Redesigning Hardware to Support Security: CHERI
Over a decade of research has resulted in a tool chain and RISC hardware that change pointers from integers to their own, safe, type
Authors: Rik Farrow
Article shepherded by: Rik Farrow
Metastable Failures in the Wild
We find that metastable failures are universally observed and provide an insider view of how they happen at Twitter
Authors: Lexiang Huang, Matthew Magnusson, Abishek Bangalore Muralikrishna, Salman Estyak, Rebecca Isaacs, Abutalib Aghayev, Timothy Zhu, Aleksey Charapko
Article shepherded by: Rik Farrow
What SRE Could Be
SRE could be - should be - much more than it is today. Please help.
Authors: Niall Murphy
Article shepherded by: Laura Nolan
Computer Security and the Internet
This is a security text book that covers a very broad set of topics concisely and clearly.
Authors: Rik Farrow
Article shepherded by: Rik Farrow
Jurassic Cloud
Large parts of our “modern” stack are 30+ years old, just like its architectural principles. The result - software dinosaurs roaming the Jurassic Cloud, out of place, out of time.
Authors: Avishai Ish-Shalom
Article shepherded by: Effie Mouzeli
Revisiting B+-tree vs. LSM-tree
LSM-trees have been preferred over B+-trees for some database storage but in-storage transparent compression effectively closes their gap
Authors: Yifan Qiao, Xubin Chen, Ning Zheng, Jiangpeng Li, Yang Liu, Tong Zhang
Article shepherded by: Rik Farrow
Understanding Software Dynamics
Uncovering the causes of long tail latency, while learning about about the quirks of compilers, CPUs, systems, and how best to observe your systems.
Authors: Rik Farrow
Article shepherded by: Rik Farrow
Ferret: Automatically Finding RFC Compliance Bugs in DNS Nameservers
Our SCALE approach jointly generates zone files and corresponding queries to cover RFC behaviors specified by an executable model of DNS resolution
Authors: Siva Kesava Reddy Kakarla, Ryan Beckett, Todd Millstein, George Varghese
Article shepherded by: Sangeetha Abdu Jyothi
An Analysis of Open-source Automated Threat Modeling Tools and Their Extensibility from Security into Privacy
Automated tools can lessen the burden of threat modeling for security and privacy, but picking a tool is difficult without insight into functionality and user experience.
Authors: Kristen Tan, Vaibhav Garg
Article shepherded by: Rik Farrow