News
Immediately, there is one oddity: the stubbed out async_print returns a value produced by rand()—any integer value—while our enum only has 3 variants. Surprisingly, this is valid C, as its enums are ...
Sponsored by USENIX, the Advanced Computing Systems Association.. All authors of accepted USENIX Security '24 papers (including shepherd-approved papers) are encouraged to submit artifacts for ...
USENIX celebrates its 50th anniversary in 2025. We celebrate decades of innovations, experiments, and gatherings of the advanced computing system community.
Secure Collaborative Machine Learning (SCML) suffers from high communication cost caused by secure computation protocols. While modern datacenters offer high-bandwidth and low-latency networks with ...
The Twenty-First Symposium on Usable Privacy and Security (SOUPS 2025), August 10–12, 2025, Seattle, WA, USA.
OSDI brings together professionals from academic and industrial backgrounds in what has become a premier forum for discussing the design, implementation, and implications of systems software. The ...
While the term is new, far memory is far from a new idea. Network-based memory pooling has been explored way back in the 90s, with systems like GMS extending the operating system to transparently ...
We introduce Flip Feng Shui (FFS), a new exploitation vector which allows an attacker to induce bit flips over arbitrary physical memory in a fully controlled way. FFS relies on hardware bugs to ...
Quantum computing started in the early 1980s with the founding ideas of. Paul Benioff, who in 1980 constructed a quantum mechanical model describing the computational process of Turing machines, which ...
The transition from normal operations to loss operations is typically very sudden—there is almost no time to react to prevent it. This is one reason why SRE uses a combination of fast burn and slow ...
VehicleSec aims to bring together an audience of university researchers, scientists, industry professionals, and government representatives to contribute new theories, technologies, and systems on any ...
Sponsored by USENIX, the Advanced Computing Systems Association.. The 34th USENIX Security Symposium will evaluate research artifacts for availability, functionality, and reproducibility. All authors ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results