


default search action
login - The Usenix Magazine, Volume 42
Volume 42, Number 1, Spring 2017
- Rik Farrow:

Musings.
- Remzi H. Arpaci-Dusseau:

Operating Systems: Three Easy Pieces. - George V. Neville-Neil, Robert N. M. Watson:

Teaching Operating Systems with FreeBSD through Tracing, Analysis, and Experimentation. - Kees Cook:

Linux Kernel Self-Protection. - Rik Farrow:

Interview with Jeff Mogul. - Rik Farrow:

Interview with Amit Levy.
- Jeff Inman, Will Vining, Garrett Ransom, Gary Grider:

MarFS, a Near-POSIX Interface to Cloud Objects.
- Sergey Bratus, Lars Hermerschmidt, Sven M. Hallberg, Michael E. Locasto, Falcon Momot, Meredith L. Patterson, Anna Shubina:

Curing the Vulnerable Parser: Design Patterns for Secure Input Handling.
- John Lunney, Sue Lueder, Betsy Beyer:

Postmortem Action Items: Plan the Work and Work the Plan. - David Lion, Adrian Chu, Hailong Sun, Xin Zhuang, Nikola Grcevski, Ding Yuan:

Don't Get Caught in the Cold, Warm Up Your JVM.
- David M. Beazley:

Gleeful Incompatibility. - David N. Blank-Edelman:

Practical Perl Tools: Off the Charts. - Dan Geer, Eric Jardine:

Cybersecurity Workload Trends. - Robert G. Ferrell:

/dev/random.
- Mark Lamourine, Rik Farrow:

Book Reviews.
Volume 42, Number 2, Summer 2017
- Rik Farrow:

Musings.
- Alex Conway, Ainesh Bakshi, Yizheng Jiao, Yang Zhan, Michael A. Bender, William Jannen, Rob Johnson, Bradley C. Kuszmaul, Donald E. Porter, Jun Yuan, Martin Farach-Colton:

How to Fragment Your File System. - Abutalib Aghayev, Theodore Y. Ts'o, Garth Gibson, Peter Desnoyers:

Evolving Ext4 for Shingled Disks. - Aishwarya Ganesan, Ramnatthan Alagappan, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau:

Redundancy Does Not Imply Fault Tolerance: Analysis of Distributed Storage Reactions to Single Errors and Corruptions. - Konstantin V. Shvachko, Yuxiang (Chris) Chen:

Scaling Namespace Operations with Giraffa File System. - Rik Farrow:

2017 USENIX Research in Linux File and Storage Technologies Summit(Linux FAST Summit '17).
- Andy Rudoff:

Persistent Memory Programming. - Graeme Jenkinson:

It's Better to Rust Than Wear Out. - Rik Farrow:

Interview with Eric Allman.
- Jeff Peck, Betsy Beyer, Colin Beske, Max Saltonstall:

Migrating to BeyondCorp: Maintaining Productivity While Improving Security. - Tyler Hunt, Zhiting Zhu, Yuanzhong Xu, Simon Peter, Emmett Witchel

:
Ryoan: A Distributed Sandbox for Untrusted Computation on Secret Data. - Trishank Karthik Kuppusamy, Lois DeLong, Justin Cappos:

Securing Software Updates for Automotives Using Uptane. - Radia J. Perlman:

Blockchain: Hype or Hope? - Jos Wetzels:

Internet of Pwnable Things: Challenges in Embedded Binary Security.
- David M. Beazley:

Revisiting Pathlib. - David N. Blank-Edelman:

Practical Perl Tools: Perl on a Plane. - Dave Josephsen:

iVoyeur: 2 Bits. - Jeanne Schock:

Turning Problems into the Known. - Dan Geer, Jon Callas:

For Good Measure: To Burn or Not to Burn. - Robert G. Ferrell:

/dev/random.
Volume 42, Number 3, Fall 2017
- Rik Farrow:

Musings: Theory of Mind.
- Daniel Firestone:

VFP: A Virtual Switch Platform for Host SDN in the Public Cloud. - Reid Priedhorsky, Tim Randles:

Linux Containers for Fun and Profit in HPC. - Rik Farrow:

Interview with James Bottomley. - Xianzheng Dou, Peter M. Chen, Jason Flinn:

Knockoff: Cheap Versions in the Cloud.
- Arjun Roy, Hongyi Zeng, Jasmeet Bagga, Alex C. Snoeren:

Passive Realtime Datacenter Fault Detection and Localization. - Lucian Carata, Oliver R. A. Chick, Ripduman Sohan:

Resourceful: Monitoring under the Microscope.
- Victor Escobedo, Betsy Beyer, Max Saltonstall, Filip Zyzniewski:

BeyondCorp 5: The User Experience. - Geoffroy Couprie, Pierre Chifflier:

Safe Parsers in Rust: Changing the World Step by Step.
- David M. Beazley:

Quick Testing. - David N. Blank-Edelman:

Practical Perl Tools: Come Fly With Me. - Dave Josephsen:

iVoyeur: Stacks and Piles. - Chris McEniry:

Golang: Creating and Using Certificates with TLS. - Margo I. Seltzer:

Flipping Out in Computer Science. - Dan Geer:

For Good Measure: When Opinion Is Data. - Robert G. Ferrell:

/dev/random: Offensive Computing.
- Mark Lamourine:

Book Reviews.
Volume 42, Number 4, Winter 2017
- Rik Farrow:

Musings.
- Paul Pearce, Ben Jones, Frank Li, Roya Ensafi, Nick Feamster, Nicholas Weaver, Vern Paxson:

Global-Scale Measurement of DNS Manipulation. - Taejoong Chung, Roland van Rijswijk-Deij, Balakrishnan Chandrasekaran, David R. Choffnes, Dave Levin, Bruce M. Maggs, Alan Mislove, Christo Wilson:

An End-to-End View of DNSSEC Ecosystem Management. - Wilfried Mayer, Katharina Krombholz, Martin Schmiedecker, Edgar R. Weippl:

Securing the Internet, One HTTP 200 OK at a Time. - William Melicher, Blase Ur, Sean M. Segreti, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor:

Better Passwords through Science (and Neural Networks). - Shehar Bano, Mustafa Al-Bassam, George Danezis:

The Road to Scalable Blockchain Designs. - Rik Farrow:

An Interview with Peter G. Neumann.
- Juncheng Gu, Youngmoon Lee, Yiwen Zhang, Mosharaf Chowdhury, Kang G. Shin:

Decentralized Memory Disaggregation Over Low-Latency Networks.
- John P. Looney:

Psychological Safety in Operation Teams. - Vladimir Legeza:

From Sysadmin to SRE in 2587 Words. - Kurt J. Lidl:

Understanding Docker.
- David M. Beazley:

raise SystemExit(0). - David N. Blank-Edelman:

Practical Perl Tools: Perl without Perl. - Chris McEniry:

Go: HashiCorp's Vault. - Dave Josephsen:

iVoyeur: Tcpdump at Scale. - Dan Geer:

For Good Measure: Letting Go of the Steering Wheel. - Robert G. Ferrell:

/dev/random: Cloudbursting, or Risk Mismanagement.
- Mark Lamourine, Michele Nelson:

Book Reviews.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














