Find link

language:

jump to random article

Find link is a tool written by Edward Betts.

searching for USENIX 340 found (870 total)

alternate case: uSENIX

Interix (1,616 words) [view diff] case mismatch in snippet view article find links to article

Alternative Environment Subsystem" Usenix paper 1997-08-12 "OpenNT: UNIX Application Portability to Windows NT" Usenix presentation (again 1998-06) 1997-11
Unikernel (1,111 words) [view diff] exact match in snippet view article find links to article
Specification and Implementation". Proceedings of the 24th USENIX Security Symposium (USENIX Security 15). Thibault, Samuel; Deegan, Tim (2008). "Improving
KornShell (1,770 words) [view diff] exact match in snippet view article find links to article
developed by David Korn at Bell Labs in the early 1980s and announced at USENIX on July 14, 1983. The initial development was based on Bourne shell source
Stephen Tweedie (467 words) [view diff] exact match in snippet view article find links to article
Ext2/Ext3 Filesystem". USENIX 2002 Annual Technical Conference. Retrieved 23 June 2007. Stephen Tweedie (1997). "/proc". USENIX: The Advanced Computing
Journaling file system (1,683 words) [view diff] exact match in snippet view article find links to article
and Evolution of Journaling File Systems" (PDF), 2005 USENIX Annual Technical Conference, USENIX Association, archived (PDF) from the original on September
Ron Rivest (1,533 words) [view diff] exact match in snippet view article find links to article
Proceedings of the 11th USENIX Security Symposium, San Francisco, CA, USA, August 5-9, 2002. Boston, Massachusetts: USENIX Association. pp. 339–353.
Soft updates (716 words) [view diff] exact match in snippet view article find links to article
"Metadata Update Performance in File Systems" (PDF). Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI): 49–60.
Zephyr (protocol) (454 words) [view diff] case mismatch in snippet view article
"Network Services in the Athena Environment". Proceedings of the Winter 1988 Usenix Conference. CiteSeerX 10.1.1.31.8727. "Slack Enterprise Grid". "Change Log"
Libumem (212 words) [view diff] exact match in snippet view article find links to article
serious bottleneck. Valgrind "Proceedings of the 2001 USENIX Annual Technical Conference" (PDF). The USENIX Association. 2001. "github / omniti-labs / portableumem"
Refraction networking (412 words) [view diff] exact match in snippet view article find links to article
2020-12-06. "Telex: Anticensorship in the Network Infrastructure | USENIX". www.usenix.org. Retrieved 2020-12-06. Wustrow, Eric; Swanson, Colleen M.; Halderman
Poul-Henning Kamp (570 words) [view diff] exact match in snippet view article find links to article
selection of publications: USENIX ATC 1998 FREENIX track, "malloc(3) Revisited" USENIX BSDCon 2003, GBDE-GEOM Based Disk Encryption USENIX BSDCon 2002, Rethinking
Coda (file system) (586 words) [view diff] exact match in snippet view article
(1999). "Porting the coda file system to windows". Proc. USENIX Annual Technical Conference. USENIX Association: 30. Retrieved 2009-04-15. "Coda Support for
JX (operating system) (266 words) [view diff] exact match in snippet view article
JX Operating System". Proceedings of the 2002 USENIX Annual Technical Conference. Monterey, CA: USENIX. Retrieved 2007-04-21. Project home page The JX
Roger Dingledine (1,304 words) [view diff] exact match in snippet view article find links to article
Proceedings of the 13th USENIX Security Symposium. {{cite journal}}: Cite journal requires |journal= (help) USENIX Test of Time Awards. USENIX. Retrieved 2020-12-28
Elie Bursztein (1,917 words) [view diff] case mismatch in snippet view article find links to article
Analysis of Private Browsing Modes in Modern Browsers. 19th Usenix Security Symposium. Usenix. E. Bursztein; R. Beauxis; H.Paskov; D. Perito; C. Fabry;
Busdma (433 words) [view diff] exact match in snippet view article find links to article
the FREENIX Track: 1998 USENIX Annual Technical Conference. USENIX. "A Machine-Independent DMA Framework for Net BSD". Usenix. 1998. David Chisnall (2006-10-06)
Computer security compromised by hardware failure (5,114 words) [view diff] exact match in snippet view article find links to article
Devices" (PDF), Proceedings of the 10th Conference on USENIX Security Symposium SSYM'01, vol. 10, USENIX Association Berkeley, California, USA, p. 4, archived
Linux Security Modules (759 words) [view diff] exact match in snippet view article find links to article
Security Modules: General Security Support for the Linux Kernel presented at USENIX Security 2002. At the same conference was the paper Using CQUAL for Static
Log-structured File System (BSD) (746 words) [view diff] case mismatch in snippet view article
Log-Structured File System for UNIX" (PDF), Proceedings of the 1993 Winter Usenix Matthews, Jeanna Neefe; Roselli, Drew; Costello, Adam M.; Wang, Randolph
False sharing (1,041 words) [view diff] exact match in snippet view article find links to article
sharing and its effect on shared memory performance". Sedms'93: USENIX Systems on USENIX Experiences with Distributed and Multiprocessor Systems. 4. Retrieved
NixOS (1,877 words) [view diff] exact match in snippet view article find links to article
Configuration Management (PDF). 11th USENIX workshop on Hot topics in operating systems. San Diego, California, USA: USENIX Association. Archived (PDF) from
OSF/1 (1,623 words) [view diff] exact match in snippet view article find links to article
Massively Parallel Multicomputers". Proceedings of the Winter 1993 USENIX Conference. USENIX Association: 449–468. Retrieved 23 January 2024. Design of the
Randy Katz (1,508 words) [view diff] exact match in snippet view article find links to article
Platform for Fine-Grained Resource Sharing in the Data Center (PDF). 8th USENIX Symposium on Networked Systems Design and Implementation, Boston, MA, (March
Secure Network Programming (813 words) [view diff] exact match in snippet view article find links to article
Texas at Austin, led by Simon S. Lam. This work was published in the 1994 USENIX Summer Technical Conference. For this project, the authors won the 2004
Booting process of Android devices (1,035 words) [view diff] exact match in snippet view article find links to article
customizations". Proceedings of the 11th USENIX Conference on Offensive Technologies. WOOT'17. Vancouver, BC, Canada: USENIX Association: 22. Alendal, Gunnar;
IPsec (5,081 words) [view diff] exact match in snippet view article find links to article
IPsec. NRL's IPsec implementation was described in their paper in the 1996 USENIX Conference Proceedings. NRL's open-source IPsec implementation was made
Telex (anti-censorship system) (263 words) [view diff] exact match in snippet view article
Infrastructure" (PDF). Proceedings of the 20th USENIX Conference on Security. Berkeley, CA, USA: USENIX Association: 30. "Telex Anti-Censorship System
Sequential access (420 words) [view diff] exact match in snippet view article find links to article
Measurement and Analysis of Large-scale Network File System Workloads. USENIX ATC. 2008 Frank Schmuck and Roger Haskin, GPFS: A Shared-Disk File System
Vector-field consistency (347 words) [view diff] case mismatch in snippet view article find links to article
described in a paper which was awarded the best-paper prize in the ACM/IFIP/Usenix Middleware Conference 2007. It has since been enhanced for increased scalability
Buffer overflow (5,076 words) [view diff] exact match in snippet view article find links to article
423–460. doi:10.1002/spe.515. ISSN 0038-0644. "12th USENIX Security Symposium – Technical Paper". www.usenix.org. Retrieved 3 April 2018. "Protecting against
Page replacement algorithm (6,235 words) [view diff] exact match in snippet view article find links to article
improvement of the CLOCK replacement (PDF). 2005 USENIX Annual Technical Conference. Anaheim, CA, USA: USENIX Association. p. 35. Archived (PDF) from the original
1992 in science (678 words) [view diff] exact match in snippet view article find links to article
(September 1992), "SOCKS", Proceedings of the Third USENIX UNIX Security Symposium, Baltimore, MD: USENIX Association Crilly, Tony (2007). 50 Mathematical
Downgrade attack (792 words) [view diff] exact match in snippet view article find links to article
A Tool for Testing TLS Implementations. 9th USENIX Workshop on Offensive Technologies ({WOOT} 15. USENIX. Retrieved 30 January 2019.{{cite conference}}:
Joel McCormack (1,875 words) [view diff] exact match in snippet view article find links to article
of USENIX paper listed immediately below.] Joel McCormack, Robert McNamara. A Sketch of the Smart Frame Buffer, Proceedings of the 1993 Winter USENIX Conference
Kqueue (684 words) [view diff] exact match in snippet view article find links to article
2001 USENIX Annual Technical Conference. USENIX (published June 25–30, 2001). "KQueue–A Generic and Scalable Event Notification Facility". Usenix. "Connection
Data center network architectures (1,880 words) [view diff] exact match in snippet view article find links to article
Proceedings of the 7th USENIX Conference on Networked Systems Design and Implementation. NSDI'10. San Jose, California: USENIX Association: 19. Cisco
Unix shell (1,733 words) [view diff] exact match in snippet view article find links to article
Extensible High Level Language", Proceedings of the USENIX 1994 Very High Level Languages Symposium, USENIX Association, retrieved February 5, 2015, Instead
Gridcoin (647 words) [view diff] exact match in snippet view article find links to article
fixing gridcoin". Proceedings of the 11th USENIX Conference on Offensive Technologies. WOOT'17. USA: USENIX Association: 14. "Gridcoin-Research/build-unix
Gernot Heiser (1,535 words) [view diff] exact match in snippet view article find links to article
Computer Systems Architecture Conference, 2008 Best Student Paper at the 2005 USENIX Annual Technical Conference Data61 drops world-class seL4 security team
Active Directory Rights Management Services (955 words) [view diff] exact match in snippet view article find links to article
Microsoft Rights Management Services". WOOT '16 - 10 USENIX Workshop on Offensive Technologies. USENIX Security Symposium. Retrieved 2016-08-04. "Creating
Episode filesystem (107 words) [view diff] exact match in snippet view article find links to article
Paul; Conway, Richard. "ABCs of z/OS System Programming: Volume 9" (PDF). Redbooks. IBM. Retrieved 1 May 2022. The Episode File System (USENIX Paper)
Nadia Heninger (664 words) [view diff] exact match in snippet view article find links to article
network devices" (PDF), Proceedings of the 21st USENIX Conference on Security Symposium (Security'12), Berkeley, CA, USA: USENIX Association, pp. 35:1–35:16
BeyondCorp (1,026 words) [view diff] exact match in snippet view article find links to article
Approach to Enterprise Security - USENIX". www.usenix.org. "BeyondCorp: Design to Deployment at Google - USENIX". www.usenix.org. Spear, Batz; Beyer, Betsy
CAPTCHA (3,643 words) [view diff] case mismatch in snippet view article find links to article
claims to that of Vicarious had been made since 2003. In August 2014 at Usenix WoOT conference, Bursztein et al. presented the first generic CAPTCHA-solving
Replication (computing) (3,140 words) [view diff] exact match in snippet view article
high-throughput chain replication for read-mostly workloads". USENIX Annual Technical Conference. USENIX'09. USA: 11. Katsarakis, Antonios; Gavrielatos, Vasilis;
Data corruption (2,196 words) [view diff] exact match in snippet view article find links to article
Comprehensive Study of Storage Subsystem Failure Characteristics" (PDF). USENIX. Archived (PDF) from the original on 2022-01-25. Retrieved 2014-01-18. Bernd
Tcpcrypt (764 words) [view diff] exact match in snippet view article find links to article
(2010-08-13). The case for ubiquitous transport-level encryption (PDF). 19th USENIX Security Symposium. Michael Cooney (2010-07-19). "Is ubiquitous encryption
ISeeYou (534 words) [view diff] case mismatch in snippet view article find links to article
20, 2014). "iıSeeYou: Disabling the MacBook Webcam Indicator LED" (PDF). Usenix: 17. Soltani, Ashkan (2013-12-18). "Research shows how MacBook Webcams can
Middlebox (1,310 words) [view diff] exact match in snippet view article find links to article
Communication Across Network Address Translators" (PDF). 2005 USENIX Annual Technical Conference. USENIX Association: 179–192. arXiv:cs/0603074. Bibcode:2006cs
Flat-file database (1,073 words) [view diff] exact match in snippet view article find links to article
database query language", WTEC'94: Proceedings of the USENIX Winter 1994 Technical Conference on USENIX Winter 1994 Technical Conference Blodgett, John H
Vanguard (microkernel) (1,333 words) [view diff] exact match in snippet view article
Object-Oriented Microkernel Interface. Proceedings of the USENIX Microkernels and Other Kernel Architectures Symposium. USENIX. San Diego, California.
Open-channel SSD (730 words) [view diff] exact match in snippet view article find links to article
Philippe (2017). LightNVM: The Linux Open-Channel SSD Subsystem (PDF). USENIX FAST. pp. 359–374. Bjørling, Matias (12 March 2015). Open-Channel Solid
Andrew Koenig (programmer) (1,345 words) [view diff] exact match in snippet view article
Exper. 25(S4): S4/45-S4/86 (1995) An anecdote about ML type inference, USENIX Very High Level Languages Symposium, October 1994, Santa Fe When to Write
Cache replacement policies (5,237 words) [view diff] exact match in snippet view article find links to article
Replacement" (PDF). Proceedings of the Annual Conference on USENIX Annual Technical Conference. USENIX Association: 323–336. "Linux Memory Management: Page Replacement
List of computer science conferences (1,322 words) [view diff] exact match in snippet view article find links to article
systems, storage systems and middleware: ATC - USENIX Annual Technical Conference Middleware - ACM/IFIP/USENIX International Middleware Conference SOSP -
AirDrop (2,313 words) [view diff] exact match in snippet view article find links to article
on iOS and macOS Through Apple Wireless Direct Link. 28th USENIX Security Symposium (USENIX Security '19). Archived from the original on November 24,
Implementations of differentially private analyses (1,342 words) [view diff] exact match in snippet view article find links to article
Floating-point Timing Channels". Proceedings of the 26th USENIX Conference on Security Symposium. USENIX Association: 69–81. Dooley, Isaac; Kale, Laxmikant
Qualcomm Atheros (2,319 words) [view diff] exact match in snippet view article find links to article
Low Latency and Airtime Fairness in WiFi. 2017 USENIX Annual Technical Conference (USENIX ATC 17). USENIX - The Advanced Computing Systems Association.
End-to-end auditable voting systems (2,655 words) [view diff] exact match in snippet view article find links to article
Protocols: A Systems perspective. Proceedings of the Fourteenth USENIX Security Symposium (USENIX Security 2005), August 2005. Steven Cherry, Making every e-vote
Binary translation (2,134 words) [view diff] exact match in snippet view article find links to article
Toolkit". Proceeding TCON'95 Proceedings of the USENIX 1995 Technical Conference Proceedings. USENIX Association Berkeley, CA, USA. p. 24. Wharton, John
Xft (146 words) [view diff] exact match in snippet view article find links to article
Proceedings of the 5th annual conference on Linux Showcase & Conference. 5. USENIX Association: 22–22. Roderick W. Smith. Linux in a Windows World. O'Reilly
Debra Bowen (1,191 words) [view diff] case mismatch in snippet view article find links to article
of The NewsHour with Jim Lehrer and was the keynote speaker for the 2008 Usenix Security Symposium. "Debra Bowen - John F. Kennedy Presidential Library
Binary translation (2,134 words) [view diff] exact match in snippet view article find links to article
Toolkit". Proceeding TCON'95 Proceedings of the USENIX 1995 Technical Conference Proceedings. USENIX Association Berkeley, CA, USA. p. 24. Wharton, John
Debra Bowen (1,191 words) [view diff] case mismatch in snippet view article find links to article
of The NewsHour with Jim Lehrer and was the keynote speaker for the 2008 Usenix Security Symposium. "Debra Bowen - John F. Kennedy Presidential Library
Microsoft Detours (234 words) [view diff] exact match in snippet view article find links to article
(1997). "Detours: Binary Interception of Win32 Functions" (PDF). Third USENIX Windows NT Symposium. Wikibooks has a book on the topic of: Windows Programming
Natural user interface (1,687 words) [view diff] exact match in snippet view article find links to article
USENIX-98, New Orleans June 15–19, 1998, Published in: ATEC '98 Proceedings of the annual conference on USENIX Annual Technical Conference USENIX Association
Rump kernel (456 words) [view diff] case mismatch in snippet view article find links to article
Kernels (Ph.D). Aalto university. "Rump File Systems: Kernel Code Reborn". Usenix.org. 2002-02-01. Retrieved 2013-08-15. Kantee, Antti; Ysmal, Arnaud (2009)
Jan Krissler (671 words) [view diff] exact match in snippet view article find links to article
Impact of High Resolution Smartphone Cameras | USENIX". Workshop on Offensive Technologies (WOOT). USENIX Association. Retrieved 2018-08-21.{{cite web}}:
Valgrind (1,423 words) [view diff] exact match in snippet view article find links to article
value errors with bit-precision". Proceedings of the USENIX Annual Technical Conference 2005. USENIX Association: 2. Seward, J.; Nethercote, N.; Weidendorfer
Vinum volume manager (694 words) [view diff] exact match in snippet view article find links to article
Manager (PDF). Proceedings of the FREENIX Track: 1999 USENIX Annual Technical Conference. USENIX (published June 6–11, 1999). "The Vinum Volume Manager"
Pump and dump (3,200 words) [view diff] exact match in snippet view article find links to article
"The Anatomy of a Cryptocurrency Pump-and-Dump Scheme". 28th USENIX Security Symposium (USENIX Security 19): 1609–1625. arXiv:1811.10109. ISBN 978-1-939133-06-9
Berkeley DB (1,539 words) [view diff] exact match in snippet view article find links to article
Keith; Seltzer, Margo (1999). "Berkeley DB" (PDF). Proc. FREENIX Track, USENIX Annual Tech. Conf. Archived (PDF) from the original on 2022-10-09. Retrieved
GNU Mailman (502 words) [view diff] case mismatch in snippet view article find links to article
Manager"; John Viega, Barry Warsaw, Ken Manheimer; presented at the 12th Usenix Systems Administration Conference (LISA '98), Dec 9, 1998 GNU Mailman chapter
Chris Wright (programmer) (151 words) [view diff] case mismatch in snippet view article
Retrieved 2009-04-07. "Security '02 Technical Program - Abstract". www.usenix.org. "OpenDaylight Leadership". Archived from the original on April 17,
Quality of Data (409 words) [view diff] case mismatch in snippet view article find links to article
vector-field Consistency, awarded the best-paper prize in the ACM/IFIP/Usenix Middleware Conference 2007 and later enhanced for increased scalability
Automotive security (2,087 words) [view diff] exact match in snippet view article find links to article
"Comprehensive Experimental Analyses of Automotive Attack Surfaces | USENIX". www.usenix.org. 2011. "Securing Vehicular On-Board IT Systems: The EVITA Project"
Steganography tools (761 words) [view diff] exact match in snippet view article find links to article
steganalysis". Proceedings of the 10th Conference on USENIX Security Symposium. SSYM'01. 10. USENIX Association: 24–37. Retrieved 28 November 2012. Bierbrauer
Keystroke logging (5,267 words) [view diff] exact match in snippet view article find links to article
smartphone motion (PDF). Proceedings of the 6th USENIX conference on Hot topics in security. USENIX. Retrieved 25 August 2014. Xu, Zhi; Bai, Kun; Zhu
Chorus Systèmes SA (3,566 words) [view diff] exact match in snippet view article find links to article
Chorus and MacOS". Proceedings of the USENIX Symposium on Microkernels and Other Kernel Architectures. USENIX Association: 61–71. Retrieved 25 May 2022
SOCKS (2,275 words) [view diff] case mismatch in snippet view article find links to article
Silicon Graphics in 1992, Koblas presented a paper on SOCKS at that year's Usenix Security Symposium, making SOCKS publicly available. The protocol was extended
Sage (740 words) [view diff] exact match in snippet view article find links to article
a Swedish administrative authority SAGE (organization), now LISA, the USENIX special interest group for system administrators SAGE-AU, an Australian
Pseudorandom function family (1,023 words) [view diff] exact match in snippet view article find links to article
deduplicated storage (PDF). Proceedings of the 22nd USENIX Security Symposium. Washington, DC, USA: USENIX Association. pp. 1–16. Matthew Green. "Let’s talk
Microsoft Phoenix (648 words) [view diff] exact match in snippet view article find links to article
Proceedings of the 7th Symposium on Operating Systems Design and Implementation. USENIX Association: 147–160. Retrieved May 8, 2019. "Phoenix Compiler Backend"
Stata Center (2,160 words) [view diff] exact match in snippet view article find links to article
Center: An IT Perspective" (KPresenter). Lisa'05 Conference Proceedings. USENIX (usenix.org). Retrieved 2016-11-28. Virtual tour: MIT Computer Science and Artificial
Heap overflow (671 words) [view diff] exact match in snippet view article find links to article
Microsoft Security Research & Defense. 4 Aug 2009. Retrieved 29 Mar 2016. USENIX Association, ed. (2005). Proceedings of the Second Workshop on Real, Large
Baseband processor (484 words) [view diff] exact match in snippet view article find links to article
Exploitation of Memory Corruptions in Cellular Protocol Stacks" (PDF). USENIX WOOT. Retrieved 2015-04-05. "Replicant developers find and close Samsung
Provenance (7,097 words) [view diff] exact match in snippet view article find links to article
for the Linux Kernel". Proceedings of the 24th USENIX Conference on Security Symposium. SEC'15. USENIX Association: 319–334. ISBN 9781931971232. "uf_sensei
Decentralized finance (2,898 words) [view diff] exact match in snippet view article find links to article
Ethereum and in the Binance Smart Chain (BNB)" (PDF). 32nd USENIX Security Symposium (USENIX Security 23). "Updated Guidance for a Risk-Based Approach
VoIP spam (1,376 words) [view diff] exact match in snippet view article find links to article
(PDF). Proceedings of the USENIX Workshop on Steps to Reducing Unwanted Traffic on the Internet (SRUTI): 31–37 – via usenix.org. Y. Rebahi, S. Dritsas
Security protocol notation (440 words) [view diff] exact match in snippet view article find links to article
Network Systems" (PDF). Proceedings of the Winter 1988 Usenix Conference. Usenix. Berkeley, CA: USENIX Association. pp. 191–201. Retrieved 2009-06-10. Davis
Patrick Lincoln (2,270 words) [view diff] exact match in snippet view article find links to article
Bojinov, D Sanchez, P Reber, D Boneh, P Lincoln, Proceedings of the 21st USENIX conference on Security symposium, 33-33, 2012 {TRIST}: Circumventing Censorship
Draw a Secret (1,289 words) [view diff] exact match in snippet view article find links to article
Michael K. Reiter and Aviel D. Rubin and presented in a paper at the 8th USENIX Security Symposium in Augusts 1999. The scheme replaces alphanumeric password
Apache Spark (2,732 words) [view diff] exact match in snippet view article find links to article
Scott; Stoica, Ion. Spark: Cluster Computing with Working Sets (PDF). USENIX Workshop on Hot Topics in Cloud Computing (HotCloud). "Spark 2.2.0 Quick
Apache ZooKeeper (714 words) [view diff] exact match in snippet view article find links to article
"The Chubby lock service for loosely-coupled distributed systems". 7th USENIX Symposium on Operating Systems Design and Implementation (OSDI). Chandra
Jin Li (computer scientist) (1,558 words) [view diff] exact match in snippet view article
Storage". Presented as Part of the 2012 {USENIX} Annual Technical Conference ({USENIX} {ATC} 12). Boston, MA: USENIX: 15–26. Archived from the original on
Decentralized finance (2,898 words) [view diff] exact match in snippet view article find links to article
Ethereum and in the Binance Smart Chain (BNB)" (PDF). 32nd USENIX Security Symposium (USENIX Security 23). "Updated Guidance for a Risk-Based Approach
Access Now (1,933 words) [view diff] exact match in snippet view article find links to article
Measurement of Application-Layer Censorship. In Proceedings of the 27th USENIX Security Symposium. Hoang, P. N., Doreen, S., Polychronakis, M., (2019)
Pharos network coordinates (519 words) [view diff] exact match in snippet view article find links to article
Roscoe; et al. (2004). "Handling Churn in a DHT" (PDF). Proceedings of the USENIX Annual Technical Conference (ATC'04). P. Pietzuch; J. Ledlie; J. Shneidman;
Fractal tree index (2,670 words) [view diff] exact match in snippet view article find links to article
System" (PDF). Proceedings of the 4th USENIX Conference on Hot Topics in Storage and File Systems. MA: USENIX Association. p. 14. Jannen, William; Yuan
Bufferbloat (2,053 words) [view diff] exact match in snippet view article find links to article
Low Latency and Airtime Fairness in WiFi. 2017 USENIX Annual Technical Conference (USENIX ATC 17). USENIX - The Advanced Computing Systems Association.
Clickjacking (2,874 words) [view diff] exact match in snippet view article find links to article
limitations of current Browser-provided Clickjacking protection schemes" (PDF). USENIX. "Wireless Mouse Hacks & Network Security Protection". MOUSEJACK. Retrieved
Swarthmore College (8,337 words) [view diff] exact match in snippet view article find links to article
list. Three SCCS-related papers have been accepted for publication at the USENIX Large Installation System Administration (LISA) Conference, one of which
Interlock protocol (1,078 words) [view diff] exact match in snippet view article find links to article
Identity Without Certification Authorities. Proceedings of the Sixth Annual USENIX Security Symposium, San Jose, July 1996, pp. 67-76. R. H. Morris and K.
MOSIX (1,889 words) [view diff] exact match in snippet view article find links to article
Wheeler R., MOSIX: How Linux Clusters Solve Real World Problems. Proc. 2000 USENIX Annual Tech. Conf., pp. 49–56, San Diego, CA., June 2000. Amar L., Barak
Collision attack (2,010 words) [view diff] exact match in snippet view article find links to article
In Proceedings of the 12th conference on USENIX Security Symposium - Volume 12 (SSYM'03), Vol. 12. USENIX Association, Berkeley, CA, USA, 3-3. Jean-Philippe
Participatory sensing (428 words) [view diff] exact match in snippet view article find links to article
participatory sensing". In Proceedings of the 4th USENIX conference on Hot topics in security. HotSec'09. USENIX Association, Berkeley, CA, USA. p. 8. Raghu
Air gap (networking) (2,263 words) [view diff] exact match in snippet view article
Exfiltration from Air-Gapped Computers over GSM Frequencies". 24th USENIX Security Symposium (USENIX Security 15): 849–864. ISBN 9781931971232. Guri, Mordechai;
Cutwail botnet (445 words) [view diff] exact match in snippet view article find links to article
Botmaster's Perspective of Coordinating Large-Scale Spam Campaigns" (PDF). USENIX. Archived from the original (PDF) on July 25, 2014. Retrieved January 25
Dan Boneh (1,150 words) [view diff] exact match in snippet view article find links to article
USENIX Security Symposium. B. Ross, C. Jackson, N. Miyake, D. Boneh, and J. Mitchell Stronger Password Authentication Using Browser Extensions Usenix
AdvFS (1,085 words) [view diff] exact match in snippet view article find links to article
"Failure-atomic updates of application data in a Linux file system.” 13th USENIX Conference on File and Storage Technologies (FAST 15). 2015. online version
Ben Hawkes (299 words) [view diff] case mismatch in snippet view article find links to article
Bug-Hunting Hackers". Wired.com. Retrieved 4 January 2015. "Ben Hawkes". usenix.org. Retrieved 13 January 2019. Nichols, Shaun (9 June 2015). "It's 2015
Bcfg2 (603 words) [view diff] exact match in snippet view article find links to article
(2008). Configuration Management with Bcfg2 (USENIX Short Topics in System Administration, #19) [Paperback]. USENIX Association. ISBN 978-1-931-97164-5. Official
SRWare Iron (892 words) [view diff] exact match in snippet view article find links to article
"DNS prefetching and its privacy implications: when good things go bad". USENIX. p. 10. Mike Cardwell. "DNS Pre-fetch Exposure on Thunderbird and Webmail"
Terminfo (1,101 words) [view diff] exact match in snippet view article find links to article
Mark. "The New Curses and Terminfo Package". USENIX Conference Proceedings. Summer 1982. Boston, MA: USENIX: 79–91. "fa.info-terms mailing list comments
Wendy Seltzer (576 words) [view diff] exact match in snippet view article find links to article
Privacy Sandbox". AdExchanger. Retrieved 2021-05-21. "Wendy Seltzer | USENIX". www.usenix.org. Retrieved 2024-04-13. "Wendy Seltzer." (profile). Berkman Center
Stabs (262 words) [view diff] exact match in snippet view article find links to article
2018-01-21. Linton, Mark A. (1990). "The Evolution of Dbx" (PDF). USENIX Summer. USENIX Summer 1990 Technical Conference. pp. 211–220. CiteSeerX 10.1.1
Virtual memory compression (2,916 words) [view diff] exact match in snippet view article find links to article
Thinking Small". Proceedings of the Summer 1991 USENIX Conference, Nashville, TN, USA, June 1991. USENIX Association: 385–404. Taunton, Mark (1991-01-22)
Air-gap malware (775 words) [view diff] exact match in snippet view article find links to article
Exfiltration from Air-Gapped Computers over GSM Frequencies". 24th USENIX Security Symposium (USENIX Security 15): 849–864. ISBN 9781939133113. Guri, Mordechai;
OutGuess (713 words) [view diff] exact match in snippet view article find links to article
Circumventing Web Censorship and Surveillance. USENIX Security Symposium. Vol. 11. San Francisco, CA, USA: USENIX Association. pp. 247–262. Fridrich, Jessica;
Data security (1,402 words) [view diff] exact match in snippet view article find links to article
Data From Flash-Based Solid State Drives". FAST'11: Proceedings of the 9th USENIX conference on File and storage technologies. Wikidata Q115346857. Retrieved
Sandbox (computer security) (984 words) [view diff] exact match in snippet view article
Applications (Confining the Wily Hacker)" (PDF). Proceedings of the Sixth USENIX UNIX Security Symposium. Retrieved 25 October 2011. Geier, Eric (2012-01-16)
Service set (802.11 network) (2,079 words) [view diff] exact match in snippet view article
), Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation, NSDI '08, Berkeley, CA: USENIX Association, pp. 73–88. Stacey
Sandbox (computer security) (984 words) [view diff] exact match in snippet view article
Applications (Confining the Wily Hacker)" (PDF). Proceedings of the Sixth USENIX UNIX Security Symposium. Retrieved 25 October 2011. Geier, Eric (2012-01-16)
Password cracking (3,115 words) [view diff] case mismatch in snippet view article find links to article
Cite journal requires |journal= (help) A Future-Adaptable Password Scheme. Usenix.org (March 13, 2002). Retrieved on January 31, 2013. MDCrack FAQ 1.8. None
Dbx (debugger) (349 words) [view diff] exact match in snippet view article
(mdb) GNU Debugger Linton, Mark A. (1990). "The Evolution of Dbx". USENIX Summer. USENIX Summer 1990 Technical Conference. pp. 211–220. CiteSeerX 10.1.1
Page (computer memory) (2,081 words) [view diff] case mismatch in snippet view article
Purpose Operating System Support for Multiple Page Sizes" (PDF). static.usenix.org. Retrieved 2012-11-02. Navarro, Juan; Iyer, Sitararn; Druschel, Peter;
Hermes (programming language) (367 words) [view diff] exact match in snippet view article
Hermes Distributed Programming Language. USENIX Summer Technical Conference. Anaheim, California, USA: Usenix Association. pp. 39–50. Korfhage, Willard;
FX!32 (294 words) [view diff] exact match in snippet view article find links to article
Running 32-Bit x86 Applications on Alpha NT from the Proceedings of the USENIX Windows NT Workshop, Seattle, Washington, August 1997 DIGITAL FX!32: Combining
EEPROM (3,110 words) [view diff] exact match in snippet view article find links to article
Gutmann, Peter (2001-08-15). "Data Remanence in Semiconductor Devices". 10th USENIX SECURITY SYMPOSIUM. IBM T. J. Watson Research Center: 39–54. Archived from
Padding oracle attack (1,791 words) [view diff] exact match in snippet view article find links to article
Rizzo; Thai Duong (25 May 2010). Practical Padding Oracle Attacks (PDF). USENIX WOOT 2010. Brice Canvel; Alain Hiltgen; Serge Vaudenay; Martin Vuagnoux
Gearman (531 words) [view diff] case mismatch in snippet view article find links to article
Drizzle. HAProxy Squid Varnish Træfɪk http://danga.com/words/2007_06_usenix/usenix.pdf http://gearman.org/documentation/ http://gearman.org/download/ http://lists
Remote File Sharing (623 words) [view diff] exact match in snippet view article find links to article
Hamilton, Michail Sabrio, S. Shah, and K. Yueh, RFS Architectural Overview, USENIX Conference Proceedings (June 1986), Atlanta, GA Dennis M. Ritchie, A Stream
Network telescope (1,444 words) [view diff] exact match in snippet view article find links to article
(August 2013). "Bill Cheswick on Firewalls" (PDF). Security. ;login: The USENIX Magazine (Interview). Vol. 38, no. 4. Interviewed by Rik Farrow. p. 21.
Preemption (computing) (1,380 words) [view diff] exact match in snippet view article
; Zolnovsky, J. "Realtime scheduling in SunOS 5.0". Proceedings of the USENIX Winter Conference, 1992: 375–390. "Release notes for v2.5.4". The Linux
Xenix (3,131 words) [view diff] exact match in snippet view article find links to article
"Porting Xenix to the Unmapped 8086". Proceedings of the USENIX Winter Conference. Washington, D.C.: USENIX Association. "SCO Company History". Operating System
RIPE Atlas (3,447 words) [view diff] exact match in snippet view article find links to article
Over the RIPE Atlas Network". 4th USENIX Workshop on Free and Open Communications on the Internet (FOCI 14). USENIX. Archived from the original on 2024-05-20
Lisa (554 words) [view diff] exact match in snippet view article find links to article
LISA (Language for Instruction Set Architecture) LISA (organization), the USENIX special interest group for system administrators Apple Lisa computer, the
Power management (1,186 words) [view diff] exact match in snippet view article find links to article
and performance analysis of GPU-accelerated systems", Yuki Abe et al., USENIX conference on Power-Aware Computing and Systems Pages 10-10, 2012. "Design
Intelligent Platform Management Interface (2,222 words) [view diff] case mismatch in snippet view article find links to article
Issues Surrounding Lights-Out Server Management.Usenix Workshop on Offensive Technologies" (PDF). Usenix.org. Retrieved 2015-05-29. "OpenBMC Project Community
Push on green (62 words) [view diff] exact match in snippet view article find links to article
downtime. "Making "Push On Green" a Reality: Issues & Actions Involved in Maintaining a Production Service | USENIX". www.usenix.org. Retrieved 2017-08-09.
UEFITool (220 words) [view diff] exact match in snippet view article find links to article
and hardening of COTS firmware" (PDF). SEC'20: Proceedings of the 29th USENIX Conference on Security Symposium. Retrieved January 22, 2024. Matrosov,
Crypto-1 (536 words) [view diff] exact match in snippet view article find links to article
RFID tag". SS'08 Proceedings of the 17th Conference on Security Symposium. USENIX: 185–193. Garcia, Flavio D.; Gerhard de Koning Gans; Ruben Muijrers; Peter
Mirai (malware) (3,447 words) [view diff] exact match in snippet view article
Antonakakis, M., et al.: Understanding the Mirai botnet. In: 26th USENIX Security Symposium (USENIX Security 2017) (2017) Dan Goodin (December 12, 2017). "100
Evi Nemeth (1,112 words) [view diff] exact match in snippet view article find links to article
"political" layer. The design was credited to Evi Nemeth. During the Summer 1994 USENIX conference in Boston, a commemorative deck of playing cards was created
OpenKeychain (860 words) [view diff] exact match in snippet view article find links to article
Empirical Study of Textual Key-Fingerprint Representations". 25th USENIX Security Symposium (USENIX Security 16): 193–208. ISBN 978-1-931971-32-4. "BSI Study:
Popek and Goldberg virtualization requirements (1,880 words) [view diff] exact match in snippet view article find links to article
Pentium's Ability to Support a Secure Virtual Machine Monitor". Proc. 9th USENIX Security Symposium. Daniel J. Magenheimer and Thomas W. Christian (2000)
Andrew File System (1,189 words) [view diff] exact match in snippet view article find links to article
Johan Danielsson (1998). "Arla-a free AFS client". Proceedings of the 1998 USENIX, Freenix Track. CiteSeerX 10.1.1.16.1360. Magnus Ahltorp, Love Hörnquist-Åstrand
Access-control list (1,566 words) [view diff] case mismatch in snippet view article find links to article
subsystem. Grünbacher, Andreas. "POSIX Access Control Lists on Linux". Usenix. Retrieved 12 December 2019. wurtzkurdle. "Why was POSIX.1e withdrawn?"
Michael A. Bender (451 words) [view diff] case mismatch in snippet view article find links to article
Michael A. Bender at the Mathematics Genealogy Project "FAST 17". www.usenix.org. [2], ACM, retrieved 2021-12-23. "LATIN". latintcs.org. Retrieved 2021-10-08
Shred (Unix) (642 words) [view diff] exact match in snippet view article
Flash-Based Solid State Drives" (PDF). FAST'11: Proceedings of the 9th USENIX conference on File and storage technologies. Wikidata Q115346857. Retrieved
Concurrent hash table (1,777 words) [view diff] exact match in snippet view article find links to article
USENIXATC'11: Proceedings of the 2011 USENIX conference on USENIX annual technical conference. Berkeley, CA: USENIX Association. p. 11. Herlihy, Maurice;
BSD Authentication (197 words) [view diff] exact match in snippet view article find links to article
Honeyman (2003). "Preventing Privilege Escalation". Proceedings of the 12th USENIX Security Symposium. pp. 231–242. authenticate(3): simplified interface to
C file input/output (886 words) [view diff] exact match in snippet view article find links to article
Summer USENIX Conf. CiteSeerX 10.1.1.51.6574. Fowler, Glenn S.; Korn, David G.; Vo, Kiem-Phong (2000). Extended Formatting with Sfio. Proc. Summer USENIX Conf
Hertzbleed (507 words) [view diff] exact match in snippet view article find links to article
Attacks on x86". Proceedings of the 31st USENIX Security Symposium. USENIX Security 22. 43 (4). Boston, MA, USA: USENIX: 679–697. doi:10.1109/MM.2023.3274619
Concurrent hash table (1,777 words) [view diff] exact match in snippet view article find links to article
USENIXATC'11: Proceedings of the 2011 USENIX conference on USENIX annual technical conference. Berkeley, CA: USENIX Association. p. 11. Herlihy, Maurice;
K-anonymity (1,849 words) [view diff] exact match in snippet view article find links to article
Deidentification's Defenses, Aloni Cohen, USENIX Security 2022, Distinguished Paper Award Winner. https://www.usenix.org/conference/usenixsecurity22/presentation/cohen
James Mickens (701 words) [view diff] exact match in snippet view article find links to article
NSDI'16: Proceedings of the 13th Usenix Conference on Networked Systems Design and Implementation. Berkeley, California: USENIX Association: 123–136. ISBN 978-1-931971-29-4
Social VPN (683 words) [view diff] exact match in snippet view article find links to article
Names for Globally Connected Mobile Devices", in Proceedings of the 7th USENIX Symposium on Operating Systems Design and Implementation (OSDI '06), Seattle
Reynold Xin (687 words) [view diff] exact match in snippet view article find links to article
Proceedings of the 11th USENIX Conference on Operating Systems Design and Implementation. OSDI'14. Berkeley, CA, USA: USENIX Association: 599–613. ISBN 9781931971164
ATC (773 words) [view diff] exact match in snippet view article find links to article
intervention. Alternate technical concept, in engineering and construction. USENIX Annual Technical Conference, an annual peer-reviewed conference ATC, a codon
Data scrubbing (1,360 words) [view diff] exact match in snippet view article find links to article
Regained". In Mary Baker; Erik Riedel (eds.). FAST'08: Proceedings of the 6th USENIX Conference on File and Storage Technologies. Archived from the original
Zeek (645 words) [view diff] exact match in snippet view article find links to article
(1998-01-26). "Bro: A System for Detecting Network Intruders in Real-Time" (PDF). USENIX. Retrieved 2022-08-01. McCarty, Ronald. "Bro IDS » ADMIN Magazine". ADMIN
Plumber (program) (435 words) [view diff] exact match in snippet view article
portal Pipeline (software) Pike, Rob (2000). "2000 USENIX Annual Technical Conference". www.usenix.org. Retrieved 2024-04-15. plumb(1) – Plan 9 Programmer's
UnionFS (1,014 words) [view diff] exact match in snippet view article find links to article
McKusick, Marshall Kirk (January 1995). "Union Mounts in 4.4BSD-Lite". USENIX 1995 Technical Conference Proceedings. Retrieved 17 July 2017. Schwinge
Alan Emtage (740 words) [view diff] case mismatch in snippet view article find links to article
Deutsch, archie - An Electronic Directory Service for the Internet Winter Usenix Conference Proceedings 1992. Pages 93–110. Michael F. Schwartz, Alan Emtage
Pseudonym (6,436 words) [view diff] exact match in snippet view article find links to article
Archived 21 January 2021 at the Wayback Machine Proceedings of the 9th USENIX Security Symposium (Denver, Colorado, 14–17 Aug. 2000). Novak, Jasmine;
Message broker (692 words) [view diff] exact match in snippet view article find links to article
millions of users with migratorydata". Proceedings of the 18th ACM/IFIP/USENIX Middleware Conference: Industrial Track. pp. 1–7. arXiv:1712.09876. doi:10
V (operating system) (1,017 words) [view diff] exact match in snippet view article
the evolution of a distributed, object-oriented microkernel interface". USENIX Symposium on Microkernels and Other Kernel Architectures: 3. V-System 6
Chunking (computing) (276 words) [view diff] exact match in snippet view article
2019-12-10. FastCDC: a Fast and Efficient Content-Defined Chunking Approach for Data Deduplication (PDF). USENIX ATC ’16. 2016. Retrieved 2019-12-10.
Multicast (1,292 words) [view diff] exact match in snippet view article find links to article
"DCCast: Efficient Point to Multipoint Transfers Across Datacenters". USENIX. Retrieved July 26, 2017. A Discussion on Computer Network Conferencing
Use of Twitter by public figures (3,103 words) [view diff] exact match in snippet view article find links to article
ACM/IFIP/USENIX 12th International Middleware Conference, Lisbon, Portugal, December 12-16, 2011, Proceedings. Middleware 2011: Acm/Ifip/usenix 12th International
Security through obscurity (1,399 words) [view diff] case mismatch in snippet view article find links to article
(August 2023). All cops are broadcasting: TETRA under scrutiny (paper) (PDF). Usenix Security 2023. Archived (PDF) from the original on 2023-08-11. Retrieved
Justin Cappos (3,078 words) [view diff] case mismatch in snippet view article find links to article
(March 2016). Diplomat: Using Delegations to Protect Community Repositories. Usenix. pp. 567–581. ISBN 9781931971294. Li, Yiwen; Dolan-Gavitt, Brendan; Weber
Flash file system (978 words) [view diff] exact match in snippet view article find links to article
Systems – 2007-09-24 Article regarding various Flash File Systems – 2005 USENIX Annual Conference Survey of various Flash File Systems – 2005-08-10 Anatomy
Ion Stoica (1,029 words) [view diff] exact match in snippet view article find links to article
working sets. In Proceedings of the 2nd USENIX conference on Hot topics in cloud computing (HotCloud'10). USENIX Association, Berkeley, CA, USA, 10-10"
Onion routing (1,806 words) [view diff] exact match in snippet view article find links to article
(August 2004). "Tor: The Second-Generation Onion Router". San Diego, CA: USENIX Association. Retrieved 24 October 2012. Wright, Matthew. K.; Adler, Micah;
Concurrent Versions System (1,446 words) [view diff] exact match in snippet view article find links to article
Theo de Raadt (1999). "Opening The Source Repository With Anonymous CVS, USENIX 1999" (PDF). Archived (PDF) from the original on 2022-10-09. Collins-Sussman
Opa (programming language) (764 words) [view diff] exact match in snippet view article
Integrity Through Strong Typing". SSYM'09 Proceedings of the 18th Conference on USENIX Security Symposium.[permanent dead link] "OPA: Language Support for a Sane
Kimberly Keeton (304 words) [view diff] case mismatch in snippet view article find links to article
automated design of disaster-resistant enterprise storage systems won the Usenix FAST Test of Time Award in 2018. She also won the 2018 SIGMOD best paper
Agrep (316 words) [view diff] exact match in snippet view article find links to article
January 1992). Agrep -- a fast approximate pattern-matching tool. 1992 Winter USENIX Conference. San Francisco, California. CiteSeerX 10.1.1.89.5424. WebGlimpse
65,536 (634 words) [view diff] case mismatch in snippet view article find links to article
Purpose Operating System Support for Multiple Page Sizes" (PDF). static.usenix.org. Retrieved 2012-11-02. Microsoft Help Q120596 "Enable multidex for apps
Relationship-based access control (528 words) [view diff] exact match in snippet view article find links to article
Google's Consistent, Global Authorization System". 2019 USENIX Annual Technical Conference (USENIX ATC '19). Renton, WA. Gates, Carrie (2007). "Access control
Pale Moon (1,422 words) [view diff] exact match in snippet view article find links to article
Breakdown: Security Analysis of Browsers Extension Resources Control Policies", USENIX Security Symposium (26): 680–682, ISBN 978-1-931971-40-9 "Avoid The Hack:
Douglas C. Schmidt (813 words) [view diff] exact match in snippet view article find links to article
(Editor), Douglas Schmidt (Editor) (August 2003). Middleware 2003: ACM/IFIP/USENIX International Middleware Conference, Rio de Janeiro, Brazil, June 16–20
Tempest (codename) (4,229 words) [view diff] exact match in snippet view article
Exfiltration from Air-Gapped Computers over GSM Frequencies". 24th USENIX Security Symposium (USENIX Security 15): 849–864. ISBN 9781939133113. Video on YouTube
Device fingerprint (3,692 words) [view diff] exact match in snippet view article find links to article
Browsers Extension Resources Control Policies. 26th USENIX Security Symposium. Vancouver BC Canada: USENIX Association. pp. 679–694. ISBN 978-1-931971-40-9
Mustafa Al-Bassam (1,246 words) [view diff] exact match in snippet view article find links to article
Al-Bassam, and George Danezis. "The road to scalable blockchain designs." USENIX; login: magazine (2017). "Cyber defence unit 'may use hackers'". 22 October
List of important publications in computer science (5,931 words) [view diff] exact match in snippet view article find links to article
Barrera, Hideyuki Tokuda, Gerald Malan, David Bohman Proceedings of the USENIX Workshop on Microkernels and Other Kernel Architectures, pages 11–30, April
Immobiliser (1,199 words) [view diff] exact match in snippet view article find links to article
Megamos Crypto: Wirelessly Lockpicking a Vehicle Immobilizer" (PDF). 22nd USENIX Security Symposium. Retrieved 28 August 2023. "Hacking of an immobiliser"
Cygwin (1,620 words) [view diff] exact match in snippet view article find links to article
10, 2020. "Cygwin32: A Free Win32 Porting Layer for UNIX Applications". USENIX. August 3, 1998. Archived from the original on January 11, 2020. Retrieved
FileVault (1,537 words) [view diff] exact match in snippet view article find links to article
2008). Lest We Remember: Cold Boot Attacks on Encryption Keys (PDF). 17th USENIX Security Symposium. San Jose, CA. Zdziarski, Jonathan (January 1, 2008)
Kimberly Keeton (304 words) [view diff] case mismatch in snippet view article find links to article
automated design of disaster-resistant enterprise storage systems won the Usenix FAST Test of Time Award in 2018. She also won the 2018 SIGMOD best paper
Dynamic frequency scaling (1,459 words) [view diff] case mismatch in snippet view article find links to article
February 2014). "Why has CPU frequency ceased to grow?". Intel. https://www.usenix.org/legacy/events/hotpower/tech/full_papers/LeSueur.pdf [bare URL PDF] Karel
Racket (programming language) (3,205 words) [view diff] exact match in snippet view article
Written at Santa Fe, NM. Proceedings of the USENIX Symposium on Very High Level Languages. Berkeley, CA: USENIX Association. pp. 7–19. ISBN 978-1880446652
Mosharaf Chowdhury (397 words) [view diff] exact match in snippet view article find links to article
working sets". Proceedings of the 2nd USENIX Conference on Hot Topics in Cloud Computing. HotCloud'10. USA: USENIX Association. Gu, Juncheng; Lee, Youngmoon;
Genode (1,230 words) [view diff] exact match in snippet view article find links to article
execution environment" (PDF). "Embassies: Radically Refactoring the Web" (PDF). USENIX. Wegner, Martin; Holthusen, Sönke (2014-12-11). "Contract Specification
TreadMarks (92 words) [view diff] exact match in snippet view article find links to article
Distributed shared memory on standard workstations and operating systems". USENIX Winter. 1994: 23–36. Retrieved 23 February 2016. Amza, C.; Cox, A.L.; Dwarkadas
Differential testing (1,104 words) [view diff] exact match in snippet view article find links to article
detection and fingerprint generation,” in 16th USENIX Security Symposium (USENIX Security ’07). USENIX Association, 2007. J. C. King, “Symbolic execution
TCP congestion control (5,734 words) [view diff] exact match in snippet view article find links to article
Assisted TCP at Mobile Edge". 2nd USENIX Workshop on Hot Topics in Edge Computing (HotEdge 19). Renton, WA: USENIX Association. Afanasyev, A.; N. Tilley;
Nix (package manager) (1,039 words) [view diff] exact match in snippet view article
System for Software Deployment" (PDF). LISA '04: Proceedings of the 18th USENIX Conference on System Administration. pp. 79–92. Retrieved 11 July 2023.
Data integrity (2,236 words) [view diff] exact match in snippet view article find links to article
"End-to-end data integrity for file systems: a ZFS case study" (PDF). USENIX Conference on File and Storage Technologies. CiteSeerX 10.1.1.154.3979.
Data Protection API (887 words) [view diff] case mismatch in snippet view article find links to article
"Recovering Windows secrets and EFS certificates offline". WoOT 2010. Usenix. "Windows Password Recovery – DPAPI Master Key analysis". Passcape.com.
Emin Gün Sirer (1,058 words) [view diff] exact match in snippet view article find links to article
protocol". Proceedings of the 13th Usenix Conference on Networked Systems Design and Implementation. NSDI'16. USA: USENIX Association: 45–59. ISBN 978-1-931971-29-4
CRM114 (program) (697 words) [view diff] case mismatch in snippet view article
"Measurement and Classification of Humans and Bots in Internet Chat". Usenix. Retrieved 2023-01-16. Scovel III, Calvin L. (2015-06-18). Inadequate Data
HTML (9,526 words) [view diff] exact match in snippet view article find links to article
(1998). "Weblint: just another perl hack" (PDF). 1998 USENIX Annual Technical Conference (USENIX ATC 98). Lie, Håkon Wium; Bos, Bert (April 1997). Cascading
Zcash (1,329 words) [view diff] case mismatch in snippet view article find links to article
"questionable". The paper claimed that, since the current heuristics from a 2018 Usenix Security Symposium paper entitled "An Empirical Analysis of Anonymity in
Abstract syntax (467 words) [view diff] exact match in snippet view article find links to article
Domain-Specific Languages on Conference on Domain-Specific Languages (DSL), 1997. USENIX Association. 15 October 1997. p. 18. Pfenning, F.; Elliott, C. (1988-06-01)
Server (computing) (2,282 words) [view diff] case mismatch in snippet view article
Evaluation of Memory Hardware Errors and Software System Susceptibility". Usenix Annual Tech Conference 2010" (PDF). Archived (PDF) from the original on
Windows NT 4.0 (3,836 words) [view diff] exact match in snippet view article find links to article
"Distributed Preemptive Scheduling on Windows NT". 2nd USENIX Windows NT Symposium. USENIX. Archived from the original on June 20, 2010. Retrieved September
UWIN (546 words) [view diff] exact match in snippet view article find links to article
AST and UWIN software David G. Korn (1997) Porting UNIX to Windows NT, USENIX Annual Technical Conference Korn, David G.; Fowler, Glenn S. "UWIN Overview"
Over-the-air rekeying (1,310 words) [view diff] exact match in snippet view article find links to article
Analysis of the APCO Project 25 Two-Way Radio System (PDF). 20th USENIX Security Symposium. USENIX Association. https://www.hsdl.org/?view&did=455597 Saving
Elvis (text editor) (1,341 words) [view diff] exact match in snippet view article
"Multilingual vi Clones: Past, Now and the Future". 1999 USENIX Annual Technical Conference. USENIX. "FreshPorts description of helvis". "README file for
Sun WorkShop TeamWare (491 words) [view diff] exact match in snippet view article find links to article
Microsystems. Archived from the original on 2005-03-11. "The Old Man and the C". USENIX ASSOCIATION. Retrieved 2008-03-19. US 5481722, Glenn Skinner, "Method and
Martin Michlmayr (501 words) [view diff] exact match in snippet view article find links to article
Volunteer Activity in Free Software Projects". Proceedings of the 2004 USENIX Annual Technical Conference, Freenix Track: 93–102. "Platform for Martin
Dining cryptographers problem (2,131 words) [view diff] exact match in snippet view article find links to article
(October 8–10, 2012). Dissent in Numbers: Making Strong Anonymity Scale. 10th USENIX Symposium on Operating Systems Design and Implementation (OSDI). Hollywood
Feistel cipher (1,316 words) [view diff] exact match in snippet view article find links to article
Analysis of a Cryptographically-Enabled RFID Device" (PDF). Proceedings of the USENIX Security Symposium. Retrieved 2017-11-21. Morris, Ben; Rogaway, Phillip;
Domain generation algorithm (1,124 words) [view diff] exact match in snippet view article find links to article
Comprehensive Measurement Study of Domain Generating Malware" (PDF). 25th USENIX Security Symposium: 263–278. Shateel A. Chowdhury, "DOMAIN GENERATION ALGORITHM
A/B testing (3,019 words) [view diff] case mismatch in snippet view article find links to article
ISBN 978-1-118-65920-5. Szucs, Sandor (2018). "Modern HTTP Routing" (PDF). Usenix.org. "Advanced A/B Testing Tactics That You Should Know | Testing & Usability"
Out-of-order delivery (179 words) [view diff] case mismatch in snippet view article find links to article
http://www-iepm.slac.stanford.edu/monitoring/reorder/ https://www.usenix.org/conference/nsdi12/minion-unordered-delivery-wire-compatible-tcp-and-tls
Reverse engineering (6,896 words) [view diff] exact match in snippet view article find links to article
engineering from network traces. In Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium, pp. 1–14. W. Cui, M. Peinado, K. Chen
CSNET (1,154 words) [view diff] exact match in snippet view article find links to article
"Implementation of Dial-up IP for UNIX Systems". Proceedings of the 1989 Winter USENIX Technical Conference. Larry Landweber; Michael Litzkow; D. Neuhengen; Marvin
Rob Pike (570 words) [view diff] exact match in snippet view article find links to article
(7): 649–659. Pike, Rob; Presotto, Dave Lee (June 1985). Face the Nation. USENIX Summer Conference Proceedings. Portland, OR, USA. McIlroy, M. D. (1987)
Feistel cipher (1,316 words) [view diff] exact match in snippet view article find links to article
Analysis of a Cryptographically-Enabled RFID Device" (PDF). Proceedings of the USENIX Security Symposium. Retrieved 2017-11-21. Morris, Ben; Rogaway, Phillip;
Resource Public Key Infrastructure (1,675 words) [view diff] exact match in snippet view article find links to article
RPKI-based Prefix Origin Validation, Proc. of USENIX Security Workshop CSET'13, Berkeley, CA, USA:USENIX Assoc., 2013. Tool provided by Cloudflare to test
Authenticated encryption (2,085 words) [view diff] exact match in snippet view article find links to article
to Abuse and Fix Authenticated Encryption Without Key Commitment" (PDF). USENIX. Bellare, Mihir; Hoang, Viet Tung (2022). "Efficient Schemes for Committing
Virtual machine (2,755 words) [view diff] exact match in snippet view article find links to article
Machine Research and Technology Symposium. Vol. 1. Monterey, California: USENIX Association. Uhlig, Rich; Neiger, Gil; Rodgers, Dion; Santoni, Amy L.; Martins
Trusted Platform Module (6,479 words) [view diff] exact match in snippet view article find links to article
Platform Module While You Are Sleeping (PDF). 27th USENIX Security Symposium. Baltimore, MD, USA: USENIX Association. ISBN 9781939133045. Archived (PDF)
Martin Farach-Colton (917 words) [view diff] case mismatch in snippet view article find links to article
Luca (ed.), "Turing Centennial Post 5: Martin Farach-Colton", in theory. Usenix FAST Martin Farach-Colton at the Mathematics Genealogy Project "Alumni Hall
Database transaction (1,550 words) [view diff] case mismatch in snippet view article find links to article
"MSDN Library". 4 February 2013. Retrieved 16 October 2014. https://www.usenix.org/system/files/conference/nsdi16/nsdi16-paper-escriva.pdf [bare URL PDF]
Tiger (security software) (771 words) [view diff] exact match in snippet view article
to get it down to their machines. The tool was presented in the Fourth USENIX Security Symposium. It was written at the same time that other auditing
RAID (7,010 words) [view diff] case mismatch in snippet view article find links to article
Veera (2011). "General Parallel File System (GPFS) Native RAID" (PDF). UseNix.org. IBM. Retrieved 2014-09-28. "Btrfs Wiki: Feature List". 2012-11-07.
David J. Brown (computer scientist) (733 words) [view diff] case mismatch in snippet view article
2000). "Library Interface Versioning in Solaris and Linux". Proceedings of Usenix. Atlanta, Georgia: 153–162. Retrieved October 29, 2021. David J. Brown;
Virtualization (2,923 words) [view diff] case mismatch in snippet view article find links to article
Turtles Project: Design and Implementation of Nested Virtualization" (PDF). usenix.org. Retrieved 2014-12-16. Alex Fishman; Mike Rapoport; Evgeny Budilovsky;
X.desktop (600 words) [view diff] exact match in snippet view article find links to article
Retrospective View". UNIX'94: Proceedings of the USENIX Applications Development Symposium. USENIX. pp. 171–176. Retrieved 14 August 2021. "Software
Search engine indexing (4,766 words) [view diff] case mismatch in snippet view article find links to article
"Archie--An Electronic Directory Service for the Internet." Proc. Usenix Winter 1992 Tech. Conf., Usenix Assoc., Berkeley, Calif., 1992, pp. 93–110. M. Gray, World
Dave Taht (818 words) [view diff] exact match in snippet view article find links to article
and Airtime Fairness in WiFi". Proceedings of the 2017 USENIX Annual Technical Conference. USENIX ATC '17 July 12–14, 2017, Santa Clara, CA, USA. pp. 139–151
Richard Vuduc (968 words) [view diff] exact match in snippet view article find links to article
Acceleration". Proceedings of the 2nd USENIX Conference on Hot Topics in Parallelism. HotPar'10. Berkeley, CA, USA: USENIX Association. p. 13. Vuduc, Richard
TCP/IP stack fingerprinting (528 words) [view diff] case mismatch in snippet view article find links to article
numeric names: authors list (link) "Defeating TCP/IP stack fingerprinting". Usenix.org. 2002-01-29. Retrieved 2011-11-25. "Zardaxt.py". Github. 2021-11-25
Man-in-the-middle attack (2,370 words) [view diff] exact match in snippet view article find links to article
STARTTLS: A Security Analysis of STARTTLS in the Email Context (PDF). 30th USENIX Security Symposium. p. 4366. ISBN 978-1-939133-24-3. When a Meddler-in-the-Middle
LIRS caching algorithm (889 words) [view diff] exact match in snippet view article find links to article
Improvement of the CLOCK Replacement", in Proceedings of 2005 USENIX Annual Technical Conference (USENIX'05), Anaheim, CA, April, 2005. FreeBSD/Linux Kernel Cross
Contiki (1,365 words) [view diff] case mismatch in snippet view article find links to article
2003), "Full TCP/IP for 8 Bit Architectures", Proceedings of the First ACM/Usenix International Conference on Mobile Systems, Applications and Services (MobiSys)
Publius (publishing system) (653 words) [view diff] exact match in snippet view article
robust, tamper-evident, censorship-resistant, web publishing system. 9th USENIX Security Symposium. Session Chair: Ian Goldberg. "New software promotes
The World (Internet service provider) (463 words) [view diff] exact match in snippet view article
original on 2016-03-04. Retrieved 2012-08-17. Official The World website 1999 USENIX article: "The first ISP" — on the beginning of The World, by Spike Ilacqua
Michael Hawley (1,084 words) [view diff] case mismatch in snippet view article find links to article
Laboratory. Musical work from this period appeared on a CD, Computing Systems Usenix Music, distributed as a supplement to the journal Computing Systems. Michael's
Attack vector (290 words) [view diff] case mismatch in snippet view article find links to article
McNamee, Dean. "The Ghost In The Browser Analysis of Web-based Malware" (PDF) – via UseNix. {{cite journal}}: Cite journal requires |journal= (help) v t e
The Update Framework (1,503 words) [view diff] case mismatch in snippet view article find links to article
(March 2016). Diplomat: Using Delegations to Protect Community Repositories. Usenix. pp. 567–581. "FoundriesFactory TUF Keys Rotation". foundries.io. 2020-03-05
Hard disk drive failure (3,958 words) [view diff] exact match in snippet view article find links to article
(February 2007). Failure Trends in a Large Disk Drive Population (PDF). 5th USENIX Conference on File and Storage Technologies (FAST 2007). Retrieved 15 September
Stack machine (5,809 words) [view diff] exact match in snippet view article find links to article
"Virtual machine showdown: Stack versus registers". Proceedings of the 1st ACM/USENIX international conference on Virtual execution environments. pp. 153–163
Timing attack (1,524 words) [view diff] exact match in snippet view article find links to article
2021. David Brumley and Dan Boneh. Remote timing attacks are practical. USENIX Security Symposium, August 2003. See Percival, Colin, Cache Missing for
Unix File System (1,941 words) [view diff] exact match in snippet view article find links to article
Writes in the Fast Filesystem" (PDF). Proceedings of the FREENIX Track: 1999 USENIX Annual Technical Conference. pp. 1–18. Retrieved 2013-04-08. Marshall Kirk
COPS (software) (252 words) [view diff] case mismatch in snippet view article
to find systems which are set up in an insecure manner that COPS will identify. COPS README.1 file COPS Citeseer entry for the COPS Usenix paper v t e
DRE-i with enhanced privacy (1,585 words) [view diff] exact match in snippet view article find links to article
poll station auditing". Proceedings of the USENIX Workshop on Accurate Electronic Voting Technology. USENIX Association: 14. Rivest, Ronald L (28 October
Turtle F2F (349 words) [view diff] case mismatch in snippet view article find links to article
Team-Up and Beat the System" "Turtle: Safe and Private Data Sharing" from Usenix 2005 conference Turtle is also cited by this article [1][permanent dead
Michael Burrows (715 words) [view diff] exact match in snippet view article find links to article
"The Chubby lock service for loosely-coupled distributed systems". 7th USENIX Symposium on Operating Systems Design and Implementation (OSDI). "Winner
Progress Chef (1,322 words) [view diff] case mismatch in snippet view article find links to article
"Getting Started with Configuration Management" (PDF), ;login:, 36 (2), Usenix, retrieved 2015-07-04 Keiser, John (14 November 2016). "Chef Provisioning:
List of numerical-analysis software (2,457 words) [view diff] exact match in snippet view article find links to article
Media, Inc.". Van Rossum, G. (2007, June). Python Programming Language. In USENIX annual technical conference (Vol. 41, p. 36). Sanner, M. F. (1999). Python:
Libwww (1,999 words) [view diff] exact match in snippet view article find links to article
(10–13 July 1996). SurfIt! – A WWW Browser (PostScript). Monterey, CA: USENIX. Retrieved 28 November 2010. {{cite book}}: |work= ignored (help) Wang,
UNIX Review (349 words) [view diff] case mismatch in snippet view article find links to article
– via WorldCat. "Performance Computing (was Unix Review) closing down". Usenix. January 12, 2000. Retrieved January 10, 2017. Stan Kelly-Bootle. "Stan
Library (computing) (3,103 words) [view diff] exact match in snippet view article
Babu, Sridivya; Udupa, Sharath K. (2003). SLINKY: Static Linking Reloaded. USENIX '05. Department of Computer Science, University of Arizona. Archived from
Pepper (cryptography) (1,061 words) [view diff] exact match in snippet view article
John (2005). "Stronger Password Authentication Using Browser Extensions". USENIX Security Symposium: 17–32. Retrieved 2020-11-11. Lars Schoening (January
Release consistency (1,358 words) [view diff] exact match in snippet view article find links to article
Zwaenepoel published in WTEC'94 Proceedings of the USENIX Winter 1994 Technical Conference on USENIX Winter 1994 Technical Conference Culler, David; Gupta
Memory-mapped file (1,949 words) [view diff] exact match in snippet view article find links to article
Angelos (2020). Optimizing Memory-mapped I/O for Fast Storage Devices. USENIX ATC '20. pp. 813–827. "Demand Paging" Memory Mapped Files Archived 9 February
SipHash (1,298 words) [view diff] case mismatch in snippet view article find links to article
S. (2003-08-06). Denial of Service via Algorithmic Complexity Attacks. Usenix Security Symposium. Washington, D.C. Aumasson, Jean-Philippe (veorq) (Nov
Phil Foglio (1,711 words) [view diff] exact match in snippet view article find links to article
December 4, 2008. McKusick, Marshall Kirk. "History of the BSD Daemon: USENIX". Retrieved December 4, 2008. "List of Magic the Gathering cards illustrated
Paravirtualization (1,036 words) [view diff] exact match in snippet view article find links to article
paravirtualized guest on IBM pSeries (RS/6000) and iSeries (AS/400) hardware. At the USENIX conference in 2006 in Boston, Massachusetts, a number of Linux development
Google Native Client (2,346 words) [view diff] exact match in snippet view article find links to article
"Adapting Software Fault Isolation to Contemporary CPU Architectures". 19th USENIX Security Symposium. Retrieved 31 July 2011. Yee, Bennet; Sehr, David; Dardyk
UNIX Review (349 words) [view diff] case mismatch in snippet view article find links to article
– via WorldCat. "Performance Computing (was Unix Review) closing down". Usenix. January 12, 2000. Retrieved January 10, 2017. Stan Kelly-Bootle. "Stan
TensorFlow (3,343 words) [view diff] exact match in snippet view article find links to article
System for Large-Scale Machine Learning (PDF). Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI ’16). arXiv:1605
Chosen-ciphertext attack (1,105 words) [view diff] case mismatch in snippet view article find links to article
on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage (Usenix 2016) Luby, Michael (1996). Pseudorandomness and Cryptographic Applications
GNU Guix (1,656 words) [view diff] exact match in snippet view article find links to article
Administration Conference (LISA '04), pages 79–92, Atlanta, Georgia, USA. USENIX, November 2004. Dolstra, E. The Purely Functional Software Deployment Model
PurifyPlus (639 words) [view diff] case mismatch in snippet view article find links to article
detection of memory leaks and access errors. by Reed Hastings and Bob Joyce, Usenix Winter 1992 technical conference. "A Survey of Systems for Detecting Serial
Reliable multicast (1,305 words) [view diff] exact match in snippet view article find links to article
"DCCast: Efficient Point to Multipoint Transfers Across Datacenters". USENIX. Retrieved July 26, 2017. M. Noormohammadpour; et al. (2018). "QuickCast:
Software widget (1,640 words) [view diff] exact match in snippet view article find links to article
Toolkit: More Bricks for Building User-Interfaces, or, Widgets for Hire". USENIX Winter. pp. 221–228. Archived from the original on 2007-09-27. Retrieved
Escape analysis (1,024 words) [view diff] exact match in snippet view article find links to article
dynamic compilation and deoptimization,” in Proceedings of the 1st ACM/USENIX international conference on Virtual execution environments, New York, NY
Kai Li (821 words) [view diff] exact match in snippet view article find links to article
Longuet-Higgins Prize (Retrospective Most Impactful Paper from CVPR 2009). 2020 USENIX FAST Test-of-time award. 2021 Test-of-time award in 50 years of ICPP. 1998
DNS rebinding (698 words) [view diff] case mismatch in snippet view article find links to article
Retrieved 2018-12-10. "FireDrill: Interactive DNS Rebinding" (PDF). www.usenix.org. Retrieved 2018-12-10. Protecting Browsers from DNS Rebinding Attacks
Hubert Zimmermann (598 words) [view diff] exact match in snippet view article find links to article
W. Neuhauser (Fall 1988). "CHORUS Distributed Operating Systems" (PDF). USENIX Computing Systems: 305–370. "Hubert Zimmermann nous a quittés!". Alumni
OSv (272 words) [view diff] exact match in snippet view article find links to article
OSv—Optimizing the Operating System for Virtual Machines—paper presented at the USENIX Annual Technical Conference in 2014 Original announcement Free and open-source
FLAIM (920 words) [view diff] exact match in snippet view article find links to article
Multi-level Anonymization Framework for Computer and Network Logs," 20th USENIX Large Installation System Administration Conference (LISA '06), Washington
Keith Marzullo (861 words) [view diff] exact match in snippet view article find links to article
interception. Proceedings of the Fifth USENIX Conference on Object-Oriented Technologies and Systems (COOTS'99). USENIX Assoc. 1999, pp. 57–67. Berkeley, CA
Ian Goldberg (824 words) [view diff] exact match in snippet view article find links to article
the "Wired 25". In 2011 he won the EFF Pioneer Award. In 2019, he won the USENIX Security Test of Time Award along with his colleagues David Wagner and Randi
Clickbot.A (175 words) [view diff] exact match in snippet view article find links to article
Google Click Quality and Security Teams (2007). "The Anatomy of Clickbot.A". USENIX Hotbots. Google, Inc. {{cite journal}}: |last3= has generic name (help)
Graphical widget (2,111 words) [view diff] exact match in snippet view article find links to article
Toolkit: More Bricks for Building User-Interfaces –or– Widgets for Hire". USENIX Winter. pp. 221–228. Retrieved 2022-11-20. "What is widget? - Definition
Extension Language Kit (170 words) [view diff] exact match in snippet view article find links to article
Laumann and Carsten Bormann (1994). "Elk: The Extension Language Kit". USENIX Computing Systems. 7 (4). Elk home page Elk Scheme Extensions for Multimedia
Dmitry Khovratovich (1,347 words) [view diff] exact match in snippet view article find links to article
deanonymisation of clients in the Bitcoin P2P network Egalitarian computing, USENIX 2016, with Alex Biryukov Argon2: new generation of memory-hard functions
X.500 (2,133 words) [view diff] exact match in snippet view article find links to article
Authentication with Multi-Path Probing" (PDF). Proceedings of the 2008 USENIX Annual Technical Conference: 321–334. "Certificate Transparency". www
Head-of-line blocking (1,113 words) [view diff] exact match in snippet view article find links to article
David; Ford, Bryan (2013). Reducing Latency in Tor Circuits with Unordered Delivery. 3rd USENIX Workshop on Free and Open Communications on the Internet.
Clustered file system (1,744 words) [view diff] exact match in snippet view article find links to article
Design, Implementation and Experience" (PDF). Proceedings of the Summer 1986 USENIX Technical Conference and Exhibition. Sun Microsystems, Inc. Retrieved 6
Software-defined networking (6,131 words) [view diff] exact match in snippet view article find links to article
Control Platform for Large scale Production Networks" (PDF). Proceedings USENIX, Ser. OSDI'10. Vancouver, Canada. Tuncer, Daphne; Charalambides, Marinos;
NTFS reparse point (2,250 words) [view diff] exact match in snippet view article find links to article
2000). Single Instance Storage in Windows 2000 (PDF). Proceedings of 4th USENIX Windows Systems Symposium. Seattle, Washington: Microsoft Research and Balder
Private information retrieval (2,183 words) [view diff] exact match in snippet view article find links to article
and Nadia Heninger, Optimally Robust Private Information Retrieval, 21st USENIX Security Symposium, August 2012. [AG 2007] C. Aguilar-Melchor and P. Gaborit
Keystroke inference attack (587 words) [view diff] exact match in snippet view article find links to article
keyboards". Proceedings of the 18th conference on USENIX security symposium. SSYM'09. USA: USENIX Association: 1–16. "Secrecy Is an Illusion". Computerworld
Algorithmic complexity attack (264 words) [view diff] exact match in snippet view article find links to article
of Service via Algorithmic Complexity Attacks". Proceedings of the 12th USENIX Security Symposium. "Regular expression Denial of Service - ReDoS | OWASP
Adaptive replacement cache (864 words) [view diff] case mismatch in snippet view article find links to article
Clock with Adaptive Replacement LIRS caching algorithm One Up on LRU, Usenix :login; August 2003 Nimrod Megiddo and Dharmendra Modha, 2010-03-09 archive
Alexander Sotirov (372 words) [view diff] exact match in snippet view article find links to article
Archived from the original on 2 January 2009. Retrieved 2009-01-02. "2nd USENIX Workshop on Offensive Technologies (WOOT '08)". Archived from the original
Urs Hölzle (2,763 words) [view diff] exact match in snippet view article find links to article
Luiz André (2007). "Failure Trends in a Large Disk Drive Population". 5th USENIX Conference on File and Storage Technologies (FAST 2007): 17–29. Hölzle,
Memcached (1,940 words) [view diff] exact match in snippet view article find links to article
Facebook.com. 2008-12-12. Retrieved 2017-06-25. Scaling Memcache at Facebook. USENIX. 2002. ISBN 9781931971003. Retrieved 2017-06-25. "Building Pinterest in
Apple M1 (3,169 words) [view diff] exact match in snippet view article find links to article
Fletcher and David Kohlbrenner and Riccardo Paccagnella and Daniel Genkin. USENIX Security 2024. "Apple M1 Chip: Everything You Need to Know". MacRumors.
List of log-structured file systems (678 words) [view diff] case mismatch in snippet view article find links to article
(June 1990) - "The LFS Storage Manager". Proceedings of the 1990 Summer Usenix. pp315-324. Rosenblum, Mendel and Ousterhout, John K. (February 1992) -
Service Management Facility (701 words) [view diff] exact match in snippet view article find links to article
LISA '05: Nineteenth Systems Administration Conference, (San Diego, CA: USENIX Association, December 2005), 226-235. Nicholas A. Solter, Jerry Jelinek
TCP Wrappers (501 words) [view diff] exact match in snippet view article find links to article
Network monitoring, access control, and booby traps. by Wietse Venema (USENIX UNIX Security Symposium III, 1992) GNU/Linux Ping Daemon by route|daemon9
Steve Blank (3,024 words) [view diff] exact match in snippet view article find links to article
Proceedings of the 12th USENIX Conference on Cyber Security Experimentation and Test. CSET'19. Santa Clara, CA, USA: USENIX Association: 7. "INNOVATION
RPM Package Manager (2,340 words) [view diff] exact match in snippet view article find links to article
2019-02-11. Retrieved 2010-11-22. "An Analysis of RPM Validation Drift" (PDF). USENIX Association. Archived (PDF) from the original on 2011-07-28. Retrieved 2011-03-15
Quotient filter (2,664 words) [view diff] exact match in snippet view article find links to article
thrash: how to cache your hash on flash" (PDF). Proceedings of the 3rd USENIX conference on Hot topics in storage and file systems (HotStorage'11). Retrieved
Evasion (network security) (523 words) [view diff] case mismatch in snippet view article
detection: evasion, traffic normalization, and end-to-end protocol semantics, Usenix Security Symposium, 2001. "Advanced Network Based IPS Evasion Techniques"
TCP Wrappers (501 words) [view diff] exact match in snippet view article find links to article
Network monitoring, access control, and booby traps. by Wietse Venema (USENIX UNIX Security Symposium III, 1992) GNU/Linux Ping Daemon by route|daemon9
Turing completeness (3,163 words) [view diff] exact match in snippet view article find links to article
on the effectiveness of control-flow integrity". Proceedings of the 24th USENIX Conference on Security Symposium. pp. 161–176. ISBN 9781931971232. Dabler
Honeypot (computing) (3,201 words) [view diff] exact match in snippet view article
Manager's Guide to Honeypots". Provos, N. "A Virtual Honeypot Framework". USENIX. Retrieved 29 April 2023. Mairh, A; Barik, D; Verma, K; Jena, D (2011).
Runbook (727 words) [view diff] exact match in snippet view article find links to article
2007. Mark C. Langston; Hal Skelly (2003). Documentation Writing for System Administrators. SAGE Short Topics in System Administration. USENIX. p. 61.
Larry McVoy (472 words) [view diff] exact match in snippet view article find links to article
Extent-like Performance from a UNIX File System. Proceedings of the 1991 Winter USENIX Conference. pp. 33–44. CiteSeerX 10.1.1.160.2196. "Don't Blame Scott". Forbes
Simple public-key infrastructure (526 words) [view diff] exact match in snippet view article find links to article
(1996). "Establishing Identity Without Certification Authorities". 6th USENIX Security Symposium. CiteSeerX 10.1.1.31.7263. SPKI homepage, JSDSI (open
All-or-nothing transform (627 words) [view diff] case mismatch in snippet view article find links to article
AONT-RS: Blending Security and Performance in Dispersed Storage Systems (PDF). Usenix FAST'11. Staple, an open-source prototype All-or-nothing transform implementation
NetCache (570 words) [view diff] case mismatch in snippet view article find links to article
2005. C6200 - High Performance device. Phased out in 2005. "Brian Wink". Usenix.org. Retrieved 2012-08-07. "NetCache Technical Paper". Retrieved 2009-05-05
Geotagging (2,545 words) [view diff] case mismatch in snippet view article find links to article
"Cybercasing the Joint: On the Privacy Implications of Geo-Tagging", 5th Usenix Hot Topics in Security Workshop (HotSec2010), Washington DC, August 2010"
Combinatorial auction (1,057 words) [view diff] exact match in snippet view article find links to article
Manager: Market Middleware for Large-Scale Electronic Commerce" (PDF). USENIX Workshop on Electronic Commerce. Al Shaqsi, Salim (2018). "Combinatorial
Chaos engineering (1,723 words) [view diff] case mismatch in snippet view article find links to article
Krishnan, Kripa (8–13 November 2015). 10 Years of Crashing Google (html). 2015 Usenix LISA. Washington DC. Retrieved 25 February 2024. Beyer, Betsy; Jones, Chris
George Varghese (1,005 words) [view diff] exact match in snippet view article find links to article
Stefan Savage, Automated Worm Fingerprinting, Proceedings of the 6th ACM/USENIX Symposium on Operating Systems Design and Implementation (OSDI). This paper
Append-only (759 words) [view diff] exact match in snippet view article find links to article
Robert; T'so, Theodore (2016). "Disks for Data Centers". Proceedings of USENIX FAST 2016. Because of the write restrictions imposed by SMR, when data is
Exit scam (1,065 words) [view diff] exact match in snippet view article find links to article
Ethereum and in the Binance Smart Chain (BNB}" (PDF). 32nd USENIX Security Symposium (USENIX Security 23). Stone, Jeff (2015-03-23). "Evolution Downfall:
Ext2 (2,630 words) [view diff] exact match in snippet view article find links to article
Tweedie (June 2002). "Planned Extensions to the Linux Ext2/Ext3 Filesystem". USENIX 2002 Annual Technical Conference. Larry Ayers (June 1997). "E2compr: Transparent
OS-level virtualization (2,249 words) [view diff] case mismatch in snippet view article find links to article
2014-01-15. "Implementing a clonable network stack in the FreeBSD kernel" (PDF). usenix.org. 2003-06-13. "VPS for FreeBSD". Retrieved 2016-02-20. "[Announcement]
Invisible ink (3,210 words) [view diff] exact match in snippet view article find links to article
Election Systems using Invisible Ink Confirmation Codes". Proceedings of USENIX/ACCURATE EVT. Archived from the original on 2008-12-03. Rigden, Denis (2001)
Darrell Long (1,391 words) [view diff] exact match in snippet view article find links to article
"Ceph: a scalable, high-performance distributed file system", Proc. 7th USENIX Symp. Operating Systems Design and Implementation (PDF), pp. 307–320, archived
Traffic analysis (2,409 words) [view diff] exact match in snippet view article find links to article
(2001). "Timing Analysis of Keystrokes and Timing Attacks on SSH". 10th USENIX Security Symposium. {{cite journal}}: Cite journal requires |journal= (help)
The Machine (computer architecture) (2,023 words) [view diff] exact match in snippet view article
1145/3064176.3064204. ISBN 978-1-4503-4938-3. "Memory-Driven Computing | USENIX". www.usenix.org. Retrieved 2023-01-04. Chakrabarti, Dhruva R.; Boehm, Hans-J
Glyph Lefkowitz (328 words) [view diff] exact match in snippet view article find links to article
Shtull-Trauring, Itamar. "Network Programming for the Rest of Us". Proceedings of USENIX 2003: 77–90. Retrieved 28 October 2017. "PEP 3156 -- Asynchronous IO Support
Henry Spencer (939 words) [view diff] exact match in snippet view article find links to article
"#ifdef Considered Harmful, or Portability Experience With C News" (PDF). USENIX ’92 Proceedings. pp. 185–197. — A paper he wrote with Geoff Collyer about
Dell EMC Data Domain (1,344 words) [view diff] exact match in snippet view article find links to article
Disk Bottleneck in the Data Domain Deduplication File System (PDF). 6th USENIX Conference on File and Storage Technologies, FAST 2008. San Jose, California
Data engineering (1,876 words) [view diff] exact match in snippet view article find links to article
Xiaoqiang (2016). "TensorFlow: A system for large-scale machine learning". 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16). pp. 265–283
Uncontrolled format string (1,327 words) [view diff] exact match in snippet view article find links to article
From printf Format String Vulnerabilities (PDF). Proceedings of the 10th USENIX Security Symposium. Cowan, Crispin (January–February 2003), Software Security
Encore Computer (828 words) [view diff] case mismatch in snippet view article find links to article
Performance Analysis". Workshop on Experiences with Distributed and Multiprocessor Systems. Usenix Association: 105–126. Retrieved 29 December 2023. Compro
Douglas Comer (776 words) [view diff] case mismatch in snippet view article find links to article
2005 Operating System Design - The XINU Approach, Second edition – 2015 Usenix "The Flame" Lifetime Achievement Award (as part of the Software Tools Project)
Wi-Fi deauthentication attack (873 words) [view diff] exact match in snippet view article find links to article
Attacks: Real Vulnerabilities and Practical Solutions", Proceedings of the USENIX Security Symposium, Aug 2003 – via Cal Poly (Deauthentication Attack chapter
List of datasets for machine-learning research (13,232 words) [view diff] exact match in snippet view article find links to article
Linguistics: 1557–1567. doi:10.18653/v1/P17-1143. S2CID 7816596. "USENIX". USENIX. Retrieved 19 January 2023. "APTnotes | Read the Docs". readthedocs
Telegram (software) (19,319 words) [view diff] exact match in snippet view article
of end-to-end encryption in the LINE messaging application" (PDF). Usenix. USENIX Association. Archived (PDF) from the original on 11 May 2021. Retrieved
Motor vehicle theft (2,516 words) [view diff] exact match in snippet view article find links to article
(2005), Security Analysis of a Cryptographically-Enabled RFID Device, 14th USENIX Security Symposium Lambert, Fred (10 August 2018). "Stolen Tesla vehicles
Symbolic execution (1,549 words) [view diff] exact match in snippet view article find links to article
High-coverage Tests for Complex Systems Programs". Proceedings of the 8th USENIX Conference on Operating Systems Design and Implementation. OSDI'08: 209–224
Configuration management (3,374 words) [view diff] exact match in snippet view article find links to article
Linux New Media USA LLC. M. Burgess, Cfengine: a site configuration engine, USENIX Computing systems, Vol8, No. 3 1995 [1] M. Burgess, On the theory of system
C standard library (2,875 words) [view diff] exact match in snippet view article find links to article
consistent, safe, string copy and concatenation. Proceedings of the 1999 USENIX Annual Technical Conference, June 6–11, 1999, pp. 175–178. "Super User's
Mark Burgess (computer scientist) (2,268 words) [view diff] exact match in snippet view article
Burgess, In Search of Certainty, XtAxis Press, 2013 Computer Immunology USENIX LISA conference, 1998 Measuring system normality ACM Transactions on Computing