- (State of) The Art of War: Offensive Techniques in Binary Analysis
- 16진법
- 2022 ebpf summit alexei starovoitov
- 2022 ebpf summit daniel xu
- 2nd Algorithm
- A* 알고리즘
- A20 라인
- ABA Problem
- ACID
- ACPI
- AIFM: High-Performance, Application-Integrated Far Memory
- ALOHA
- APIC
- ARM Confidential compute architecture
- AWK
- AWS Nitro Enclaves
- A Robust and Efficient Defense against Use-after-Free Exploits via Concurrent Pointer Sweeping
- A survey of procedural noise functions
- Abstract interpretation
- Abstraction
- Actions
- Activation function
- Additive increase multiplicative decrease
- Address resolution protocol
- Address space layout randomization
- Advanced vector extensions
- Anderson algorithm
- Anonymous memory
- AppArmor
- Application-Informed Kernel Synchronization Primitives
- Asmlinkage
- Attestation
- B-tree
- BASE
- BPF Type Format
- BUDAlloc: Defeating Use-After-Free Bugs by Decoupling Virtual Address Management from Kernel
- Backus-Naur form
- Backward propagation
- Bad unlock balance
- Batch normalization
- Batching
- Bernstein's Conditions
- Best-first search
- Beyond a Gaussian Denoiser: Residual Learning of Deep CNN for Image Denoising
- Beyond malloc efficiency to fleet efficiency: a hugepage-aware memory allocator
- Bifrost: Analysis and Optimization of Network I/O Tax in Confidential Virtual Machines
- Binary Compatibility
- Binary decision rule
- Binary search
- Binary translation
- Binary tree
- Bit Fusion: Bit-Level Dynamically Composable Architecture for Accelerating Deep Neural Network
- Bit Fusion: Bit-Level Dynamically Composable Architecture for Accelerating Deep Neural Networks
- BlackBox: A Container Security Monitor for Protecting Containers on Untrusted Operating Systems
- Block device
- Border gateway protocol
- Bounding volume hierarchy
- Bubble sort
- Buddy allocator
- Bump map
- C-state
- C4: The Continuously Concurrent Compacting Collector
- CAP 정리
- CBMM: Financial Advice for Kernel Memory Managers
- CPUID
- CRCount: Pointer Invalidation with Reference Counting to Mitigate Use-after-free in Legacy C/C++
- CSMA/CD
- CUDA
- Cache line
- Camera space
- Canonical view volume
- Capsicum: practical capabilities for UNIX
- Card table
- Carrier sense multiple access/collision detection
- Cgroup
- Character device
- Characterizing a Memory Allocator at Warehouse Scale
- Characters
- Chroot
- Classless inter-domain routing
- Cling: A Memory Allocator to Mitigate Dangling Pointers
- Clipping
- Clock Eviction Algorithm
- Clock nanosleep
- Cmp
- Cohesion and coherence
- Cohort Lock
- Completeness
- Computational photography
- Compute Express Link
- Concurrency
- Confidential computing
- Container of
- Contents distribution network
- Context
- Context sensitive algorithm
- Convolution layer
- Convoy effect
- Cooperation and Security Isolation of Library OSes for Multi-Process Applications
- Coordinated and efficient huge page management with ingens
- Copy on write
- Copy to user
- Core slicing: closing the gap between leaky confidential VMs and bare-metal cloud
- Corner point
- Correctness
- Corundum: Statically-Enforced Persistent Memory Safety
- Cost function
- Critical section
- Culling
- Cut
- Cyclic redoundancy check
- DINT: Fast In-Kernel Distributed Transactions with eBPF
- DNS Spoofing
- DangZero: Efficient Use-After-Free Detection via Direct Page Table Access
- Database addressing
- Database management system
- Dead lock
- Debugfs
- Decision making
- Demand loading
- Demanding paging
- Demilitarized zone
- Dennard Scailing
- DieHard: Probabilistic Memory Safety for Unsafe Languages
- DieHarder: Securing the Heap
- Diff
- Direct Access, High-Performance Memory Disaggregation with DIRECTCXL
- Direct memory access
- Discriminative model
- Display
- Distributed ray tracing
- Docker
- Domain name system
- Double Scheduling
- Dune: Safe User-level Access to Privileged CPU Features
- Dup
- Dynamic host configuration protocol
- Dynamic program analysis
- Dynamic streaming over HTTP
- EBPF
- EBPF verifier
- EPID
- ERIM: Secure, efficient in-process isolation with protection keys (MPK)
- EXTMEM: Enabling Application-Aware Virtual Memory Management for Data-Intensive Applications
- Ebpf kptr
- Edge detection
- Emphasis
- Enclave
- Epipolar Geometry
- Eventual consistency
- Exec
- Executable and linkage format
- Exit
- Express
- Express Data Path
- Ext2
- Extended page table
- Extensibility, safety and performance in the SPIN operating system
- Extension Framework for File Systems in User space
- FDM
- FFS
- Fast, Flexible, and Practical Kernel Extensions
- Features
- FetchBPF: Customizable Prefetching Policies in Linux with eBPF
- Field sensitive algorithm
- File-backed memory
- File descriptor
- File transfer protocol
- Filesystem in userspace
- First-class function
- First-order function
- First in first out
- Fixed point
- Fork
- FreeGuard: A Faster Secure Heap Allocator
- FreeSentry: Protecting Against Use-After-Free Vulnerabilities Due to Dangling Pointers
- Fsck
- Ftrace
- Fully connected layer
- Function as a service
- G1GC
- GCC
- GDB
- GPU
- GRPC
- GRUB
- Gapbs
- Garbage collection
- Global descriptor table
- Global illumination
- Go-Back-N
- Go-pmem: Native support for programming persistent memory in go
- Governors
- HTTP 응답 코드
- HXDP: Efficient software packet processing on FPGA NICs
- Hardening Hypervisors with Ombro
- Hardware-assisted Load Balancing for Energy-efficient SNIC-Host Cooperative Computing
- Hardware-based virtualization
- Hardware virtualization
- Harmonizing Performance and Isolation in Microkernels with Efficient Intra-kernel Isolation and Communication
- HawkEye: Efficient Fine-grained OS Support for Huge Pages
- Hazard pointer
- Hdparm
- Heap sort
- Heartbleed
- Heuristic search
- High Velocity Kernel File Systems with Bento
- High dynamic range
- Hill climbing
- Hill climbing search
- Htree
- Huge page
- HyperText transfer protocol
- Hypercall
- I/O Virtualization
- IOMMU
- IPSec
- IPv4
- IPv6
- IX: A Protected Dataplane Operating System for High Throughput and Low Latency
- Iago Attacks: Why the System Call API is a Bad Untrusted RPC Interface
- Indentifier
- Independent software vendor
- Infinite loop
- Init
- Insertion sort
- Instruction-level parallelism
- Intel Memory Protection Key
- Intel PT
- Intel software guard extensions
- Inter Process Communication
- Interface description language
- Internet control message protocol
- Internet protocol
- Internet service provider
- Interrupt
- Interrupt descriptor table
- Interrupt vector
- Intrusion detection system
- Isolation
- J-NVM: Off-heap Persistent Objects in Java
- Jitter
- K-Means algorithm
- K-NN
- K-d 트리
- KSplit: Automating Device Driver Isolation
- Kdump
- Keeping Safe Rust Safe with Galeed
- Kernel address sanitizer
- Kernel address space layout randomization
- Kernel based virtual machine
- Kernel shared memory
- Kmalloc
- Kprobe
- LRTA*
- LXDs: Towards Isolation of Kernel Subsystems
- Lasso 회귀 모형
- Last in last out
- Latency 101
- Latex
- LeapIO: Efficient and Portable Virtual NVMe Storage on ARM SoCs
- LibMPK: Software abstraction for intel memory protection keys (Intel MPK)
- Light-Weight Contexts: An OS Abstraction for Safety and Performance
- Light field
- Line of Code
- Linear search
- Linux Security Modules
- Live lock
- Ln
- Local search
- Lock
- Lock free
- Logical block addressing
- Logical logging
- Logistic regression
- Loop unrolling
- MCS lock
- MESI 프로토콜
- MPEG-4
- Makefile
- MarkUs: Drop-in use-after-free prevention for low-level languages
- Mark and sweep
- Master boot record
- Maximum a posterior
- Maximum likelihood estimation
- Mechansim and policy
- Medium access control
- Memory Resource Management in VMware ESX Server
- Memory Tagging Extension
- Memory bloat
- Memory consistency
- Memory controller
- Memory mapped I/O
- Memory segmentation
- Merge sort
- Message passing
- Message passing interface
- Michael-Scott queue
- MineSweeper: A “Clean Sweep” for Drop-In Use-After-Free Prevention
- Minimax 알고리즘
- Mnemosyne: Lightweight persistent memory
- Model specific register
- Multi-view geometry
- Multicore
- Multiversion concurrency control
- Mutrace
- My VM is Lighter (and Safer) than your Container
- NUMA
- NVL-C: Static analysis techniques for efficient, correct programming of non-volatile main memory systems
- NVMe
- Naive Bayes classifiers
- Narrowing
- Native Posix Thread Library
- Near data processing
- Network address translation
- Network interface card
- NoSQL
- Node.js
- Nooks: an architecture for reliable device drivers
- OSv Optimizing the Operating System for Virtual Machines
- Object space
- Octree
- Oops
- OpenMP
- Operating System Support for Safe and Efficient Auxiliary Execution
- Operating system
- Optical flow
- Order
- Oscar: A Practical Page-Permissions-Based Scheme for Thwarting Dangling Pointers
- Out of memory
- Overlayfs
- P-state
- P2P
- PACTree: A High Performance Persistent Range Index Using PAC Guidelines
- PARSEC
- PCI Passthrough
- PKRU-safe: automatically locking down the heap between safe and unsafe languages
- PMDK
- POSIX Abstractions in Modern Operating Systems: The Old, the New, and the Missing
- POSIX Threads
- POST (HTTP)
- PUMM: Preventing Use-After-Free Using Execution Unit Partitioning
- Page eviction
- Page fault
- Parity bit