Carbon-aware memory placement
The carbon footprint of software activities is determined by embodied and operational
emissions of hardware resources. This paper presents cMemento, a concept that enables …
emissions of hardware resources. This paper presents cMemento, a concept that enables …
AnyCall: Fast and flexible system-call aggregation
L Gerhorst, B Herzog, S Reif… - Proceedings of the 11th …, 2021 - dl.acm.org
Operating systems rely on system calls to allow the controlled communication of isolated
processes with the kernel and other processes. Every system call includes a processor …
processes with the kernel and other processes. Every system call includes a processor …
KernelSnitch: Side-Channel Attacks on Kernel Data Structures
L Maar, J Juffinger, T Steinbauer… - … 2025: NDSS 2025, 2025 - graz.elsevierpure.com
The sharing of hardware elements, such as caches, is known to introduce microarchitectural
side-channel leakage. One approach to eliminate this leakage is to not share hardware …
side-channel leakage. One approach to eliminate this leakage is to not share hardware …
Detection of Micro-Architectural Attacks in Resource-Limited Devices with a Local-Remote Security Mechanism
NF Polychronou - 2023 - theses.hal.science
IoT and IIoT have made their way into our daily lives, and with them the dangers associated
with their use. These usually inexpensive devices often lack security features or security …
with their use. These usually inexpensive devices often lack security features or security …
Exploiting Metaobjects to Reinforce Data Leakage Attacks
Reflective features in modern programming languages allow programs to introspect and
modify their own structures and behavior during runtime. As these self-referential …
modify their own structures and behavior during runtime. As these self-referential …
[HTML][HTML] Revisiting the effects of the spectre and meltdown patches using the top-down microarchitectural method and purchasing power parity theory
YA Huerta, DJ Lilja - BenchCouncil Transactions on Benchmarks …, 2021 - Elsevier
Software patches are made available to fix security vulnerabilities, enhance performance,
and usability. Previous works focused on measuring the performance effect of patches on …
and usability. Previous works focused on measuring the performance effect of patches on …
[PDF][PDF] Sustaining security and safety in ICT: A quest for terminology, objectives, and limits
JT Mühlberg - LIMITS'2022, 2022 - assets.pubpub.org
Security and safety of system are important and intertwined concepts in the world of
computing. In recent years, the terms “sustainable security” and “sustainable safety” came …
computing. In recent years, the terms “sustainable security” and “sustainable safety” came …
[PDF][PDF] Dynamic Reconfiguration of Hardware-Vulnerability Mitigations in the Linux Kernel
H Hofmeier - 2022 - sys.cs.fau.de
Providing secure systems, for example, in computing centers, is an essential task of service
providers. Vulnerabilities threatening secure execution are not only located in defective …
providers. Vulnerabilities threatening secure execution are not only located in defective …
Spectre and Meltdown Detection Using Explainable AI
Spectre and Meltdown attacks exploit security vulnerabilities in architectural features to gain
unauthorized memory access. While there are promising defense mechanisms against such …
unauthorized memory access. While there are promising defense mechanisms against such …
[PDF][PDF] Modern Concurrency Platforms Require Modern System-Call Techniques
Writing well-maintainable parallel programs that efficiently utilize many processor cores is
still a significant challenge. Threads are hard to use, and so are event-based schemes …
still a significant challenge. Threads are hard to use, and so are event-based schemes …