정리된 사이트
http://www.cs.technion.ac.il/~dan/index_sysvenues_deadline.html https://people.engr.tamu.edu/guofei/sec_conf_stat.htm
사용하는 Metrics (2023.1.25 update)
- 개요
- Brief summary of the overall paper.
- Motivation
- What is the problem your work attacks?
- Why is it an important problem?
- Importance
- Limitations of the state of the art in this topic
- What are its limits?
- What makes this topic distinguished from other papers?
- What is the challenge of this paper?
- Challenge
- What is the challenge of the proposed solutions?
- What makes it hard to adopt in the previous research?
- What is the problem, solved by the paper?
- Main Idea
- What are the one or two key new insights in this paper?
- How does it advance the state of the art?
- What makes it more effective than past approaches?
- Design
- Summarize the design section of the paper.
- Result
- What are the most important one or two empirical or theoretical results of this approach?
- Contribution (Conclusion)
- What contributions does this paper make to the state of the art?
- Its advantages over past work, including how it overcomes the limitations.
- What topics or questions does this paper open?
- Criticize (Conclusion)
- What are the limitations of this paper?
- Is there a weakness or missing points in this paper?
- What is the strength and weakness of this paper?
- Is the paper overall well-organized?
- Reference
- Reference if there exists [1].
Reference
"시스템 논문" 분류에 속하는 문서
다음은 이 분류에 속하는 문서 92개 가운데 92개입니다.
A
B
- Beyond malloc efficiency to fleet efficiency: a hugepage-aware memory allocator
- Bifrost: Analysis and Optimization of Network I/O Tax in Confidential Virtual Machines
- Bit Fusion: Bit-Level Dynamically Composable Architecture for Accelerating Deep Neural Network
- Bit Fusion: Bit-Level Dynamically Composable Architecture for Accelerating Deep Neural Networks
- BlackBox: A Container Security Monitor for Protecting Containers on Untrusted Operating Systems
- BUDAlloc: Defeating Use-After-Free Bugs by Decoupling Virtual Address Management from Kernel
C
- C4: The Continuously Concurrent Compacting Collector
- Capsicum: practical capabilities for UNIX
- CBMM: Financial Advice for Kernel Memory Managers
- Characterizing a Memory Allocator at Warehouse Scale
- Cling: A Memory Allocator to Mitigate Dangling Pointers
- Cooperation and Security Isolation of Library OSes for Multi-Process Applications
- Coordinated and efficient huge page management with ingens
- Core slicing: closing the gap between leaky confidential VMs and bare-metal cloud
- Corundum: Statically-Enforced Persistent Memory Safety
- CRCount: Pointer Invalidation with Reference Counting to Mitigate Use-after-free in Legacy C/C++
D
- DangZero: Efficient Use-After-Free Detection via Direct Page Table Access
- DieHard: Probabilistic Memory Safety for Unsafe Languages
- DieHarder: Securing the Heap
- DINT: Fast In-Kernel Distributed Transactions with eBPF
- Direct Access, High-Performance Memory Disaggregation with DIRECTCXL
- Dune: Safe User-level Access to Privileged CPU Features
E
F
H
- Hardening Hypervisors with Ombro
- Harmonizing Performance and Isolation in Microkernels with Efficient Intra-kernel Isolation and Communication
- HawkEye: Efficient Fine-grained OS Support for Huge Pages
- High Velocity Kernel File Systems with Bento
- HXDP: Efficient software packet processing on FPGA NICs
I
L
M
N
O
P
- PACTree: A High Performance Persistent Range Index Using PAC Guidelines
- PKRU-safe: automatically locking down the heap between safe and unsafe languages
- POSIX Abstractions in Modern Operating Systems: The Old, the New, and the Missing
- Preventing Use-After-Free Attacks with Fast Forward Allocation
- Preventing Use-after-free with Dangling Pointers Nullification
- Privbox: Faster System Calls Through Sandboxed Privileged Execution
- PUMM: Preventing Use-After-Free Using Execution Unit Partitioning
- Pushing Performance Isolation Boundaries into Application with pBox
R
S
- Scale-Out Acceleration for Machine Learning
- Secure Virtual Architecture: A Safe Execution Environment for Commodity Operating Systems
- Sharing and Protection in a Single-Address-Space Operating System
- SHELTER: Extending Arm CCA with Isolation in User Space
- Shielding applications from an untrusted cloud with Haven
- Shinjuku: Preemptive Scheduling for μsecond-scale Tail Latency
- Singularity: Rethinking the Software Stack
- Specification and verification in the field: Applying formal methods to BPF just-in-time compilers in the Linux kernel
- Strata: A Cross Media File System