| Revitalizing the Forgotten On-Chip DMA to Expedite Data Movement in NVM-based Storage Systems | FAST '23 | Jingbo Su, Jiahao Li, Luofan Chen, Cheng Li, Kai Zhang, Liang Yang, Yinlong Xu |
| SMRSTORE: A Storage Engine for Cloud Object Storage on HM-SMR Drives | FAST '23 | Su Zhou, Erci Xu, Hao Wu, Yu Du, Jiacheng Cui, Wanyu Fu, Chang Liu, Yingni Wang, Wenbo Wang, Shouqu Sun, Xianfei Wang, Bo Feng, Biyun Zhu, Xin Tong, Weikang Kong, Linyan Liu, Zhongjie Wu, Jinbo Wu, Qingchao Luo, Jiesheng Wu |
| Multi-view Feature-based SSD Failure Prediction: What, When, and Why | FAST '23 | Yuqi Zhang, Wenwen Hao, Ben Niu, Kangkang Liu, Shuyang Wang, Na Liu, Xing He, Yongwong Gwon, Chankyu Koh |
| Integrated Host-SSD Mapping Table Management for Improving User Experience of Smartphones | FAST '23 | Yoona Kim, Inhyuk Choi, Juhyung Park, Jaeheon Lee, Sungjin Lee, Jihong Kim |
| The Very Hungry Defender: Metamorphosing Security Decision-Making by Incorporating Opportunity Cost | Enigma 2023 | Kelly Shortridge |
| The Slippery Slope of Cybersecurity Analogies | Enigma 2023 | Josiah Dykstra |
| Myths and Lies in InfoSec | Enigma 2023 | Adrian Sanabria |
| True Crime Journalism: Cyber | Enigma 2023 | Joseph Menn, Lily Hay Newman, Alfred Ng |
| Building an Automated Machine for Discovering Privacy Violations at Scale | Enigma 2023 | Suchakra Sharma |
| Technical Metamorphosis: The 3 Stages of DSAR Automation | Enigma 2023 | Alon Levy |
| Meaningful Hardware Privacy for a Smart and Augmented Future | Enigma 2023 | Marcus Hodges |
| Privacy Policies, by Lawyers, for Lawyers. What about Everyone Else? | HotSec '19 Enigma 2023 | Hannah Poteat, Holly Hogan, Miju Han, Emily Jones, Gabriela Zanfir-Fortuna |
| Open Source Software and Journalism: Field Notes from a Global Perspective | Enigma 2023 | Harlo Holmes |
| So You're Going to Blow the Whistle? Communications Dos and Don'ts for Whistleblowers. | Enigma 2023 | Emily Schwartz |
| Protecting Whistleblower Information | Enigma 2023 | Shanna Devine |
| Understanding Trust and Security Processes in the Open Source Software Ecosystem | Enigma 2023 | Dominik Wermke |
| Why Is Our Security Research Failing? Five Practices to Change! | Enigma 2023 | Marcus Botacin |
| What Public Interest AI Auditors Can Learn from Security Testing: Legislative and Practical Wins | Enigma 2023 | Justin Brookman |
| Metric Perversity and Bad Decision-Making | Enigma 2023 | Lea Kissner |
| The Not Fake News Hour | Enigma 2023 | Riana Pfefferkorn |
| A New Process to Tackle Misinformation on Social Media: Prevalence-Based Gradation | Enigma 2023 | Kamesh Shekar |
| Characterizing and Measuring Misleading and Harmful Online Ad Content at Scale | Enigma 2023 | Eric Zeng |
| How the Internet Improves Humanity | Enigma 2023 | Eric Goldman |
| Fireside Chat: The State of Memory Safety | Enigma 2023 | Amira Dhalla, Yael Grauer, Alex Gaynor, Josh Aas |
| Spotting the Differences: Quirks of Machine Learning (in) Security | Enigma 2023 | Fabrício Ceschin |