points by vacuity 4 months ago | past | 1 comment
The Night Watch (2013) [pdf] (usenix.org)
205 points by mifydev 4 months ago | past | 33 comments
Soft Updates: A Technique for Eliminating Most Synchronous Writes in FFS (1999) [pdf] (usenix.org)
1 point by Tomte 4 months ago | past
Don't Stack your Log on my Log (2014) [pdf] (usenix.org)
1 point by 10000truths 5 months ago | past
High-Performance, Application-Integrated Far Memory (2020) [pdf] (usenix.org)
3 points by qianli_cs 5 months ago | past
Quantum Computing Notes: Why Is It Always Ten Years Away? – Usenix (usenix.org)
2 points by rbanffy 5 months ago | past | 1 comment

Consider applying for YC's Fall 2025 batch! Applications are open till Aug 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: