(새 문서: 분류: 컴퓨터 시스템 == 정리된 사이트 == http://www.cs.technion.ac.il/~dan/index_sysvenues_deadline.html https://people.engr.tamu.edu/guofei/sec_conf_stat.htm == 사용하는 Metrics (2023.1.25 update) == ; 개요 * Breif summary of overall paper. ; Motivation * What is the problem your work attacks? * Why is it an important problem? ; Importance * Limitations of the state of the art in this topic * What are its limits? * What make this topic distinguished f...) |
편집 요약 없음 |
||
7번째 줄: | 7번째 줄: | ||
== 사용하는 Metrics (2023.1.25 update) == | == 사용하는 Metrics (2023.1.25 update) == | ||
; 개요 | ; 개요 | ||
* | * Brief summary of the overall paper. | ||
; Motivation | ; Motivation | ||
* What is the problem your work attacks? | * What is the problem your work attacks? | ||
14번째 줄: | 14번째 줄: | ||
* Limitations of the state of the art in this topic | * Limitations of the state of the art in this topic | ||
* What are its limits? | * What are its limits? | ||
* What | * What makes this topic distinguished from other papers? | ||
* What is the challenge of this paper? | * What is the challenge of this paper? | ||
; Main Idea | ; Main Idea | ||
23번째 줄: | 23번째 줄: | ||
* Summarize the design section of the paper. | * Summarize the design section of the paper. | ||
; Result | ; Result | ||
* What are the most | * What are the most important one or two empirical or theoretical results of this approach? | ||
; Contribution | ; Contribution (Conclusion) | ||
* What | * What contributions does this paper make to the state of the art? | ||
* Its advantages over past work, including how it overcomes | * Its advantages over past work, including how it overcomes the limitations. | ||
* What topics or questions this paper | * What topics or questions does this paper open? | ||
; Criticize | ; Criticize (Conclusion) | ||
* What | * What are the limitations of this paper? | ||
* Is there weakness or missing points in this paper? | * Is there a weakness or missing points in this paper? | ||
* What is strength and weakness of this paper? | * What is the strength and weakness of this paper? | ||
* Is paper | * Is the paper overall well-organized? | ||
; Reference | ; Reference | ||
* Reference if there exists <ref>https://asplos-conference.org/2022/wp-content/uploads/2022/asplos22-extended-abstract-template.pdf</ref>. | * Reference if there exists <ref>https://asplos-conference.org/2022/wp-content/uploads/2022/asplos22-extended-abstract-template.pdf</ref>. | ||
== Reference == | == Reference == |
2023년 6월 8일 (목) 04:04 판
정리된 사이트
http://www.cs.technion.ac.il/~dan/index_sysvenues_deadline.html https://people.engr.tamu.edu/guofei/sec_conf_stat.htm
사용하는 Metrics (2023.1.25 update)
- 개요
- Brief summary of the overall paper.
- Motivation
- What is the problem your work attacks?
- Why is it an important problem?
- Importance
- Limitations of the state of the art in this topic
- What are its limits?
- What makes this topic distinguished from other papers?
- What is the challenge of this paper?
- Main Idea
- What are the one or two key new insights in this paper?
- How does it advance the state of the art?
- What makes it more effective than past approaches?
- Design
- Summarize the design section of the paper.
- Result
- What are the most important one or two empirical or theoretical results of this approach?
- Contribution (Conclusion)
- What contributions does this paper make to the state of the art?
- Its advantages over past work, including how it overcomes the limitations.
- What topics or questions does this paper open?
- Criticize (Conclusion)
- What are the limitations of this paper?
- Is there a weakness or missing points in this paper?
- What is the strength and weakness of this paper?
- Is the paper overall well-organized?
- Reference
- Reference if there exists [1].
Reference
"시스템 논문" 분류에 속하는 문서
다음은 이 분류에 속하는 문서 92개 가운데 92개입니다.
A
B
- Beyond malloc efficiency to fleet efficiency: a hugepage-aware memory allocator
- Bifrost: Analysis and Optimization of Network I/O Tax in Confidential Virtual Machines
- Bit Fusion: Bit-Level Dynamically Composable Architecture for Accelerating Deep Neural Network
- Bit Fusion: Bit-Level Dynamically Composable Architecture for Accelerating Deep Neural Networks
- BlackBox: A Container Security Monitor for Protecting Containers on Untrusted Operating Systems
- BUDAlloc: Defeating Use-After-Free Bugs by Decoupling Virtual Address Management from Kernel
C
- C4: The Continuously Concurrent Compacting Collector
- Capsicum: practical capabilities for UNIX
- CBMM: Financial Advice for Kernel Memory Managers
- Characterizing a Memory Allocator at Warehouse Scale
- Cling: A Memory Allocator to Mitigate Dangling Pointers
- Cooperation and Security Isolation of Library OSes for Multi-Process Applications
- Coordinated and efficient huge page management with ingens
- Core slicing: closing the gap between leaky confidential VMs and bare-metal cloud
- Corundum: Statically-Enforced Persistent Memory Safety
- CRCount: Pointer Invalidation with Reference Counting to Mitigate Use-after-free in Legacy C/C++
D
- DangZero: Efficient Use-After-Free Detection via Direct Page Table Access
- DieHard: Probabilistic Memory Safety for Unsafe Languages
- DieHarder: Securing the Heap
- DINT: Fast In-Kernel Distributed Transactions with eBPF
- Direct Access, High-Performance Memory Disaggregation with DIRECTCXL
- Dune: Safe User-level Access to Privileged CPU Features
E
F
H
- Hardening Hypervisors with Ombro
- Harmonizing Performance and Isolation in Microkernels with Efficient Intra-kernel Isolation and Communication
- HawkEye: Efficient Fine-grained OS Support for Huge Pages
- High Velocity Kernel File Systems with Bento
- HXDP: Efficient software packet processing on FPGA NICs
I
L
M
N
O
P
- PACTree: A High Performance Persistent Range Index Using PAC Guidelines
- PKRU-safe: automatically locking down the heap between safe and unsafe languages
- POSIX Abstractions in Modern Operating Systems: The Old, the New, and the Missing
- Preventing Use-After-Free Attacks with Fast Forward Allocation
- Preventing Use-after-free with Dangling Pointers Nullification
- Privbox: Faster System Calls Through Sandboxed Privileged Execution
- PUMM: Preventing Use-After-Free Using Execution Unit Partitioning
- Pushing Performance Isolation Boundaries into Application with pBox
R
S
- Scale-Out Acceleration for Machine Learning
- Secure Virtual Architecture: A Safe Execution Environment for Commodity Operating Systems
- Sharing and Protection in a Single-Address-Space Operating System
- SHELTER: Extending Arm CCA with Isolation in User Space
- Shielding applications from an untrusted cloud with Haven
- Shinjuku: Preemptive Scheduling for μsecond-scale Tail Latency
- Singularity: Rethinking the Software Stack
- Specification and verification in the field: Applying formal methods to BPF just-in-time compilers in the Linux kernel
- Strata: A Cross Media File System