Hacker News new | comments | show | ask | jobs | submit | from login
The Slow Winter (2013) [pdf] (usenix.org)
1 point by Shank 2 days ago | past | web | discuss
Why Do Keynote Speakers Keep Suggesting That Improving Security Is Possible? (usenix.org)
861 points by zdw 2 days ago | past | web | 169 comments
SoK: Make JIT-Spray Great Again [pdf] (usenix.org)
4 points by DyslexicAtheist 4 days ago | past | web | discuss
Fabricating Implicit Control Over Actuation Systems by Spoofing Inertial Sensors [pdf] (usenix.org)
1 point by godelmachine 4 days ago | past | web | discuss
A Feasibility Study of Radio-Frequency Retroreflector Attack [pdf] (usenix.org)
2 points by godelmachine 4 days ago | past | web | discuss
Fear the Reaper: Characterization and Fast Detection of Card Skimmers (usenix.org)
2 points by notacoward 4 days ago | past | web | discuss
Why Do Keynote Speakers Keep Suggesting That Improving Security Is Possible? (usenix.org)
2 points by mpweiher 5 days ago | past | web | discuss
Honey Sheets: What Happens to Leaked Google Spreadsheets? [pdf] (usenix.org)
1 point by maastaar 5 days ago | past | web | discuss
“I've Got Nothing to Lose”:Risk Perceptions,Protective Actions Post Equifax Hack (usenix.org)
1 point by petethomas 7 days ago | past | web | discuss
Psychological Safety in Operation Teams [pdf] (usenix.org)
2 points by mmt 8 days ago | past | web | discuss
Usenix HotEdge 2018 Workshop Program (usenix.org)
1 point by godelmachine 9 days ago | past | web | discuss
Application Memory Isolation on Ultra-Low-Power MCUs [pdf] (usenix.org)
2 points by godelmachine 15 days ago | past | web
Show HN: HashKV-4.6× throughput than key-value separation design [pdf] (usenix.org)
10 points by ngaut 15 days ago | past | web
BIBIM: A Prototype Multi-Partition Aware Heterogeneous New Memory [pdf] (usenix.org)
2 points by godelmachine 21 days ago | past | web
[dupe] #ifdef considered harmful: portability experience with C News [pdf] (usenix.org)
3 points by fanf2 22 days ago | past | web
#ifdef considered harmful (1992) [pdf] (usenix.org)
39 points by Annatar 24 days ago | past | web | 46 comments
Chainiac: Software-Update Transparency via Skipchains and Verified Builds [pdf] (usenix.org)
17 points by rmorey 28 days ago | past | web
Varys: Protecting SGX Enclaves from Practical Side-Channel Attacks (usenix.org)
1 point by alexo_o 31 days ago | past | web
The Full Path to Full-Path Indexing (usenix.org)
1 point by mpweiher 32 days ago | past | web
The Full Path to Full-Path Indexing (usenix.org)
2 points by mpweiher 37 days ago | past | web
Spiffy: Enabling File-System Aware Storage Applications (usenix.org)
84 points by mpweiher 37 days ago | past | web | 5 comments
Battle of the Schedulers: FreeBSD ULE vs. Linux CFS [pdf] (usenix.org)
2 points by vermaden 38 days ago | past | web
The Design and Implementation of Hyperupcalls [pdf] (usenix.org)
41 points by ingve 39 days ago | past | web | 1 comment
The Battle of the Schedulers: FreeBSD ULE vs. Linux CFS [pdf] (usenix.org)
90 points by kev009 40 days ago | past | web | 14 comments
Consensus in a Box: Inexpensive Coordination in Hardware [pdf] (usenix.org)
5 points by godelmachine 42 days ago | past | web
Stateless Network Functions (2017) [pdf] (usenix.org)
44 points by mooreds 45 days ago | past | web | 5 comments
Huygens: Scalable, Fine-grained Clock Synchronization [pdf] (usenix.org)
70 points by otterley 51 days ago | past | web | 9 comments
StreamBox: Modern Stream Processing on a Multicore Machine (2017) [pdf] (usenix.org)
3 points by scottlf 88 days ago | past | web
Hardware Enforcement of Application Security Policies Using Tagged Memory (usenix.org)
2 points by godelmachine 3 months ago | past | web
A Study of Linux File System Evolution (2013) [pdf] (usenix.org)
58 points by kuwze 3 months ago | past | web | 3 comments
More

Guidelines | FAQ | Support | API | Security | Lists | Bookmarklet | Legal | Apply to YC | Contact

Search: