Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
|
from
login
MakeShift: Security analysis of Shimano Di2 wireless gear shifting (2024)
(
usenix.org
)
35 points
by
motorest
16 days ago
|
past
|
52 comments
Rex: Closing the language-verifier gap with safe and usable kernel extensions
(
usenix.org
)
3 points
by
matt_d
23 days ago
|
past
|
1 comment
Memory safety is table stakes
(
usenix.org
)
90 points
by
comradelion
38 days ago
|
past
|
129 comments
EM Eavesdropping Attack on Digital Microphones Using Pulse Density Modulation
(
usenix.org
)
43 points
by
gnabgib
52 days ago
|
past
|
4 comments
Large scale analysis of 100s of cache clusters at Twitter [pdf]
(
usenix.org
)
1 point
by
emrah
58 days ago
|
past
Silent bugs matter: a study of compiler-introduced security bugs
(
usenix.org
)
1 point
by
fanf2
58 days ago
|
past
|
1 comment
AIOps: Prove It an Open Letter to Vendors Selling AI for SREs
(
usenix.org
)
3 points
by
mooreds
69 days ago
|
past
|
1 comment
Performance and Compatibility in the HongMeng Production Microkernel [pdf]
(
usenix.org
)
4 points
by
rguiscard
76 days ago
|
past
Weaver Codes: Highly Fault Tolerant Erasure Codes for Storage Systems (2005)
(
usenix.org
)
1 point
by
panrobo
80 days ago
|
past
Weaver Codes: Highly Fault Tolerant Erasure Codes for Storage Systems (2005)
(
usenix.org
)
11 points
by
Tomte
81 days ago
|
past
|
1 comment
Usenix ATC Announcement
(
usenix.org
)
113 points
by
eatbitseveryday
87 days ago
|
past
|
12 comments
A Formal Analysis of Apple's iMessage PQ3 Protocol [pdf]
(
usenix.org
)
161 points
by
luu
87 days ago
|
past
|
134 comments
Usenix Announces the Discontinuation of ATC Conference
(
usenix.org
)
8 points
by
septicmk
89 days ago
|
past
Technical debt as theory building and practice
(
usenix.org
)
2 points
by
fanf2
89 days ago
|
past
A discipline of error handling [pdf]
(
usenix.org
)
4 points
by
fanf2
3 months ago
|
past
Cognitive SSD: A Deep Learning Engine for In-Storage Data Retrieval [pdf]
(
usenix.org
)
2 points
by
rbanffy
3 months ago
|
past
The Process File System and Process Model in Unix System V [pdf] (1991)
(
usenix.org
)
4 points
by
naltun
3 months ago
|
past
|
2 comments
Technical Debt as Theory Building and Practice
(
usenix.org
)
1 point
by
todsacerdoti
3 months ago
|
past
Silent Bugs Matter: A Study of Compiler-Introduced Security Bugs
(
usenix.org
)
8 points
by
todsacerdoti
3 months ago
|
past
|
1 comment
Running Disaster Recovery Plan Tabletop Exercises
(
usenix.org
)
2 points
by
jruohonen
3 months ago
|
past
Graham: Synchronizing Clocks by Leveraging Local Clock Properties
(
usenix.org
)
6 points
by
todsacerdoti
3 months ago
|
past
Using PDDL to find privilege escalation paths
(
usenix.org
)
7 points
by
peperunas
3 months ago
|
past
Postfix, past present and future (2010) [pdf]
(
usenix.org
)
1 point
by
jruohonen
4 months ago
|
past
Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0
(
usenix.org
)
1 point
by
b-man
4 months ago
|
past
The File System Belongs in the Kernel [pdf] (1991)
(
usenix.org
)
2 points
by
vacuity
4 months ago
|
past
|
1 comment
The Night Watch (2013) [pdf]
(
usenix.org
)
205 points
by
mifydev
4 months ago
|
past
|
33 comments
Soft Updates: A Technique for Eliminating Most Synchronous Writes in FFS (1999) [pdf]
(
usenix.org
)
1 point
by
Tomte
4 months ago
|
past
Don't Stack your Log on my Log (2014) [pdf]
(
usenix.org
)
1 point
by
10000truths
5 months ago
|
past
High-Performance, Application-Integrated Far Memory (2020) [pdf]
(
usenix.org
)
3 points
by
qianli_cs
5 months ago
|
past
Quantum Computing Notes: Why Is It Always Ten Years Away? – Usenix
(
usenix.org
)
2 points
by
rbanffy
5 months ago
|
past
|
1 comment
More
Consider applying for YC's Fall 2025 batch! Applications are open till Aug 4
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search: