Some links go to the ACM Digital Library; you may need to use the Harvard VPN to get access to the papers via those links. Alternate links will be provided on request.
| M 1/27 | Overview |
| W 1/29 | Early monolithic kernels |
| M 2/3 | Microkernels |
| W 2/5 | Kernels and Rust |
| M 2/10 | Unusual OS presentations |
| W 2/12 | Device drivers |
| W 2/19 | Kernel bypass |
| M 2/24 | Advanced drivers: synthesis, GPUs, enclaves |
| W 2/26 | Virtual machines |
| M 3/3 | Binary translation |
| W 3/5 | Evil extensions |
| M 3/10 | Extension applications |
| W 3/12 | Reproduction discussion |
| M 3/24 | Hardware and system security |
| W 3/26 | Secure application architecture |
| M 3/31 | Reproduction post-mortem and project discussion |
| W 4/2 | Performance debugging |
| M 4/7 | Distributed tracing |
| W 4/9 | Scalable AI scheduling |
| M 4/14 | LLM/DNN training and serving |
| W 4/16 | CPU scheduling |
| M 4/21 | Network device interfaces |
| W 4/23 | Block device interfaces |
| M 4/28 | Testing and verification |
| W 4/30 | Looking back |
| F 5/9 | Project presentations |
| W 5/14 | Project deadline |