Carbon-aware memory placement

S Köhler, B Herzog, H Herzog, M Vögele… - ACM SIGENERGY …, 2024 - dl.acm.org
The carbon footprint of software activities is determined by embodied and operational
emissions of hardware resources. This paper presents cMemento, a concept that enables …

AnyCall: Fast and flexible system-call aggregation

L Gerhorst, B Herzog, S Reif… - Proceedings of the 11th …, 2021 - dl.acm.org
Operating systems rely on system calls to allow the controlled communication of isolated
processes with the kernel and other processes. Every system call includes a processor …

KernelSnitch: Side-Channel Attacks on Kernel Data Structures

L Maar, J Juffinger, T Steinbauer… - … 2025: NDSS 2025, 2025 - graz.elsevierpure.com
The sharing of hardware elements, such as caches, is known to introduce microarchitectural
side-channel leakage. One approach to eliminate this leakage is to not share hardware …

Detection of Micro-Architectural Attacks in Resource-Limited Devices with a Local-Remote Security Mechanism

NF Polychronou - 2023 - theses.hal.science
IoT and IIoT have made their way into our daily lives, and with them the dangers associated
with their use. These usually inexpensive devices often lack security features or security …

Exploiting Metaobjects to Reinforce Data Leakage Attacks

H Jeong, H Kim, J Hur - … of the 25th International Symposium on …, 2022 - dl.acm.org
Reflective features in modern programming languages allow programs to introspect and
modify their own structures and behavior during runtime. As these self-referential …

[HTML][HTML] Revisiting the effects of the spectre and meltdown patches using the top-down microarchitectural method and purchasing power parity theory

YA Huerta, DJ Lilja - BenchCouncil Transactions on Benchmarks …, 2021 - Elsevier
Software patches are made available to fix security vulnerabilities, enhance performance,
and usability. Previous works focused on measuring the performance effect of patches on …

[PDF][PDF] Sustaining security and safety in ICT: A quest for terminology, objectives, and limits

JT Mühlberg - LIMITS'2022, 2022 - assets.pubpub.org
Security and safety of system are important and intertwined concepts in the world of
computing. In recent years, the terms “sustainable security” and “sustainable safety” came …

[PDF][PDF] Dynamic Reconfiguration of Hardware-Vulnerability Mitigations in the Linux Kernel

H Hofmeier - 2022 - sys.cs.fau.de
Providing secure systems, for example, in computing centers, is an essential task of service
providers. Vulnerabilities threatening secure execution are not only located in defective …

Spectre and Meltdown Detection Using Explainable AI

Z Pan, P Mishra - Explainable AI for Cybersecurity, 2023 - Springer
Spectre and Meltdown attacks exploit security vulnerabilities in architectural features to gain
unauthorized memory access. While there are promising defense mechanisms against such …

[PDF][PDF] Modern Concurrency Platforms Require Modern System-Call Techniques

F Schmaus, F Fischer, T Hönig, W Schröder-Preikschat - 2021 - opus4.kobv.de
Writing well-maintainable parallel programs that efficiently utilize many processor cores is
still a significant challenge. Threads are hard to use, and so are event-based schemes …