{FLUSH+ RELOAD}: A high resolution, low noise, l3 cache {Side-Channel} attack

Y Yarom, K Falkner - 23rd USENIX security symposium (USENIX security …, 2014 - usenix.org
Sharing memory pages between non-trusting processes is a common method of reducing
the memory footprint of multi-tenanted systems. In this paper we demonstrate that, due to a …

Shuffler: fast and deployable continuous code {re-randomization}

D Williams-King, G Gobieski, K Williams-King… - … USENIX Symposium on …, 2016 - usenix.org
While code injection attacks have been virtually eliminated on modern systems, programs
today remain vulnerable to code reuse attacks. Particularly pernicious are Just-In-Time ROP …

Timely rerandomization for mitigating memory disclosures

D Bigelow, T Hobson, R Rudd, W Streilein… - Proceedings of the 22nd …, 2015 - dl.acm.org
Address Space Layout Randomization (ASLR) can increase the cost of exploiting memory
corruption vulnerabilities. One major weakness of ASLR is that it assumes the secrecy of …

Taming performance variability

A Maricq, D Duplyakin, I Jimenez, C Maltzahn… - … USENIX Symposium on …, 2018 - usenix.org
The performance of compute hardware varies: software run repeatedly on the same server
(or a different server with supposedly identical parts) can produce performance results that …

Oxymoron: Making {Fine-Grained} Memory Randomization Practical by Allowing Code Sharing

M Backes, S Nürnberger - 23rd USENIX security symposium (USENIX …, 2014 - usenix.org
The latest effective defense against code reuse attacks is fine-grained, per-process memory
randomization. However, such process randomization prevents code sharing since there is …

Stochastic optimization of floating-point programs with tunable precision

E Schkufza, R Sharma, A Aiken - ACM SIGPLAN Notices, 2014 - dl.acm.org
The aggressive optimization of floating-point computations is an important problem in high-
performance computing. Unfortunately, floating-point instruction sets have complicated …

Coz finding code that counts with causal profiling

C Curtsinger, ED Berger - Proceedings of the 25th Symposium on …, 2015 - dl.acm.org
Improving performance is a central concern for software developers. To locate optimization
opportunities, developers rely on software profilers. However, these profilers only report …

Virtual machine warmup blows hot and cold

E Barrett, CF Bolz-Tereick, R Killick, S Mount… - Proceedings of the ACM …, 2017 - dl.acm.org
Virtual Machines (VMs) with Just-In-Time (JIT) compilers are traditionally thought to execute
programs in two phases: the initial warmup phase determines which parts of a program …

Unicorn: Reasoning about configurable system performance through the lens of causality

MS Iqbal, R Krishna, MA Javidian, B Ray… - Proceedings of the …, 2022 - dl.acm.org
Modern computer systems are highly configurable, with the total variability space sometimes
larger than the number of atoms in the universe. Understanding and reasoning about the …

Quantifying TPC-H choke points and their optimizations

M Dreseler, M Boissier, T Rabl, M Uflacker - Proceedings of the VLDB …, 2020 - dl.acm.org
TPC-H continues to be the most widely used benchmark for relational OLAP systems. It
poses a number of challenges, also known as" choke points", which database systems have …