Hacker Newsnew | past | comments | ask | show | jobs | submit | fromlogin
Memory safety is table stakes (usenix.org)
90 points by comradelion 10 days ago | past | 129 comments
EM Eavesdropping Attack on Digital Microphones Using Pulse Density Modulation (usenix.org)
43 points by gnabgib 24 days ago | past | 4 comments
Large scale analysis of 100s of cache clusters at Twitter [pdf] (usenix.org)
1 point by emrah 29 days ago | past
Silent bugs matter: a study of compiler-introduced security bugs (usenix.org)
1 point by fanf2 29 days ago | past | 1 comment
AIOps: Prove It an Open Letter to Vendors Selling AI for SREs (usenix.org)
3 points by mooreds 41 days ago | past | 1 comment
Performance and Compatibility in the HongMeng Production Microkernel [pdf] (usenix.org)
4 points by rguiscard 47 days ago | past
Weaver Codes: Highly Fault Tolerant Erasure Codes for Storage Systems (2005) (usenix.org)
1 point by panrobo 52 days ago | past
Weaver Codes: Highly Fault Tolerant Erasure Codes for Storage Systems (2005) (usenix.org)
11 points by Tomte 52 days ago | past | 1 comment
Usenix ATC Announcement (usenix.org)
113 points by eatbitseveryday 58 days ago | past | 12 comments
A Formal Analysis of Apple's iMessage PQ3 Protocol [pdf] (usenix.org)
161 points by luu 58 days ago | past | 134 comments
Usenix Announces the Discontinuation of ATC Conference (usenix.org)
8 points by septicmk 60 days ago | past
Technical debt as theory building and practice (usenix.org)
2 points by fanf2 61 days ago | past
A discipline of error handling [pdf] (usenix.org)
4 points by fanf2 64 days ago | past
Cognitive SSD: A Deep Learning Engine for In-Storage Data Retrieval [pdf] (usenix.org)
2 points by rbanffy 66 days ago | past
The Process File System and Process Model in Unix System V [pdf] (1991) (usenix.org)
4 points by naltun 69 days ago | past | 2 comments
Technical Debt as Theory Building and Practice (usenix.org)
1 point by todsacerdoti 70 days ago | past
Silent Bugs Matter: A Study of Compiler-Introduced Security Bugs (usenix.org)
8 points by todsacerdoti 70 days ago | past | 1 comment
Running Disaster Recovery Plan Tabletop Exercises (usenix.org)
2 points by jruohonen 70 days ago | past
Graham: Synchronizing Clocks by Leveraging Local Clock Properties (usenix.org)
6 points by todsacerdoti 80 days ago | past
Using PDDL to find privilege escalation paths (usenix.org)
7 points by peperunas 81 days ago | past
Postfix, past present and future (2010) [pdf] (usenix.org)
1 point by jruohonen 3 months ago | past
Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0 (usenix.org)
1 point by b-man 3 months ago | past
The File System Belongs in the Kernel [pdf] (1991) (usenix.org)
2 points by vacuity 3 months ago | past | 1 comment
The Night Watch (2013) [pdf] (usenix.org)
205 points by mifydev 3 months ago | past | 33 comments
Soft Updates: A Technique for Eliminating Most Synchronous Writes in FFS (1999) [pdf] (usenix.org)
1 point by Tomte 3 months ago | past
Don't Stack your Log on my Log (2014) [pdf] (usenix.org)
1 point by 10000truths 4 months ago | past
High-Performance, Application-Integrated Far Memory (2020) [pdf] (usenix.org)
3 points by qianli_cs 4 months ago | past
Quantum Computing Notes: Why Is It Always Ten Years Away? – Usenix (usenix.org)
2 points by rbanffy 4 months ago | past | 1 comment
Measuring China's DNS Censorship (usenix.org)
2 points by nkko 4 months ago | past
Quantum Computing Notes: Why Is It Always Ten Years Away? – Usenix (usenix.org)
2 points by rbanffy 4 months ago | past

Consider applying for YC's Fall 2025 batch! Applications are open till Aug 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: