Enabling Realms with the Arm Confidential Compute Architecture
ARMv9 will include Realms, a combination of hardware and firmware that creates a mechanism for isolating memory from reading or writing even by the OS or hypervisor.
Authors: Xupeng Li, Xuheng Li, Christoffer Dall, Ronghui Gu, Jason Nieh, Yousuf Sait, Gareth Stockwell
Article shepherded by: Rik Farrow
BeyondCorp and the long tail of Zero Trust
After successfully transitioning most of the Google's workflows to BeyondCorp, we were left with a long tail of specific or challenging situations to resolve.
Authors: Guilherme Gonçalves, Kyle O'Malley, Betsy Beyer, Max Saltonstall
Article shepherded by: Rik Farrow
NSDI'23 Test of Time Award
A graduate research project turned into a popular web browser plug-in, used by millions
Authors: Franzi Roesner, Gennie Gebhart, Rik Farrow
Article shepherded by: Rik Farrow
Bcrypt at 25: A Retrospective on Password Security
Celebrating 25 years of bcrypt! Dive into its journey, enduring impact on password security, and unique ways it's shaping the future.
Authors: Niels Provos
Article shepherded by: Rik Farrow
Responding to and Learning from Distributed Incidents
Step through a distributed systems incident and see how teams can learn from these events.
Authors: Philipp Böschen
Article shepherded by: Laura Nolan
Codon: Python Compiler
Codon is a compiler for Python scripts that produces optimized code suitable for analyzing large amounts of data, with some limitations.
Authors: Rik Farrow
Article shepherded by: Laura Nolan
A Study in Practical Deduplication
Using data collected from 875 Microsoft employees' desktops and servers, the authors analyzed file metadata and potential deduplication strategies.
Authors: Dutch Meyer, Bill Bolosky, Rik Farrow
Article shepherded by: Rik Farrow
You don’t have a production environment
Your staging environment cannot accurately replicate your production environment. Multi-tenancy can solve this problem.
Authors: Avishai Ish-Shalom
Article shepherded by: Laura Nolan
Mistrust Plugins You Must: A Large-Scale Study Of Malicious Plugins In WordPress Marketplaces
Authors: Ranjita Pai Sridhar, Jonathan Fuller, Yiting Sun, Omar Chabklo, Andres Rodriguez, Jeman Park, Brendan Saltaformaggio
Article shepherded by: Rik Farrow
Musings on Operating Systems
Why is Windows on the desktop, while Linux rules the cloud?
Authors: Rik Farrow
Article shepherded by: Rik Farrow, Laura Nolan
Workload Security Rings
Authors: Michał Czapiński , Rainer Wolafka
Article shepherded by: Laura Nolan
CI is Alerting
Adding lots of alerts during the early stages of development can pay off later in an Continuous Integration environment.
Authors: Titus Winters
Article shepherded by: Rik Farrow, Laura Nolan
Rock Fishing and Incident Analysis
What can technologists learn from studying how rock fishers think about safety?
Authors: Thai Wood
Article shepherded by: Laura Nolan
Detecting Fail-Slow Failures in Large-Scale Cloud Storage Systems
Researchers tried several different methods for discovering fail-slow drives before developing PERSEUS for very large cloud storage
Authors: Ruiming Lu, Erci Xu, Yiming Zhang, Fengyi Zhu, Zhaosheng Zhu, Mengtian Wang, Zongpeng Zhu, Guangtao Xue, Jiwu Shu, Minglu Li, Jiesheng Wu
Article shepherded by: Rik Farrow
Caching Entire Systems without Invalidation
Peter Sperl presents two systems design patterns for implementing resilient and layered caching in large distributed systems.
Authors: Peter Sperl
Article shepherded by: Laura Nolan
Interview with Matt Welsh
Rik Farrow interviews Matt Welsh about Rust and the future of replacing programmers with AI/ML.
Authors: Rik Farrow, Matt Welsh
Article shepherded by: Rik Farrow
Space Rogue
The story of the L0pht, the group best known for their Senate testimony about security in 1998, as told by Chris Thomas, Space Rogue.
Authors: Rik Farrow
Article shepherded by: Rik Farrow
Interview with Warren Toomey, Founder of the Unix Heritage Society
Warren Toomey became interested in Unix as a high school student, an interest the affected his career and the creation of the Unix Heritage Society
Authors: Warren Toomey, Rik Farrow
Article shepherded by: Rik Farrow