The recent rise of byte-addressable non-volatile memory technologies is blurring the dichotomy between memory and storage. In particular, they allow programmers to have …
The Rowhammer bug is a reliability issue in DRAM cells that can enable an unprivileged adversary to flip the values of bits in neighboring rows on the memory module. Previous …
We design and develop ObliVM, a programming framework for secure computation. ObliVM offers a domain specific language designed for compilation of programs into efficient …
Several system-level operations trigger bulk data copy or initialization. Even though these bulk data operations do not require any computation, current systems transfer a large …
Android malware evolution has been neglected by the available data sets, thus providing a static snapshot of a non-stationary phenomenon. The impact of the time variable has not had …
New hardware primitives such as Intel SGX secure a user-level process in presence of an untrusted or compromised OS. Such" enclaved execution" systems are vulnerable to several …
G Hertel, S Niedner, S Herrmann - Research policy, 2003 - Elsevier
The motives of 141 contributors to a large Open Source Software (OSS) project (the Linux kernel) was explored with an Internet-based questionnaire study. Measured factors were …
A Beloglazov, R Buyya - … on Cluster, Cloud and Grid Computing, 2010 - ieeexplore.ieee.org
Rapid growth of the demand for computational power has led to the creation of large-scale data centers. They consume enormous amounts of electrical power resulting in high …
Computer Systems: A Programmer's Perspective Page 1 Computer Systems A Programmer’s Perspective Randal E. Bryant Carnegie Mellon University David R. O’Hallaron Carnegie Mellon …