Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- short-paperOctober 2024
Accurate Embedding-based Log Determinant Optimization
CIKM '24: Proceedings of the 33rd ACM International Conference on Information and Knowledge ManagementPages 3747–3751https://doi.org/10.1145/3627673.3679871Many tangible and intangible objects are represented as itemsets; i.e., composition of individual items. In this paper, we address the problem of finding the embedding of such items so as to use those embeddings in tasks like missing item prediction. We ...
- research-articleNovember 2023
CARAT KOP: Towards Protecting the Core HPC Kernel from Linux Kernel Modules
SC-W '23: Proceedings of the SC '23 Workshops of The International Conference on High Performance Computing, Network, Storage, and AnalysisPages 1596–1605https://doi.org/10.1145/3624062.3624237Extending Linux through the kernel module interface can offer immense benefits and capabilities in high performance computing (HPC). These extensions can also be more readily deployed because Linux is the common, typically only, supported OS choice ...
- posterMay 2023
The Complexity of Minimizing Envy in House Allocation
AAMAS '23: Proceedings of the 2023 International Conference on Autonomous Agents and Multiagent SystemsPages 2673–2675The house allocation problem asks for m houses to be allocated among n agents so that every agent receives exactly one house. The preferences of the agents over houses can be modeled as weak orders, of which two special cases are strict rankings and ...
- research-articleMay 2023
OFence: Pairing Barriers to Find Concurrency Bugs in the Linux Kernel
EuroSys '23: Proceedings of the Eighteenth European Conference on Computer SystemsPages 33–45https://doi.org/10.1145/3552326.3567504Knowing which functions may execute concurrently is key to finding concurrency-related bugs. Existing tools infer the possibility of concurrency using dynamic analysis or by pairing functions that use the same locks. Code that relies on more relaxed ...
Efficient Scheduler Live Update for Linux Kernel with Modularization
ASPLOS 2023: Proceedings of the 28th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 3Pages 194–207https://doi.org/10.1145/3582016.3582054The scheduler is a critical component of the operating system (OS)and is tightly coupled with Linux. Production-level clouds often host various workloads, and these workloads require different schedulers to achieve high performance. Thus the ...
-
- research-articleAugust 2022
SemSwap: semantics-aware swapping in memory disaggregated datacenters
APSys '22: Proceedings of the 13th ACM SIGOPS Asia-Pacific Workshop on SystemsPages 9–17https://doi.org/10.1145/3546591.3547531Memory disaggregation has risen in popularity in datacenters due to benefits such as higher utilization and better hardware elasticity. However, applications running on memory disaggregated clusters commonly suffer from data amplification---I/O traffic ...
CARAT CAKE: replacing paging via compiler/kernel cooperation
- Brian Suchy,
- Souradip Ghosh,
- Drew Kersnar,
- Siyuan Chai,
- Zhen Huang,
- Aaron Nelson,
- Michael Cuevas,
- Alex Bernat,
- Gaurav Chaudhary,
- Nikos Hardavellas,
- Simone Campanoni,
- Peter Dinda
ASPLOS '22: Proceedings of the 27th ACM International Conference on Architectural Support for Programming Languages and Operating SystemsPages 98–114https://doi.org/10.1145/3503222.3507771Virtual memory, specifically paging, is undergoing significant innovation due to being challenged by new demands from modern workloads. Recent work has demonstrated an alternative software only design that can result in simplified hardware requirements, ...
- research-articleJune 2022
Finding the missing piece: permission specification analysis for Android NDK
ASE '21: Proceedings of the 36th IEEE/ACM International Conference on Automated Software EngineeringPages 505–516https://doi.org/10.1109/ASE51524.2021.9678843The Android research community has long focused on building the permission specification for Android framework APIs, which can be referenced by app developers to request the necessary permissions for their apps. However, existing studies just analyze the ...
- research-articleOctober 2021
Syrup: User-Defined Scheduling Across the Stack
SOSP '21: Proceedings of the ACM SIGOPS 28th Symposium on Operating Systems PrinciplesPages 605–620https://doi.org/10.1145/3477132.3483548Suboptimal scheduling decisions in operating systems, networking stacks, and application runtimes are often responsible for poor application performance, including higher latency and lower throughput. These poor decisions stem from a lack of insight ...
- research-articleOctober 2021
Faster Support Vector Machines
ACM Journal of Experimental Algorithmics (JEA), Volume 26Article No.: 15, Pages 1–21https://doi.org/10.1145/3484730The time complexity of support vector machines (SVMs) prohibits training on huge datasets with millions of data points. Recently, multilevel approaches to train SVMs have been developed to allow for time-efficient training on huge datasets. While ...
- short-paperOctober 2021
MNIST classification using Neuromorphic Nanowire Networks
- Ruomin Zhu,
- Alon Loeffler,
- Joel Hochstetter,
- Adrian Diaz-Alvarez,
- Tomonobu Nakayama,
- Adam Stieg,
- James Gimzewski,
- Joseph Lizier,
- Zdenka Kuncic
ICONS 2021: International Conference on Neuromorphic Systems 2021Article No.: 16, Pages 1–4https://doi.org/10.1145/3477145.3477162Neuromorphic Nanowire Networks (NWNs) are a novel class of information processing hardware devices, combining the advantage of memristive cross-point junctions and neural-like complex network topology. In addition to their low operating power, NWNs are ...
- research-articleJune 2021
EZIOTracer: Unifying Kernel and User Space I/O Tracing for Data-Intensive Applications
- Mohammed Islam Naas,
- François Trahay,
- Alexis Colin,
- Pierre Olivier,
- Stéphane Rubini,
- Frank Singhoff,
- Jalil Boukhobza
ACM SIGOPS Operating Systems Review (SIGOPS), Volume 55, Issue 1Pages 88–98https://doi.org/10.1145/3469379.3469391Tracing is a popular method for evaluating, investigating, and modeling the performance of today's storage systems. Tracing has become crucial with the increase in complexity of modern storage applications/systems, that are manipulating an ever-...
- research-articleApril 2021
EZIOTracer: unifying kernel and user space I/O tracing for data-intensive applications
- Mohammed Islam Naas,
- François Trahay,
- Alexis Colin,
- Pierre Olivier,
- Stéphane Rubini,
- Frank Singhoff,
- Jalil Boukhobza
CHEOPS '21: Proceedings of the Workshop on Challenges and Opportunities of Efficient and Performant Storage SystemsArticle No.: 4, Pages 1–11https://doi.org/10.1145/3439839.3458731Tracing is a popular method for evaluating, investigating, and modeling the performance of today's storage systems. Tracing has become crucial with the increase in complexity of modern storage applications/systems, that are manipulating an ever-...
- ArticleApril 2021
HerQules: securing programs via hardware-enforced message queues
ASPLOS '21: Proceedings of the 26th ACM International Conference on Architectural Support for Programming Languages and Operating SystemsPages 773–788https://doi.org/10.1145/3445814.3446736Many computer programs directly manipulate memory using unsafe pointers, which may introduce memory safety bugs. In response, past work has developed various runtime defenses, including memory safety checks, as well as mitigations like no-execute memory,...
- research-articleApril 2021
SNAPPY: programmable kernel-level policies for containers
SAC '21: Proceedings of the 36th Annual ACM Symposium on Applied ComputingPages 1636–1645https://doi.org/10.1145/3412841.3442037Compared to full virtualization, containerization reduces virtualization overhead and resource usage, offers reduced deployment latency and improves reusability. For these reasons, containerization is massively used in an increasing number of ...
- abstractJune 2020
Set the Configuration for the Heart of the OS: On the Practicality of Operating System Kernel Debloating
SIGMETRICS '20: Abstracts of the 2020 SIGMETRICS/Performance Joint International Conference on Measurement and Modeling of Computer SystemsPages 87–88https://doi.org/10.1145/3393691.3394215This paper presents a study on the practicality of operating system (OS) kernel debloating---reducing kernel code that is not needed by the target applications---in real-world systems. Despite their significant benefits regarding security (attack ...
- research-articleMay 2020
Set the Configuration for the Heart of the OS: On the Practicality of Operating System Kernel Debloating
Proceedings of the ACM on Measurement and Analysis of Computing Systems (POMACS), Volume 4, Issue 1Article No.: 03, Pages 1–27https://doi.org/10.1145/3379469This paper presents a study on the practicality of operating system (OS) kernel debloating---reducing kernel code that is not needed by the target applications---in real-world systems. Despite their significant benefits regarding security (attack surface ...
- research-articleMarch 2020
Write-protection enforcement: hypervisor-backed kernel hardening
SAC '20: Proceedings of the 35th Annual ACM Symposium on Applied ComputingPages 1736–1744https://doi.org/10.1145/3341105.3373919A rootkit is a piece of code that aims to manipulate the computer behaviour without being detected. Rootkits are mainly used to disable kernel self-protection, hide malware presence, provide a covert communication channel between malware and their ...
- research-articleMarch 2020
PESC: A Per System-Call Stack Canary Design for Linux Kernel
CODASPY '20: Proceedings of the Tenth ACM Conference on Data and Application Security and PrivacyPages 365–375https://doi.org/10.1145/3374664.3375734Stack canary is the most widely deployed defense technique against stack buffer overflow attacks. However, since its proposition, the design of stack canary has very few improvements during the past 20 years, making it vulnerable to new and sophisticated ...
- research-articleAugust 2019
Budgeted Algorithm for Linearized Confidence-Weighted Learning
ICCBDC '19: Proceedings of the 2019 3rd International Conference on Cloud and Big Data ComputingPages 6–10https://doi.org/10.1145/3358505.3358510This paper presents a novel algorithm for performing linearized confidence-weighted (LCW) learning on a fixed budget. LCW learning has been applied to solve online classification problems in recent years. To make better classification performance, it is ...