Search results

    Life after The Chocolate FactorySREcon22 Europe/Middle East/AfricaMurali Suriar, Emil Stolarsky
    How We Implemented High Throughput Logging at SpotifySREcon22 Europe/Middle East/AfricaLauren Muhlhauser
    Market Data: Applying SRE Techniques to Legacy DesignsSREcon22 Europe/Middle East/AfricaGeorge Brighton
    Hunting for Risky Dependencies in the World of MicroservicesSREcon22 Europe/Middle East/AfricaTheo Klein
    The Biases Confronting SREsSREcon22 Europe/Middle East/AfricaDavid Owczarek
    Building Dynamic Configuration into TerraformSREcon22 Europe/Middle East/AfricaIsabelle Miller, Hosh Sadiq
    SLOs, SREs, and GHGsSREcon22 Europe/Middle East/AfricaBill Johnson
    Crayon Drawing Is a Vital Engineering SkillSREcon22 Europe/Middle East/AfricaMurali Suriar
    Engineering for SustainabilitySREcon22 Europe/Middle East/AfricaNamrata Namrata
    Financial Regulators Worldwide Are Getting the Legal Right to Regulate the Operational Resilience of Big Cloud Service ProvidersSREcon22 Europe/Middle East/AfricaAndrew Ellam
    Measuring Reliability: What Got Us Here Won't Get Us ThereSREcon22 Europe/Middle East/AfricaŠtěpán Davidovič
    Oncall: An Equal Opportunity Waste of TimeSREcon22 Europe/Middle East/AfricaDave O'Connor
    Statistics for EngineersSREcon22 Europe/Middle East/AfricaHeinrich Hartmann
    SRE as She Is SpokeSREcon22 Europe/Middle East/AfricaAndrew Clay Shafer
    Knowledge and Power: A Sociotechnical Systems Discussion on the Future of SRESREcon22 Europe/Middle East/AfricaLaura Maguire, Lorin Hochstein
    An Audit of Facebook's Political Ad Policy EnforcementUSENIX Security '22Victor Le Pochat, Laura Edelson, Tom Van Goethem, Wouter Joosen, Damon McCoy, Tobias Lauinger
    "How Do You Not Lose Friends?": Synthesizing a Design Space of Social Controls for Securing Shared Digital Resources Via Participatory Design JamsUSENIX Security '22Eyitemi Moju-Igbene, Hanan Abdi, Alan Lu, Sauvik Das
    AMD Prefetch Attacks through Power and TimeUSENIX Security '22Moritz Lipp, Daniel Gruss, Michael Schwarz
    Online Website Fingerprinting: Evaluating Website Fingerprinting Attacks on Tor in the Real WorldUSENIX Security '22Giovanni Cherubin, Rob Jansen, Carmela Troncoso
    "I feel invaded, annoyed, anxious and I may protect myself": Individuals' Feelings about Online Tracking and their Protective Behaviour across Gender and CountryUSENIX Security '22Kovila P.L. Coopamootoo, Maryam Mehrnezhad, Ehsan Toreini
    Mistrust Plugins You Must: A Large-Scale Study Of Malicious Plugins In WordPress MarketplacesUSENIX Security '22Ranjita Pai Kasturi, Jonathan Fuller, Yiting Sun, Omar Chabklo, Andres Rodriguez, Jeman Park, Brendan Saltaformaggio
    Web Cache Deception Escalates!USENIX Security '22Seyed Ali Mirheidari, Matteo Golinelli, Kaan Onarlioglu, Engin Kirda, Bruno Crispo
    Exploring the Unchartered Space of Container Registry TyposquattingUSENIX Security '22Guannan Liu, Xing Gao, Haining Wang, Kun Sun
    LinKRID: Vetting Imbalance Reference Counting in Linux kernel with Symbolic ExecutionUSENIX Security '22Jian Liu, Lin Yi, Weiteng Chen, Chengyu Song, Zhiyun Qian, Qiuping Yi
    Hiding in Plain Sight? On the Efficacy of Power Side Channel-Based Control Flow MonitoringUSENIX Security '22Yi Han, Matthew Chan, Zahra Aref, Nils Ole Tippenhauer, Saman Zonouz