{FLUSH+ RELOAD}: A high resolution, low noise, l3 cache {Side-Channel} attack
Sharing memory pages between non-trusting processes is a common method of reducing
the memory footprint of multi-tenanted systems. In this paper we demonstrate that, due to a …
the memory footprint of multi-tenanted systems. In this paper we demonstrate that, due to a …
Shuffler: fast and deployable continuous code {re-randomization}
D Williams-King, G Gobieski, K Williams-King… - … USENIX Symposium on …, 2016 - usenix.org
While code injection attacks have been virtually eliminated on modern systems, programs
today remain vulnerable to code reuse attacks. Particularly pernicious are Just-In-Time ROP …
today remain vulnerable to code reuse attacks. Particularly pernicious are Just-In-Time ROP …
Timely rerandomization for mitigating memory disclosures
D Bigelow, T Hobson, R Rudd, W Streilein… - Proceedings of the 22nd …, 2015 - dl.acm.org
Address Space Layout Randomization (ASLR) can increase the cost of exploiting memory
corruption vulnerabilities. One major weakness of ASLR is that it assumes the secrecy of …
corruption vulnerabilities. One major weakness of ASLR is that it assumes the secrecy of …
Taming performance variability
The performance of compute hardware varies: software run repeatedly on the same server
(or a different server with supposedly identical parts) can produce performance results that …
(or a different server with supposedly identical parts) can produce performance results that …
Oxymoron: Making {Fine-Grained} Memory Randomization Practical by Allowing Code Sharing
M Backes, S Nürnberger - 23rd USENIX security symposium (USENIX …, 2014 - usenix.org
The latest effective defense against code reuse attacks is fine-grained, per-process memory
randomization. However, such process randomization prevents code sharing since there is …
randomization. However, such process randomization prevents code sharing since there is …
Stochastic optimization of floating-point programs with tunable precision
The aggressive optimization of floating-point computations is an important problem in high-
performance computing. Unfortunately, floating-point instruction sets have complicated …
performance computing. Unfortunately, floating-point instruction sets have complicated …
Coz finding code that counts with causal profiling
C Curtsinger, ED Berger - Proceedings of the 25th Symposium on …, 2015 - dl.acm.org
Improving performance is a central concern for software developers. To locate optimization
opportunities, developers rely on software profilers. However, these profilers only report …
opportunities, developers rely on software profilers. However, these profilers only report …
Virtual machine warmup blows hot and cold
Virtual Machines (VMs) with Just-In-Time (JIT) compilers are traditionally thought to execute
programs in two phases: the initial warmup phase determines which parts of a program …
programs in two phases: the initial warmup phase determines which parts of a program …
Unicorn: Reasoning about configurable system performance through the lens of causality
Modern computer systems are highly configurable, with the total variability space sometimes
larger than the number of atoms in the universe. Understanding and reasoning about the …
larger than the number of atoms in the universe. Understanding and reasoning about the …
Quantifying TPC-H choke points and their optimizations
TPC-H continues to be the most widely used benchmark for relational OLAP systems. It
poses a number of challenges, also known as" choke points", which database systems have …
poses a number of challenges, also known as" choke points", which database systems have …