- (State of) The Art of War: Offensive Techniques in Binary Analysis
- 16진법
- 2022 ebpf summit alexei starovoitov
- 2022 ebpf summit daniel xu
- 2nd Algorithm
- 2진법
- A* algorithm
- A* 알고리즘
- A20 Line
- A20 라인
- ABA Problem
- ACID
- ACPI
- AIFM: High-Performance, Application-Integrated Far Memory
- ALOHA
- AMD Secure Encrypted Virtualization-Secure Nested Paging
- APIC
- ARM CCA
- ARM Confidential compute architecture
- ARM PAC
- ARP
- ASAN
- ASLR
- AVM: Application-Level Virtual Memory
- AVX
- AWK
- AWS Nitro Enclaves
- A Robust and Efficient Defense against Use-after-Free Exploits via Concurrent Pointer Sweeping
- A survey of procedural noise functions
- Abstract
- Abstract interpretation
- Abstract syntax
- Abstraction
- Actions
- Activation function
- Adaptive Huge-Page Subrelease for Non-moving Memory Allocators in Warehouse-Scale Computers
- Additional Operation
- Additive increase multiplicative decrease
- AddressSanitizer
- Address resolution protocol
- Address space layout randomization
- Advanced configuration and power interface
- Advanced vector extensions
- Affine type
- Aggregate Functions
- Algorithm for Decomposition
- Alpha-beta pruning
- Alternative Notations for Modeling Data
- Anderson algorithm
- Anonymous memory
- AppArmor
- Application-Informed Kernel Synchronization Primitives
- Application Layer
- Arm Confidential Computing Architecture
- Arrakis: The Operating System is the Control Plane
- Array and Struct
- Asmlinkage
- Assembly
- Asterinas: A Linux ABI-Compatible, Rust-Based Framekernel OS with a Small and Sound TCB
- Atomicity
- Attention
- Attestation
- Authorization
- B+-Tree Extensions
- B-tree
- BASE
- BFS
- BGP
- BPF Type Format
- BRF: Fuzzing the eBPF Runtime
- BSF
- BTF
- BUDAlloc
- BUDAlloc: Defeating Use-After-Free Bugs by Decoupling Virtual Address Management from Kernel
- BUDAlloc: Defeating Use-After-Free Bugs by Decoupling Virtual Address Management from Kernel/ko
- Backtracking
- Backus-Naur form
- Backward propagation
- Bad unlock balance
- Batch normalization
- Batching
- Beam search
- Bernstein's Conditions
- Bernstein Condition
- Best-first search
- Beyond a Gaussian Denoiser: Residual Learning of Deep CNN for Image Denoising
- Beyond malloc efficiency to fleet efficiency: a hugepage-aware memory allocator
- Bifrost: Analysis and Optimization of Network I/O Tax in Confidential Virtual Machines
- Binary Compatibility
- Binary Search Tree
- Binary decision rule
- Binary search
- Binary translation
- Binary tree
- Binomial Coefficients
- Bit Fusion: Bit-Level Dynamically Composable Architecture for Accelerating Deep Neural Network
- Bit Fusion: Bit-Level Dynamically Composable Architecture for Accelerating Deep Neural Networks
- Black-box testing
- BlackBox: A Container Security Monitor for Protecting Containers on Untrusted Operating Systems
- Block device
- Boolean Algebra
- Border gateway protocol
- Bounding volume hierarchy
- Bubble sort
- Buddy allocator
- Buffer
- Buffer Manager
- Building Bridges: Safe Interactions with Foreign Languages through Omniglot
- Bump map
- Bus
- C-state
- C4: The Continuously Concurrent Compacting Collector
- CAMP: Compiler and Allocator-based Heap Memory Protection
- CAP 정리
- CBMM: Financial Advice for Kernel Memory Managers
- CDMA
- CDN
- CFI
- CIDR
- CNN
- CPUID
- CRC
- CRCount: Pointer Invalidation with Reference Counting to Mitigate Use-after-free in Legacy C/C++
- CSMA
- CSMA/CD
- CUDA
- CXL
- CYK Algorithm
- Cache
- Cache line
- Camera space
- Canonical view volume
- Capsicum: practical capabilities for UNIX
- Card table
- Carrier sense multiple access/collision detection
- Cellular Internet access
- Cgroup
- Character device
- Characterizing a Memory Allocator at Warehouse Scale
- Characters
- China in the Neolithic Age
- Chomsky Normal Form
- Chroot
- Classless inter-domain routing
- Cling: A Memory Allocator to Mitigate Dangling Pointers
- Clipping
- Clock Eviction Algorithm
- Clock nanosleep
- Cmp
- CoW
- Code coverage
- Code sanitizer
- Cohesion and coherence
- Cohort Lock
- Complete partial order
- Completeness
- Computational photography
- Compute Express Link
- Concision
- Conclusion
- Concrete syntax
- Concurrency
- Concurrent Programming
- Confidential computing
- Congestion control
- Container of
- Contents distribution network
- Context
- Context sensitive algorithm
- Control flow integrity
- Convolution layer
- Convoy effect
- Cookie
- Cooperation and Security Isolation of Library OSes for Multi-Process Applications
- Coordinated and efficient huge page management with ingens
- Copy on write
- Copy to user
- Core slicing: closing the gap between leaky confidential VMs and bare-metal cloud
- Corner point
- Correctness
- Corundum: Statically-Enforced Persistent Memory Safety
- Cost function
- Critical section
- Culling
- Cut
- Cyclic redoundancy check
- DASH
- DBMS
- DFS
- DINT: Fast In-Kernel Distributed Transactions with eBPF
- DMA
- DMZ
- DNS
- DNS Spoofing
- DNS 스푸핑
- DangZero: Efficient Use-After-Free Detection via Direct Page Table Access
- Data Link Layer
- Data Storage Structures
- Data Structures
- Database
- Database addressing
- Database management system
- Dead lock
- Deadlock
- Debloating Address Sanitizer
- Debugfs
- Decision making
- Delta Pointers: Buffer Overflow Checks Without the Checks
- Demand loading
- Demanding paging
- Demilitarized zone
- Dennard Scailing
- Design Issues in E-R model
- Designing New Operating Primitives to Improve Fuzzing Performance
- DiLOS: Do Not Trade Compatibility for Performance in Memory Disaggregation
- DieHard: Probabilistic Memory Safety for Unsafe Languages
- DieHarder: Securing the Heap
- Diff
- Differential fuzzing
- Differential testing
- Direct Access, High-Performance Memory Disaggregation with DIRECTCXL
- Direct memory access
- Directory
- Discriminative model
- Display
- Distributed ray tracing
- Do-It-Yourself Virtual Memory Translation
- Docker
- Domain name system
- Double Scheduling
- Dune: Safe User-level Access to Privileged CPU Features
- Dup
- Dynamic Memory Allocation
- Dynamic Programming
- Dynamic host configuration protocol
- Dynamic program analysis
- Dynamic programming
- Dynamic streaming over HTTP
- EBPF
- EBPF Misbehavior Detection: Fuzzing with a Specification-Based Oracle
- EBPF verifier
- ELF
- EMT: An OS Framework for New Memory Translation Architectures
- EPID
- EPT
- ERIM: Secure, efficient in-process isolation with protection keys (MPK)
- EXTMEM: Enabling Application-Aware Virtual Memory Management for Data-Intensive Applications
- Ebpf kptr
- Eden: Developer-Friendly Application-Integrated Far Memory
- Edge detection
- Edit Distance
- Eletronic Mail
- Emphasis
- Enclave
- Endianness
- Enhancing Memory Error Detection for Large-Scale Applications and Fuzz Testing
- Entity Relationship Model
- Epipolar Geometry
- Eventual consistency
- Evolving Operating Systems Towards Secure Kernel-Driver Interfaces
- Exception
- Exceptional Control Flow
- Exceptions and Processes
- Exec
- Executable and linkage format
- Exit
- Express
- Express Data Path
- Ext2
- Extended E-R model
- Extended User Interrupts (xUI): Fast and Flexible Notification without Polling
- Extended page table
- Extending Applications Safely and Efficiently
- Extensibility, safety and performance in the SPIN operating system
- Extension Framework for File Systems in User space
- FAASM: Lightweight Isolation for Efficient Stateful Serverless Computing
- FBMM: Making Memory Management Extensible With Filesystems
- FDM
- FFS
- FIFO
- FTP
- FaaS
- Fast, Flexible, and Practical Kernel Extensions
- Favocado: Fuzzing the Binding Code of JavaScript Engines Using Semantically Correct Test Cases
- Features
- FetchBPF: Customizable Prefetching Policies in Linux with eBPF
- Fibonacci Numbers
- Field sensitive algorithm
- File
- File-backed memory
- File descriptor
- File system
- File transfer protocol
- Filesystem
- Filesystem in userspace
- Finding Correctness Bugs in eBPF Verifier with Structured and Sanitized Program
- Finding Semantic Bugs in File Systems with an Extensible Fuzzing Framework
- Finite Automata
- First-class function
- First-order function
- First in first out
- Fixed point
- FlexOS: Towards Flexible OS Isolation
- Flynn's taxonomy
- Fork
- Fragmentation
- FreeGuard: A Faster Secure Heap Allocator
- FreeSentry: Protecting Against Use-After-Free Vulnerabilities Due to Dangling Pointers
- Fsck
- Ftrace
- Full virtualization
- Fully connected layer
- Function as a service
- Functions and Relations
- FuzzBench: An Open Fuzzer Benchmarking Platform and Service
- Fuzzer
- Fuzzing
- G1GC
- GC
- GCC
- GDB
- GDT
- GPU
- GRPC
- GRU
- GRUB
- Gapbs
- Garbage-First Garbage Collection
- Garbage Collection
- Garbage collection
- Gated recurrent unit
- Generalized NFA
- Genetic algorithm
- Global coherence
- Global descriptor table
- Global illumination
- Go-Back-N
- Go-pmem: Native support for programming persistent memory in go
- Governors
- Gradient decent
- Grammars
- Graph
- Graphics pipeline
- Gray-box testing
- Greedy algorithm