Zobrazeno 1 - 9
of 9
pro vyhledávání: '"Ali Mashtizadeh"'
Publikováno v:
SOSP
Applications on modern operating systems manage their ephemeral state in memory and persistent state on disk. Ensuring consistency between them is a source of significant developer effort and application bugs. We present the Aurora single level store
Publikováno v:
HotOS
Applications on modern operating systems manage their ephemeral state in memory, and persistent state on disk. Ensuring consistency between them is a source of significant developer effort, yet still a source of significant bugs in mature application
Publikováno v:
PPoPP
Safe memory reclamation (SMR) algorithms suffer from a trade-off between bounding unreclaimed memory and the speed of reclamation. Hazard pointer (HP) based algorithms bound unreclaimed memory at all times, but tend to be slower than other approaches
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::2107b5d34a361d9b23a14ec49b3807be
http://arxiv.org/abs/2012.14542
http://arxiv.org/abs/2012.14542
Publikováno v:
SIGCOMM
Network traffic typically traverses a sequence of middleboxes forming a service function chain, or simply a chain. Tolerating failures when they occur along chains is imperative to the availability and reliability of enterprise applications. Making a
Publikováno v:
ASPLOS
We present Castor, a record/replay system for multi-core applications that provides consistently low and predictable overheads. With Castor, developers can leave record and replay on by default, making it practical to record and reproduce production
Publikováno v:
ACM Conference on Computer and Communications Security
Control flow integrity (CFI) restricts jumps and branches within a program to prevent attackers from executing arbitrary code in vulnerable programs. However, traditional CFI still offers attackers too much freedom to chose between valid jump targets
Publikováno v:
ICAC
Host-side SSD caches represent a powerful knob for improving and controlling storage performance and improve performance isolation. We present Centaur, as a host-side SSD caching solution that uses cache sizing as a control knob to achieve storage pe
Publikováno v:
2014 IEEE Symposium on Security and Privacy.
We show that it is possible to write remote stack buffer overflow exploits without possessing a copy of the target binary or source code, against services that restart after a crash. This makes it possible to hack proprietary closed-binary services,
Publikováno v:
SOSP
Ori is a file system that manages user data in a modern setting where users have multiple devices and wish to access files everywhere, synchronize data, recover from disk failure, access old versions, and share data. The key to satisfying these needs