35 тысяч подписчиков
5 тысяч видео
NSDI '22 - Backpressure Flow Control
SREcon18 Americas - Monitoring DNS with Open-Source Solutions
USENIX Security '22 - LTrack: Stealthy Tracking of Mobile Phones in LTE
USENIX ATC '22 - Amazon DynamoDB: A Scalable, Predictably Performant, and Fully Managed NoSQL...
LISA19 - Deep Dive into Kubernetes Internals for Builders and Operators
USENIX Security '22 - OpenVPN is Open to VPN Fingerprinting
OSDI '14 - All File Systems Are Not Created Equal: On the Complexity of Crafting Crash-Consistent
USENIX Security '17 - Hacking in Darkness: Return-oriented Programming against Secure Enclaves
Recon: Verifying File System Consistency at Runtime
SREcon22 Asia/Pacific - Lifecycle of a Sample in the Prometheus TSDB
USENIX Security '22 - Creating a Secure Underlay for the Internet
USENIX Security '20 - The Unpatchable Silicon: A Full Break of the Bitstream Encryption of Xilinx
USENIX Security '21 - Detecting Kernel Refcount Bugs with Two-Dimensional Consistency Checking
USENIX ATC '20 - Reverse Debugging of Kernel Failures in Deployed Systems
USENIX ATC '19 - EROFS: A Compression-friendly Readonly File System for Resource-scarce Devices
SREcon19 Americas - Getting Started with Observability Lab: Opentracing, Prometheus, and Jaeger
USENIX ATC '15 - GraphQ: Graph Query Processing with Abstraction Refinement
HotStorage '20 - Processing in Storage Class Memory
USENIX Security '21 - U Can't Debug This: Detecting JavaScript Anti-Debugging Techniques in the Wild
USENIX Security '20 - HALucinator: Firmware Re-hosting Through Abstraction Layer Emulation
NSDI '23 - Understanding RDMA Microarchitecture Resources for Performance Isolation
USENIX Security '20 - Adversarial Preprocessing: Understanding and Preventing Image-Scaling Attacks
SREcon22 Americas - Modeling Alert Quality
OSDI '24 - USHER: Holistic Interference Avoidance for Resource Optimized ML Inference
FAST '24 - RFUSE: Modernizing Userspace Filesystem Framework through Scalable Kernel-Userspace...
SREcon22 Europe/Middle East/Africa - How We Drained Every Backbone Router Simultaneously
SREcon22 Europe/Middle East/Africa - SRE and ML: Why It Matters
USENIX Security '22 - DoubleStar: Long-Range Attack Towards Depth Estimation based Obstacle
NSDI '23 - Empowering Azure Storage with RDMA
USENIX Security '22 - Who Are You (I Really Wanna Know)? Detecting Audio DeepFakes Through Vocal
FAST '23 - Practical Design Considerations for Wide Locally Recoverable Codes (LRCs)
SREcon22 Europe/Middle East/Africa - An SRE Guide to Linux Kernel Upgrades
SREcon22 Europe/Middle East/Africa - What SRE Could Be: Systems Reliability Engineering
USENIX Security '22 - Playing for K(H)eaps: Understanding and Improving Linux Kernel Exploit...
USENIX Security '22 - Under the Hood of DANE Mismanagement in SMTP
NSDI '23 - SkyPilot: An Intercloud Broker for Sky Computing
SREcon23 Americas - The Making of an Ultra Low Latency Trading System with Go and Java
FAST '23 - Building and Operating a Pretty Big Storage System (My Adventures in Amazon S3)
FAST '23 - Perseus: A Fail-Slow Detection Framework for Cloud Storage Systems
SREcon23 Americas - The Endgame of SRE
SREcon23 Americas - Why This Stuff Is Hard
NSDI '23 - CausalSim: A Causal Framework for Unbiased Trace-Driven Simulation
SREcon23 Americas - Hell Is Other Platforms
USENIX Security '19 - TESSERACT: Eliminating Experimental Bias in Malware Classification
NSDI '15 - The Design and Implementation of Open vSwitch
NSDI '21 - SyncScatter: Enabling WiFi like synchronization and range for WiFi backscatter
USENIX Security '18 - Bamboozling Certificate Authorities with BGP
USENIX Security '22 - Dynamic Searchable Encryption with Optimal Search in the Presence of Deletions
FAST '19 - Optimizing Systems for Byte-Addressable NVM by Reducing Bit Flipping
USENIX Security '20 - Symbolic execution with SymCC: Don't interpret, compile!
USENIX ATC '22 - HyperEnclave: An Open and Cross-platform Trusted Execution Environment