News
Trusted execution environments, and particularly the Software Guard eXtensions (SGX) included in recent Intel x86 processors, gained significant traction in recent years. A long track of research ...
Thanks for joining us in Washington, D.C., for the 24th USENIX Security Symposium (USENIX Security '15). We hope you enjoyed the event.
Upcoming USENIX conferences, as well as events that are being held in cooperation with USENIX, are listed below. View USENIX's conference policies and resources and how we put them into practice at ...
USENIX celebrates its 50th anniversary in 2025. We celebrate decades of innovations, experiments, and gatherings of the advanced computing system community. And in the spirit of our ever-evolving ...
Recently, UNIX lost one of its most stalwart pioneers. In eulogizing him in a tweet, I claimed that Roger Faulkner was the "godfather of post-AT&T UNIX"—and I can't imagine that anyone who knew Roger ...
USENIX conferences, as well as events held in cooperation with USENIX, are listed in reverse chronological order below.
Containers have become the de facto method for hosting large-scale distributed applications. Container overlay networks are essential to providing portability for containers, yet they impose ...
Salsify is a new architecture for real-time Internet video that tightly integrates a video codec and a network transport protocol, allowing it to respond quickly to changing network conditions and ...
After nearly a decade of anticipation, scalable nonvolatile memory DIMMs are finally commercially available with the release of Intel’s Optane DIMM. This new nonvolatile DIMM supports byte-granularity ...
We demonstrate that an Internet of Things (IoT) botnet of high wattage devices–such as air conditioners and heaters–gives a unique ability to adversaries to launch large-scale coordinated attacks on ...
We present INSIDER, a full-stack redesigned storage system to help users fully utilize the performance of emerging storage drives with moderate programming efforts. On the hardware side, INSIDER ...
We present an attack on the encryption key negotiation protocol of Bluetooth BR/EDR. The attack allows a third party, without knowledge of any secret material (such as link and encryption keys), to ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results