News

Join our gathering to celebrate USENIX's 50th anniversary. Light refreshments will be served. Everyone is welcome to participate in this special event. If you are a registered attendee of USENIX ATC ...
@inproceedings {294504, author = {Meng Chen and Xiangyu Xu and Li Lu and Zhongjie Ba and Feng Lin and Kui Ren}, title = {Devil in the Room: Triggering Audio Backdoors in the Physical World}, booktitle ...
Linux supports 3 scheduling policies: SCHED_FIFO, SCHED_RR, and SCHED_OTHER. SCHED_OTHER is the default universal time-sharing scheduler policy used by most processes; SCHED_FIFO and SCHED_RR are ...
The OSDI '25 poster session and reception will feature posters by authors presenting their work at the symposium. The list of accepted posters will be available soon. Join our gathering to celebrate ...
LISA: Where systems engineering and operations professionals share real-world knowledge about designing, building, and maintaining the critical systems of our interconnected world. The LISA conference ...
Lukas Maar, Lukas Giner, Daniel Gruss, and Stefan Mangard, Graz University of Technology ...
Shubhi Asthana is a Senior Research Software Engineer at IBM Almaden Research Center, specializing in AI and machine learning solutions for privacy-preserving technologies, particularly PII detection ...
(Registered attendees: Sign in to your USENIX account to download these files.) USENIX Security '20 Wednesday Paper Archive (84.1 MB ZIP, includes Proceedings front matter and errata) USENIX Security ...
App-integrated systems like AIFM move far-memory management completely into the application and manage memory at object granularity, in a fashion similar to object-based language runtimes like the ...
Information security is hard in part because of the underlying economics of attack and defense. Different economic models result in distinct equilibria: some favor attackers, whereas others advantage ...
In end-to-end encrypted (E2EE) messaging systems, protecting communication metadata, such as who is communicating with whom, at what time, etc., remains a challenging problem. Existing designs mostly ...