Fog computing: a comprehensive architectural survey

P Habibi, M Farhoudi, S Kazemian, S Khorsandi… - IEEE …, 2020 - ieeexplore.ieee.org
Fog computing is an emerging technology to address computing and networking bottlenecks
in large scale deployment of IoT applications. It is a promising complementary computing …

Perffuzz: Automatically generating pathological inputs

C Lemieux, R Padhye, K Sen, D Song - Proceedings of the 27th ACM …, 2018 - dl.acm.org
Performance problems in software can arise unexpectedly when programs are provided with
inputs that exhibit worst-case behavior. A large body of work has focused on diagnosing …

Detecting Asymmetric Application-layer {Denial-of-Service} Attacks {In-Flight} with {FineLame}

HM Demoulin, I Pedisich, N Vasilakis, V Liu… - 2019 USENIX Annual …, 2019 - usenix.org
Denial of service (DoS) attacks increasingly exploit algorithmic, semantic, or implementation
characteristics dormant in victim applications, often with minimal attacker resources …

Using {Trātṛ} to tame Adversarial Synchronization

Y Patel, C Ye, A Sinha, A Matthews… - 31st USENIX Security …, 2022 - usenix.org
We show that Linux containers are vulnerable to a new class of attacks–synchronization
attacks–that exploit kernel synchronization to harm application performance, where an …

Practical and accurate runtime application protection against dos attacks

M Elsabagh, D Fleck, A Stavrou, M Kaplan… - … Symposium on Research …, 2017 - Springer
Abstract Software Denial-of-Service (DoS) attacks use maliciously crafted inputs aiming to
exhaust available resources of the target software. These application-level DoS attacks have …

On early detection of application-level resource exhaustion and starvation

M Elsabagh, D Barbará, D Fleck, A Stavrou - Journal of Systems and …, 2018 - Elsevier
Software systems are often engineered and tested for functionality under normal rather than
worst-case conditions. This makes the systems vulnerable to denial-of-service attacks …

Why software dos is hard to fix: Denying access in embedded android platforms

R Johnson, M Elsabagh, A Stavrou - … , ACNS 2016, Guildford, UK, June 19 …, 2016 - Springer
A new class of software Denial of Service (DoS) attacks against Android platforms was
recently discovered, where the attacks can force the victim device unresponsive, target and …

[图书][B] Fair and Secure Synchronization for Non-Cooperative Concurrent Systems

Y Patel - 2021 - search.proquest.com
In shared environments such as operating systems, servers (databases, key-value stores),
and hypervisors, multiple tenants with varied requirements compete to access the shared …

[图书][B] Abstractions and Algorithms for Specializing Dynamic Program Analysis and Random Fuzz Testing

RR Padhye - 2020 - search.proquest.com
Software bugs affect the security, performance, and reliability of critical systems that much of
our society depends on. In practice, the predominant method of ensuring software quality is …

Service Boosters: Library Operating Systems for the Datacenter

HM Demoulin - 2021 - search.proquest.com
Cloud applications are taking an increasingly important place our technology and economic
landscape. Consequently, they are subject to stringent performance requirements. High tail …