| Life after The Chocolate Factory | SREcon22 Europe/Middle East/Africa | Murali Suriar, Emil Stolarsky |
| How We Implemented High Throughput Logging at Spotify | SREcon22 Europe/Middle East/Africa | Lauren Muhlhauser |
| Market Data: Applying SRE Techniques to Legacy Designs | SREcon22 Europe/Middle East/Africa | George Brighton |
| Hunting for Risky Dependencies in the World of Microservices | SREcon22 Europe/Middle East/Africa | Theo Klein |
| The Biases Confronting SREs | SREcon22 Europe/Middle East/Africa | David Owczarek |
| Building Dynamic Configuration into Terraform | SREcon22 Europe/Middle East/Africa | Isabelle Miller, Hosh Sadiq |
| SLOs, SREs, and GHGs | SREcon22 Europe/Middle East/Africa | Bill Johnson |
| Crayon Drawing Is a Vital Engineering Skill | SREcon22 Europe/Middle East/Africa | Murali Suriar |
| Engineering for Sustainability | SREcon22 Europe/Middle East/Africa | Namrata Namrata |
| Financial Regulators Worldwide Are Getting the Legal Right to Regulate the Operational Resilience of Big Cloud Service Providers | SREcon22 Europe/Middle East/Africa | Andrew Ellam |
| Measuring Reliability: What Got Us Here Won't Get Us There | SREcon22 Europe/Middle East/Africa | Štěpán Davidovič |
| Oncall: An Equal Opportunity Waste of Time | SREcon22 Europe/Middle East/Africa | Dave O'Connor |
| Statistics for Engineers | SREcon22 Europe/Middle East/Africa | Heinrich Hartmann |
| SRE as She Is Spoke | SREcon22 Europe/Middle East/Africa | Andrew Clay Shafer |
| Knowledge and Power: A Sociotechnical Systems Discussion on the Future of SRE | SREcon22 Europe/Middle East/Africa | Laura Maguire, Lorin Hochstein |
| An Audit of Facebook's Political Ad Policy Enforcement | USENIX Security '22 | Victor Le Pochat, Laura Edelson, Tom Van Goethem, Wouter Joosen, Damon McCoy, Tobias Lauinger |
| "How Do You Not Lose Friends?": Synthesizing a Design Space of Social Controls for Securing Shared Digital Resources Via Participatory Design Jams | USENIX Security '22 | Eyitemi Moju-Igbene, Hanan Abdi, Alan Lu, Sauvik Das |
| AMD Prefetch Attacks through Power and Time | USENIX Security '22 | Moritz Lipp, Daniel Gruss, Michael Schwarz |
| Online Website Fingerprinting: Evaluating Website Fingerprinting Attacks on Tor in the Real World | USENIX Security '22 | Giovanni Cherubin, Rob Jansen, Carmela Troncoso |
| "I feel invaded, annoyed, anxious and I may protect myself": Individuals' Feelings about Online Tracking and their Protective Behaviour across Gender and Country | USENIX Security '22 | Kovila P.L. Coopamootoo, Maryam Mehrnezhad, Ehsan Toreini |
| Mistrust Plugins You Must: A Large-Scale Study Of Malicious Plugins In WordPress Marketplaces | USENIX Security '22 | Ranjita Pai Kasturi, Jonathan Fuller, Yiting Sun, Omar Chabklo, Andres Rodriguez, Jeman Park, Brendan Saltaformaggio |
| Web Cache Deception Escalates! | USENIX Security '22 | Seyed Ali Mirheidari, Matteo Golinelli, Kaan Onarlioglu, Engin Kirda, Bruno Crispo |
| Exploring the Unchartered Space of Container Registry Typosquatting | USENIX Security '22 | Guannan Liu, Xing Gao, Haining Wang, Kun Sun |
| LinKRID: Vetting Imbalance Reference Counting in Linux kernel with Symbolic Execution | USENIX Security '22 | Jian Liu, Lin Yi, Weiteng Chen, Chengyu Song, Zhiyun Qian, Qiuping Yi |
| Hiding in Plain Sight? On the Efficacy of Power Side Channel-Based Control Flow Monitoring | USENIX Security '22 | Yi Han, Matthew Chan, Zahra Aref, Nils Ole Tippenhauer, Saman Zonouz |