- Logical block addressing
- Logical logging
- Logistic regression
- Long mode
- Loop unrolling
- MBR
- MCS lock
- MESI 프로토콜
- MKTME
- MMIO
- MPEG-4
- MPI
- MPK
- MSR
- MTE
- MVCC
- Machine Learning
- Makefile
- MarkUs: Drop-in use-after-free prevention for low-level languages
- Mark and sweep
- Master boot record
- Maximum a posterior
- Maximum likelihood estimation
- Mechansim and policy
- Medium access control
- Memory Resource Management in VMware ESX Server
- Memory Tagging Extension
- Memory bloat
- Memory coherence
- Memory consistency
- Memory controller
- Memory mapped I/O
- Memory node
- Memory segmentation
- Merge sort
- Message passing
- Message passing interface
- Michael-Scott queue
- MineSweeper: A “Clean Sweep” for Drop-In Use-After-Free Prevention
- Minimax 알고리즘
- Mnemosyne: Lightweight persistent memory
- Model specific register
- Moore's law
- Multi-view geometry
- Multicore
- Multiversion concurrency control
- Mutex
- Mutrace
- My VM is Lighter (and Safer) than your Container
- NAT
- NDP
- NIC
- NPTL
- NUMA
- NVL-C: Static analysis techniques for efficient, correct programming of non-volatile main memory systems
- NVMe
- Naive Bayes classifiers
- Narrowing
- Native Posix Thread Library
- Near data processing
- Network address translation
- Network interface card
- Neuron network
- NoSQL
- Node.js
- Nooks: an architecture for reliable device drivers
- OOM
- OS
- OSv Optimizing the Operating System for Virtual Machines
- Object space
- Octree
- Oops
- OpenMP
- Operating System Support for Safe and Efficient Auxiliary Execution
- Operating system
- Optical flow
- Order
- Oscar: A Practical Page-Permissions-Based Scheme for Thwarting Dangling Pointers
- Out of memory
- Overlayfs
- P-state
- P2P
- PACTree: A High Performance Persistent Range Index Using PAC Guidelines
- PARSEC
- PCB
- PCI Passthrough
- PIO
- PKRU-safe: automatically locking down the heap between safe and unsafe languages
- PMDK
- POSIX Abstractions in Modern Operating Systems: The Old, the New, and the Missing
- POSIX Threads
- POST (HTTP)
- PUMM: Preventing Use-After-Free Using Execution Unit Partitioning
- Page eviction
- Page fault
- Page table
- Page table entry
- Para virtualization
- Parallel computing
- Paravirtualization
- Parity bit
- Partial order
- Partial order set
- Path finding
- Pattern matching
- Persistance memory
- Perspective projection
- Physical logging
- Pipe
- Plug and play
- Pmem
- PnP
- PoC
- Pointer authentication code
- Popek and Goldberg 조건
- Port
- Power Good Signal
- Preemption
- Preventing Use-After-Free Attacks with Fast Forward Allocation
- Preventing Use-after-free with Dangling Pointers Nullification
- Privbox: Faster System Calls Through Sandboxed Privileged Execution
- Process
- Process control block
- Program
- Programmed Input/Output
- Proof of concept
- Protocol
- Proxy server
- Pthread
- Pushing Performance Isolation Boundaries into Application with pBox
- Qemu
- QoS
- Quality of service
- Quick sort
- RAM
- RDMA
- RHS*
- ROM
- RTP
- Race condition
- Ramdisk
- Reactive/Tactic/Strategy
- Real-time transport protocol
- Real mode
- Recent Advances in Adaptive Sampling and Reconstruction for Monte Carlo Rendering
- Reconstruction filter
- Recursive
- Recursive Page Table
- Redis
- Register
- Remote attestation
- Rendering equation
- Research proposal
- Rethinking the Library OS from the Top Down
- Return oriented programming
- Ridge 회귀 모형
- Router
- Row hammer
- Rule based system
- Rule of inference
- Ryoan: A Distributed Sandbox for Untrusted Computation on Secret Data
- SFI
- SGX
- SHELTER: Extending Arm CCA with Isolation in User Space
- SLS
- SMTP
- SNI 차단
- SPDK
- SR-IOV
- SSD
- SSL
- SVA
- Scala
- Scale-Out Acceleration for Machine Learning
- Scale-invariant feature transform
- Scope
- Seccomp
- Secure Virtual Architecture: A Safe Execution Environment for Commodity Operating Systems
- Secure encrypted virtualization
- Secure socket layer
- Selection sort
- Semantics
- Semaphore
- Seqlock
- Session initiation protocol
- Setjmp/longjmp
- Setuid
- Shadow page table
- Shadow paging
- Shadow stack
- Shaker sort
- Shared memory
- Sharing
- Sharing and Protection in a Single-Address-Space Operating System
- Shell sort
- Shielding applications from an untrusted cloud with Haven
- Shim
- Shinjuku: Preemptive Scheduling for μsecond-scale Tail Latency
- Signal
- Simple Mail Transfer Protocol
- Simulated annealing
- Single level storage
- Singularity: Rethinking the Software Stack
- Sobel edge detection
- Socket
- Soft link
- Software fault isolation
- Software guard extensions
- Solid state drive
- Sort
- Soundness
- Specification and verification in the field: Applying formal methods to BPF just-in-time compilers in the Linux kernel
- Spin lock
- Stack
- Stall
- Steensgaard's algorithm
- Stereo matching
- Storage Performance Development Kit
- Strace
- Strata: A Cross Media File System
- Style
- Super block
- Super resolution
- Support vector machine
- Syntax
- System failure
- Systolic array
- TAL
- TBA*
- TCB
- TCP/IP 포트번호
- TDM
- TDX
- TDX Module
- TLB
- TME
- TOCTOU
- TPM
- TXT
- Taint analysis
- Temporal memory error
- Terminal and nonterminal symbols
- Test and set
- Test and test and set
- The Aurora Single Level Store Operating System
- The Design and Implementation of Hyperupcalls
- The Multikernel: A new OS architecture for scalable multicore systems
- The UNIX Time-Sharing System
- The performance of the Container Shipping I/O system
- Thread
- Thread control block
- Throughput
- Throughput and latency
- Thundering Herd
- Ticket lock
- Time-bounded A*
- Time of check to time of use
- Total memory encryption
- Train error
- Transaction
- Translate lookaside buffer
- Transparent
- Trap and emulate
- Tree
- Treiber's stack
- Treiber stack
- Triangle rasterization
- TrustZone
- Trust Domain Extensions
- Trust domain extensions
- Trusted computing base
- Trusted execution technology
- Trusted platform module
- UAF
- UBfuzz: Finding Bugs in Sanitizer Implementations
- UDP
- UNIX
- UV 매핑
- Unikernel
- Unikernel Linux (UKL)
- Unikernels: Library operating systems for the cloud
- Unikraft: Fast, Specialized Unikernels the Easy Way
- Uniq
- Use after free
- User datagram protocol
- Userfaultfd
- VDSO
- VFS
- VISC
- VMI
- VM exit reasons
- Viewing transformation
- Viewport transformation
- Virtio
- Virtual dynamically linked shared object
- Virtual file system
- Virtual instruction set computing
- Virtual machine control data structures
- Virtual machine introspection
- Virtual memory
- Vmlinux
- VoIP
- Vscode 설정
- Wait
- Wc
- Wedge: Splitting Applications into Reduced-Privilege Compartments
- Widening
- Wiener deconvolution
- Wildcard
- Work stealing
- Working set
- World space
- Write back
- Write through
- X-Containers: Breaking Down Barriers to Improve Performance and Isolation of Cloud-Native Containers
- Xargs
- Xen and the Art of Virtualization
- Z-Buffer
- Zero copy
- 가비지 컬렉터
- 가우스 소거법
- 갈루아 대응
- 그라디언트
- 그래프
- 그래픽스 파이프라인
- 기계 학습
- 기울기 하강
- 나이퀴스트 정리
- 난수
- 네트워크 구조
- 네트워크 보안
- 네트워크 보안 원칙
- 논문 영어 표현
- 뉴런 네트워크
- 담금질 기법
- 대문
- 데나드 스케일링
- 데드락
- 데이터 통신 방식
- 동적 계획법
- 동형 암호
- 디렉토리
- 디지털 서명
- 딥러닝
- 라우터