These are papers I have read or should read or wish I was smart enough to read and understand. Trying to keep track of them as they end up dying in browser tabs.
- Surprisingly Small: The Effect of Trade Secret Breaches on Firm Performance
- Why Information Security is Hard - An Economic Perspective
- Robbery on DevOps: Understanding and Mitigating Illicit Cryptomining on Continuous Integration Service Platforms
- The Macroscopic Behavior of the TCP Congestion Avoidance Algorithm
- BBR Congestion-Based Congestion Control
- The Theory of Interstellar Trade
- Are There Quantum Jumps? Part II
- The Astrobiological Copernican Weak and Strong Limits for Intelligent Life
- Where the Counterculture Met the New Economy The WELL and the Origins of Virtual Community
- Stack Computers: The New Wave
- A Neural Network Solves and Generates Mathematics Problems by Program Synthesis: Calculus, Differential Equations, Linear Algebra, and More
- A Transrealist Manifesto
- On the Measure of Intelligence
- NSA Kubernetes Hardening Guide
- Out of the Tar Pit
- Firecracker: Lightweight Virtualization for Serverless Applications
- The Edges of Our Universe
- Milk or Wine: Does Software Security Improve with Age?
- On Being the Right Size
- Some Social and Psychological Consequences of the Longwall Method of Coal-Getting
- A Taxonomy of Dependencies in Agile Software Development
- Snap: a Microkernel Approach to Host Networking
- END-TO-END ARGUMENTS IN SYSTEM DESIGN
- SAGAS
- Taiji: Managing Global User Traffic for Large-Scale Internet Services at the Edge
- Compressing Differences of Executable Code
- Delta Encoding Based Methods to Reduce the Sizeof Smartphone Application Updates
- The True Cost of Containing: A gVisor Case Study
- From Laptop to Lambda:Outsourcing Everyday Jobs to Thousands of Transient Functional Containers
- Crash Only Software
- Democratizing the Network Edge
- JOX: An Event-Driven Orchestrator for 5GNetwork Slicing
- Auto-Keras: An Efficient Neural Architecture Search System
- From Collisions to Chosen-Prefix CollisionsApplication to Full SHA-1
- Fooling automated surveillance cameras: adversarial patches to attack person detection
- THE ART OF SYSTEMS ARCHITECTING
- The Android Platform Security Model
- Private LTE Networks - Nice short little whitepaper on LTE, CBRS, MulteFire...
- Performance Effects of Architectural Complexity in the Intel 432
- On the Duality of Operating System Structures - NOTE: Papers We Love Toronto
- Serverless Computing: One Step Forward, Two Steps Back - Cites Duality of Operating Systems paper
- Security Overview of AWS Lambda
- A Generalised Solution to Distributed Consensus
- Verified iptables Firewall Analysis and Verification
- Shielding Applications from an Untrusted Cloud with Have
- Peeking Behind the Curtains of Serverless Platforms
- Maelstrom: Mitigating Datacenter-level Disasters by Draining Interdependent Traffic Safely and Efficiently
- A Generalised Solution to Distributed Consensus
- Application modernization and the decoupling of infrastructure services and teams
- Shielding Applications from an Untrusted Cloud with Haven
- Verified iptables Firewall Analysis and Verification
- Spectre is here to stay: An analysis of side-channels and speculative execution
- Writing Network Drivers in Go
- Writing Network Drivers in Rust
- The 2 Sigma Problem
- Constrained Bayesian Optimization with Noisy Experiments
- Ghosts of Departed Proofs (Functional Pearl)
- Peeking Behind the Curtains of Serverless Platforms
- Gravitational Lensing by Spinning Black Holes in Astrophysicsm and in the Movie Interstellar
- Holistic Configuration Management at Facebook
- TensorFuzz: Debugging Neural Networks with Coverage-Guided Fuzzing
- The Practice of Change
- Machine Learning: The High-Interest Credit Card of Technical Debt
- Why and How Java Developers Break APIs
- The Case for Automatic Database Administration using Deep Reinforcement Learning
- Stateless Network Functions: Breaking the Tight Coupling of State and Processing
- Formal Analysis of 5G Authentication
- A Comparison of Reinforcement Learning Techniques for Fuzzy Cloud Auto-Scaling
- Adversarial Reprogramming of Neural Networks
- EnclaveDB: A Secure Database using SGX
- HALO: Hop-by-Hop Adaptive Link-State Optimal Routing
- Implementation of Virtual Network Function Chaining through Segment Routing in a Linux-based NFV Infrastructure
- Software Resolved Networks: Rethinking Enterprise Networks with IPv6 Segment Routing
- Detecting Kernel Memory Disclosure with x86 Emulation and Taint Tracking
- Small Cache, Big Effect: Provable Load Balancing for Randomly Partitioned Cluster Services
- Why We Engage in FLOSS: Answers from Core Developersl
- VMware distributed resource Management: design, Implementation, and lessons learned
- Revealing MPLS Tunnels Obscured from Traceroute
- A Smooth Exit from Eternal Inflation?
- LTE - LTE PHY Layer Vulnerability Analysis and Testing Using Open-Source SDR Tools
- LTE - On Security Research Towards Future Mobile Network Generations
- Anna: A KVS For Any Scale
- All About MPLS Traffic Engineering
- IP/MPLS Performance and Path Analytics for Teleprotection in Power Utilities
- Low-latency trading
- iAn Updated Performance Comparison of Virtual Machines and Linux Containers
- The Akami Network
- LTE- LTEInspector : A Systematic Approach for Adversarial Testing of 4G LTE
- Implementation of Virtual Network Function Chaining through Segment Routing in a Linux-based NFV Infrastructure
- Applied Machine Learning at Facebook: A Datacenter Infrastructure Perspective
- Demystifying Userspace Packet IO Frameworks
- Making reliable distributed systems in the presence of software errors
- OpenFlow: Enabling Innovation in Campus Networks
- How Complex Systems Fail
- The Causes and Consequences of House Price Momentum
- The Case for Learned Index Structures
- CrystalNet: Faithfully Emulating Large Production Networks
- Intent NBI – Definition and Principles
- Service Chaining in Carrier Networks
- Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2
- An Analysis of the Privacy and Security Risks of Android VPN Permission-enabled Apps
- E2: A Framework for NFV Applications
- SoftNIC: A Software NIC to Augment Hardware
- Lessons from Giant-Scale Services
- Robust Physical-World Attacks on Machine Learning Models
- Breaking the x86 ISA
- Measuring YouTube Content Delivery over IPv6
- DNM Safety Systems Thinking for Safety: Ten Principles A White Paper
- The Security Impact of HTTPS Interception
- Don’t Forget to Lock the Back Door! A Characterization of IPv6 Network Security Policy
- Field-aware Factorization Machines in a Real-world Online Advertising System
- B4: Experience with a Globally-Deployed Software Defined WAN
- On Designing and Deploying Internet-Scale Services
- Flip Feng Shui: Hammering a Needle in the Software Stack
- Differentiating Communication Styles of Leaders on the Linux Kernel Mailing List
- Dedup Est Machina: Memory Deduplication as an Advanced Exploitation Vector
- SWIM: Scalable Weakly-consistent Infection-style Process Group Membership Protocol
- Distributed Snapshots: Determining Global States of Distributed Systems
- Sizing Router Buffers
- The Linux Scheduler: a Decade of Wasted Cores
- The Evolution of Layered Protocol Stacks Leads to an Hourglass-Shaped Architecture
- Maglev: A Fast and Reliable Software Network Load Balancer
- An Approach to Bounded Rationality
- Driller: Augmenting Fuzzing Through Selective Symbolic Execution
- A Network-State Management Service
- Internet Failures: An Emergent Sea of Complex Systems and Critical Design Errors?
- FlowBender: Flow-level Adaptive Routing for Improved Latency and Throughput in Datacenter Networks
- The Nature of Datacenter Traffic: Measurements & Analysis
- Exploring the Duality between Product and Organizational Architectures: A Test of the "Mirroring" Hypothesis - ie. Conways law
- Debunking the "Expensive Procedure Call" Myth
- A Promise Theory Appraoch to Understanding Resilience: Faults, Errors, and Toleranc within Systems
- Building Robust Systems: An Essay
- Why Order Matters: Turing Equivalence in Automated Systems Administration
- Bobtail: Avoiding Long Tails in the Cloud