Zobrazeno 1 - 10
of 13
pro vyhledávání: '"Dmitrii Kuvaiskii"'
Publikováno v:
SIGMETRICS (Abstracts)
Oleksenko, O, Kuvaiskii, D, Bhatotia, P, Felber, P & Fetzer, C 2018, ' Intel MPX Explained: A Cross-layer Analysis of the Intel MPX System Stack ', Proceedings of the ACM on Measurement and Analysis of Computing Systems, vol. 2, no. 2, 28, pp. 28:1-28:30 . https://doi.org/10.1145/3224423
Oleksenko, O, Kuvaiskii, D, Bhatotia, P, Felber, P & Fetzer, C 2018, ' Intel MPX Explained: A Cross-layer Analysis of the Intel MPX System Stack ', Proceedings of the ACM on Measurement and Analysis of Computing Systems, vol. 2, no. 2, 28, pp. 28:1-28:30 . https://doi.org/10.1145/3224423
Memory-safety violations are the primary cause of security and reliability issues in software systems written in unsafe languages. Given the limited adoption of decades-long research in software-based memory safety approaches, as an alternative, Inte
Autor:
Erman Ayday, Somnath Chakrabarti, Ellen Wright Clayton, Stephanie O.M. Dyke, Gamze Gürsoy, Yan Huang, Murat Kantarcioglu, Thomas Knauth, Dmitrii Kuvaiskii, Kim Laine, Ryan Lewis, Bradley Malin, Ardalan Naseri, Michael Steiner, Mona Vij, Yevgeniy Vorobeychik, Zhiyu Wan, Yuan Wei, Shaojie Zhang, Degui Zhi
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::9e2b7aa9cad7be51e92b6fa389c45755
https://doi.org/10.1016/b978-0-12-816197-5.01002-0
https://doi.org/10.1016/b978-0-12-816197-5.01002-0
Trusted execution environments (TEE) are emerging as a new form of computing on today's hardware. TEEs ensure that code outside of the TEE, including the operating system and hypervisor, cannot compromise the execution integrity and confidentiality o
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::b6e80f1987cf31d74d17a823e55b48c1
https://doi.org/10.1016/b978-0-12-816197-5.00008-5
https://doi.org/10.1016/b978-0-12-816197-5.00008-5
Publikováno v:
HASP@ISCA
Cloud computing revolutionized the way internet-scale services are deployed and scaled. However, general security concerns and protecting business critical data are still major factors holding companies back from moving their IT infrastructure to the
Publikováno v:
Oleksenko, O, Kuvaiskii, D, Bhatotia, P & Fetzer, C 2017, Fex: A Software Systems Evaluator . in The 47th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2017) . Institute of Electrical and Electronics Engineers (IEEE), Denver, CO, USA, pp. 543-550, 47th IEEE/IFIP International Conference on Dependable Systems and Networks, Denver, United States, 26/06/17 . https://doi.org/10.1109/DSN.2017.25
DSN
DSN
Software systems research relies on experimental evaluation to assess the effectiveness of newly developed solutions. However, the existing evaluation frameworks are rigid (do not allow creation of new experiments), oftensimplistic (may not reveal is
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::5e20780d1673245dae81825cadfd66e6
https://hdl.handle.net/20.500.11820/448b97f0-c26d-410c-9fc9-75211dee79a8
https://hdl.handle.net/20.500.11820/448b97f0-c26d-410c-9fc9-75211dee79a8
Autor:
Dmitrii Kuvaiskii, Pramod Bhatotia, Sergei Arnautov, Bohdan Trach, Pascal Felber, Christof Fetzer, Oleksii Oleksenko
Publikováno v:
Proceedings of the Twelfth European Conference on Computer Systems-EuroSys 17
Proceedings of the Twelfth European Conference on Computer Systems -EuroSys '17
EuroSys
Proceedings of the Twelfth European Conference on Computer Systems -EuroSys '17
EuroSys
Shielded execution based on Intel SGX provides strong security guarantees for legacy applications running on untrusted platforms. However, memory safety attacks such as Heartbleed can render the confidentiality and integrity properties of shielded ex
Publikováno v:
EuroSys
Kuvaiskii, D, Faqeh, R, Bhatotia, P, Felber, P & Fetzer, C 2016, HAFT: Hardware-assisted Fault Tolerance . in Proceedings of the Eleventh European Conference on Computer Systems ., 25, EuroSys '16, New York, NY, USA, pp. 1-17, The 11th ACM European Conference on Computer Systems, London, United Kingdom, 18/04/16 . https://doi.org/10.1145/2901318.2901339
Kuvaiskii, D, Faqeh, R, Bhatotia, P, Felber, P & Fetzer, C 2016, HAFT: Hardware-assisted Fault Tolerance . in Proceedings of the Eleventh European Conference on Computer Systems ., 25, EuroSys '16, New York, NY, USA, pp. 1-17, The 11th ACM European Conference on Computer Systems, London, United Kingdom, 18/04/16 . https://doi.org/10.1145/2901318.2901339
Transient hardware faults during the execution of a program can cause data corruptions. We present HAFT, a fault tolerance technique using hardware extensions of commodity CPUs to protect unmodified multithreaded applications against such corruptions
Publikováno v:
Communications in Computer and Information Science ISBN: 9783319295091
FTSCS
FTSCS
We propose to build a fail-operational computing system from a primary self-checking controller and a secondary limp-home controller to guarantee an emergency operation in the case of hardware failure of the primary controller. A self-checking contro
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::dba958d233215d71bd41c89edf32be44
https://doi.org/10.1007/978-3-319-29510-7_11
https://doi.org/10.1007/978-3-319-29510-7_11
Autor:
Christof Fetzer, Dmitrii Kuvaiskii
Publikováno v:
DSN
Transient and permanent errors in memory and CPUs occur with alarming frequency. Although most of these errors are masked at the hardware level or result in crashes, a non-negligible number of them leads to Silent Data Corruptions (SDCs), i.e., incor
Autor:
Wolfgang Lehner, Dirk Habich, Christof Fetzer, Oleksii Oleksenko, Dmitrii Kuvaiskii, Till Kolditz, Patrick Damme
Publikováno v:
DATA
Nowadays, database systems pursuit a main memory-centric architecture, where the entire business-related data is stored and processed in a compressed form in main memory. In this case, the performance gain is massive because database operations can b