|
Paper Reading Group - Paper Proposals
This site lists some proposals for presentations within the seminar.
The papers are grouped by category and listed by publication date order.
Shortcut by category:
[concurrency] [distributed systems] [filesystem] [historical] [kernel design] [miscellaneous] [multiprocessor] [performance analysis] [power] [robustness] [scheduling] [security] [virtualization]
concurrency
- Towards a Grainless Semantics for Shared Variable Concurrency
John C. Reynolds; 2004
- Sponge: Portable Stream Programming on Graphics Engines
Amir Hormati, Mehrzad Samadi, Mark Woh, Trevor Mudge, Scott Mahlke; 2011
- Parrot: a Practical Runtime for Deterministic, Stable, and Reliable Threads
Heming Cui, Jiri Simsa, Yi-Hong Lin, Hao Li, Ben Blum, Xinan Xu, Junfeng Yang, Garth Gibson, Randal E. Bryant; 2013
distributed systems
- The V Distributed System
David R. Cheriton; 1988
- Storage management and caching in PAST, a large-scale, persistent peer-to-peer storage utility
Antony Rowstron, Peter Druschel; 2001
- Correlating instrumentation data to system states: A building block for automated diagnosis and control
I. Cohen, M. Goldszmidt, T. Kelly, J. Symons, J. Chase; 2004
- Making Byzantine Fault Tolerant Systems Tolerate Byzantine Faults
A. Clement et al.; 2009
- Pocket Cloudlets
Emmanouil Koukoumidis, Dimitrios Lymberopoulos, Karin Strauss, Jie Liu, Doug Burger; 2011
- DDOS: Taming Nondeterminism in Distributed Systems
Nicholas Hunt et al.; 2013
- Resilient X10: Efficient failure-aware programming
David Cunningham et al.; 2014
filesystem
- hFS: A Hybrid File System Prototype for Improving Small File and Metadata Performance
Zhihui Zhang, Kanad Ghose; 2007
- SQCK: A Declarative File System Checker
Haryadi S. Gunawi, Abhishek Rajimwale, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau; 2008
- Avoiding file system micromanagement with range writes
A. Anand et al.; 2008
- Memory resource allocation for file system prefetching from a supply chain management perspective
Z. Zhang, A. Kulkarni, X. Ma, Y. Zhou; 2009
- Recon: Verifying File System Consistency at Runtime
Daniel Fryer, Kuei Sun, Rahat Mahmood, TingHao Cheng, Shaun Benjamin, Ashvin Goel, Angela Demke Brown; 2012
historical
kernel design
miscellaneous
- Language support for fast and reliable message-based communication in Singularity OS
M. Fähndrich, M. Aiken, C. Hawblitzel, O. Hodson, G. Hunt, J. Larus, S. Levi; 2006
- Triage: diagnosing production run failures at the user's site
Joseph Tucek, Shan Lu, Chengdu Huang, Spiros Xanthos, Yuanyuan Zhou; 2007
- Binary Translation Using Peephole Superoptimizers
S. Bansal, A. Aiken; 2008
- Self-Stabilizing Device Drivers
Shlomi Dolev, Reuven Yagel; 2008
- Spark: Cluster Computing with Working Sets
M. Zaharia, M. Chowdhury, M. Franklin, S. Shenker, I. Stoica; 2010
- S²E: A Platform for In-Vivo Multi-Path Software Analysis
Vitaly Chipounov et al.; 2011
- Dominant Resource Fairness: Fair Allocation of Multiple Resources Types
A. Ghodsi, M. Zaharia, B. Hindman, A. Konwinski, S. Shenker, I. Stoica; 2011
- Atlantis: Robust, Extensible Execution Environments for Web Applications
James Mickens, Mohan Dhawan; 2011
- Memory optimizations of dynamic binary translators for embedded systems
A. Guha et al.; 2013
multiprocessor
- Instruction fetching: coping with code bloat
Richard Uhlig et al.; 1995
- Performance debugging for distributed systems of black boxes
Marcos K. Aguilera, Jeffrey C. Mogul, Janet L. Wiener, Patrick Reynolds, Athicha Muthitacharoen; 2003
- I/O System Performance Debugging Using Model-driven Anomaly Characterization
Kai Shen, Ming Zhong, Chuanpeng Li ; 2005
- Pip: Detecting the unexpected in Distributed Systems
Patrick Reynolds, Duke University; Charles Killian, University of California, San Diego; Janet L. Wiener, Jeffrey C. Mogul, Mehul A. Shah, Hewlett-Packard Laboratories, Palo Alto; Amin Vahdat, University of California, San Diego ; 2006
- IRONModel: robust performance models in the wild
Eno Thereska, Gregory R. Granger; 2008
- Optimizing Google's Warehouse Scale Computers: The NUMA Experience
Tang et al.; 2013
- Aladdin: A Pre-RTL, Power-Performance Accelerator Simulator Enabling Large Design Space Exploration of Customized Architectures
Yakun Sophia Shao, Brandon Reagen, Gu-Yeon Wei, David Brooks; 2014
power
robustness
- Hypervisor-based Fault Tolerance
T. Bressoud, F. Schneider; 1995
- DIVA: A Reliable Substrate for Deep Submicron Microarchitecture Design
Todd M. Austin; 1999
- Bugs as Deviant Behavior: A General Approach to Inferring Errors in Systems Code
Dawson Engler, David Yu Chen, Seth Hallem, Andy Chou, Benjamin Chelf; 2001
- SWIFT: Software-Implemented Fault Tolerance
G. Reis, J. Chang, N. Vachharajani; 2005
- From Uncertainty to Belief: Inferring the Specification Within
Ted Kremenek, Paul Twohey, Godmar Back, Andrew Ng, Dawson Engler; 2006
- MUVI: Automatically Inferring Multi-Variable Access Correlations and Detecting Related Semantic and Concurrency Bugs
Shan Lu et al.; 2007
- The design and implementation of microdrivers
V. Ganapathy, M. Renzelmann, A. Balakrishnan, M. Swift, S. Jha; 2008
- Detouring: Translating software to circumvent hard faults in simple cores
A. Meixner, D. Sorin; 2008
- Decoupling Dynamic Program Analysis from Execution in Virtual Environments
J. Chow, T. Garfinkel, P. Chen; 2008
- First-Aid: Surviving and Preventing Memory Management Bugs during Production Runs
Q. Gao, W. Zhang, Y. Tang, F. Qin; 2009
- Dingo: Taming device drivers
L. Ryzhyk, P. Chubb, I. Kuz, G. Heiser; 2009
- Fault isolation for device drivers
Jorrit Herder, Herbert Bos, Ben Gras, Philip Homburg, Andrew S. Tanenbaum; 2009
- PLR: A Software Approach to Transient Fault Tolerance for Multi-Core Architectures
Alex Shye et al.; 2009
- Eliminating microarchitectural dependency from architectural vulnerability
V. Sridharan, D. Kaeli; 2009
- SherLog: Error Diagnosis by Connecting Clues from Run-time Logs
Ding Yuan, Haohui Mai, Weiwei Xiong, Lin Tan, Yuanyuan Zhou, Shankar Pasupathy; 2010
- Analyzing Multicore Dumps to Facilitate Concurrency Bug Reproduction
Dasarath Weeratunge, Xiangyu Zhang, Suresh Jagannathan; 2010
- ConMem: Detecting Severe Concurrency Bugs Through an Effect-Oriented Approach
Wei Zhang, Chong Sun, Shan Lu; 2010
- Butterfly Analysis: Adapting Dataflow Analysis to Dynamic Parallel Monitoring
Michelle Goodstein, Evangelos Vlachos, Shimin Chen, Phillip Gibbons, Michael Kozuch, Todd Mowry; 2010
- Shoestring: Probabilistic Soft-error Resilience on the Cheap
Shuguang Feng, Shantanu Gupta, Amin Ansari, Scott Mahlke; 2010
- Multi-stage Replay with Crosscut
Jim Chow. Dominic Lucchetti. Tal Garfinkel. Geoffrey Lefebvre. Ryan Gardner. Joshua Mason. Sam Small; 2010
- Diverse Partial Memory Replication
R. Lefever, V. Adve, W. Sanders; 2010
- Programming support and adaptive checkpointing for high-throughput data services with log-based recovery
Jingyu Zhou; Caijie Zhang; Hong Tang; Jiesheng Wu; Tao Yang; 2010
- A study of the internal and external effects of concurrency bugs
Fonseca, P.; Cheng Li; Singhal, V.; Rodrigues, R.; 2010
- Exploiting diverse observation perspectives to get insights on the malware landscape
Leita, C.; Bayer, U.; Kirda, E.; 2010
- Transient fault models and AVF estimation revisited
George, N.J.; Elks, C.R.; Johnson, B.W.; Lach, J.; 2010
- Cycles, Cells and Platters: An Empirical Analysis of Hardware Failures on a Million Consumer PCs
Edmund B. Nightingale, John R. Douceur, Vince Orgovan; 2011
- S2E: A Platform for In-Vivo Multi-Path Analysis of Software Systems
Chipounov et al.; 2011
scheduling
- Resource Kernels: A Resource-Centric Approach to Real-Time and Multimedia Systems
Raj Rajkumar, Kanaka Juvva, Anastasio Molano, Shuichi Oikawa; 1998
- Priority-Progress CPU Adaptation for Elastic Real-Time Applications
Charles Krasic, Anirban Sinha, Lowell Kirshb; 2007
- CAMA: Cache-Aware Memory Allocation for WCET Analysis
Jörg Herter, Jan Reineke, Reinhard Wilhelm; 2008
- Flexible Architectural Support for Fine-Grain Scheduling
Daniel Sanchez, Richard M. Yoo, Christos Kozyrakis; 2010
- A Case for NUMA-aware Contention Management on Multicore Systems
Sergey Blagodurov, Sergey Zhuravlev, Mohammad Dashti, Alexandra Fedorova; 2011
- Is Semi-Partitioned Scheduling Practical?
Andrea Bastoni, Björn B. Brandenburg, James H. Anderson; 2011
- Scheduling-context capabilities: A principled, light-weight OS mechanism for managing time
Anna Lyons, Kent Mcleod, Hesham Almatary, Gernot Heiser; 2018
security
- Protection in Operating Systems
Michael A. Harrison, Walter L. Ruzzo; 1976
- The Cambridge CAP computer and its protection system
Needham, Walker; 1977
- The KeyKOS Architecture
N. Hardy; 1985
- Modelling a Fuzzy Time System
Jonathan T. Trostle; 1993
- The Flask Security Architecture: System Support for Diverse Security Policies
Spencer, et al.; 1999
- EROS: A Principle-Driven Operating System from the Ground Up
Jonathan S. Shapiro, Norm Hardy; 2002
- Enhancing server availability and security through failure-oblivious computing
M. Rinard, C. Cadar, D. Dumitran, D. Roy, T. Leu, J.W. Beebee; 2004
- On the effectiveness of address-space randomization
Hovav Shacham, Matthew Page, Ben Pfaff, Eu-Jin Goh, Nagendra Modadugu, Dan Boneh; 2004
- Building a reactive immune system for software services
S. Sidiroglou, M.E. Locasto, S.W. Boyd, A.D. Keromytis; 2005
- Sweeper: A lightweight end-to-end system for defending against fast worms
J. Tucek, J. Newsome, S. Lu, C. Huang, S. Xanthos, D. Brumley, D. Song; 2007
- Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint Generation
D. Brumley et al.; 2007
- Multi-aspect profiling of kernel rootkit behavior
R. Riley, X. Jiang, D. Xu; 2009
- Certified Lies: Detecting and Defeating Government Interception Attacks Against SSL
Christopher Soghoian, Sid Stamm; 2010
- Accountable Virtual Machines
Andreas Haeberlen, Paarijaat Aditya, Rodrigo Rodrigues, Peter Druschel; 2010
- @spam: The Underground on 140 Characters or Less
Chris Grier, K. Thomas, V. Paxson, M. Zhang; 2010
- An Empirical Study of Privacy-Violating Information Flows in JavaScript Web Applications
Dongseok Jang, Ranjit Jhala, Sorin Lerner, Hovav Shacham; 2010
- Input Generation via Decomposition and Re-Stitching: Finding Bugs in Malware
Juan Caballero, Pongsin Poosankam , Stephen McCamant, Domagoj Babic, Dawn Song ; 2010
- CryptDB: Protecting Confidentiality with Encrypted Query Processing
Raluca Ada Popa, Catherine M. S. Redfield, Nickolai Zeldovich, Hari Balakrishnan; 2011
- Bitsquatting: DNS Hijacking without exploitation
A. Dinaburg; 2011
- Mosh: An Interactive Remote Shell for Mobile Clients
Keith Winstein, Hari Balakrishnan; 2012
- Embassies: Radically Refactoring the Web
Jon Howell, Bryan Parno, John R. Douceur; 2013
- Stealthy Dopant-Level Hardware Trojans
G. Becker et al.; 2013
- A Tale of Two Kernels: Towards Ending Kernel Hardening Wars with Split Kernel
Anil Kurmus, Robby Zippel; 2014
- Memory DoS Attacks in Multi-tenant Clouds: Severity and Mitigation
Tianwei Zhang, Yinqian Zhang, Ruby B. Lee; 2016
- Grand Pwning Unit: Accelerating Microarchitectural Attacks with the GPU
Pietro Frigo, Cristiano Giuffrida, Herbert Bos, Kaveh Razavi; 2018
virtualization
- A virtual machine time sharing system
R. A. Mayer, L. H. Seawright; 1970
- Formal Requirements for Virtualizable Third Generation Architectures
Gerald J. Popek, Robert P. Goldberg; 1974
- Xen and the art of virtualization
P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, A. Warfield; 2003
- A comparison of software and hardware techniques for x86 virtualization
Keith Adams, Ole Agesen; 2006
- Secure Virtual Architecture: A Safe Execution Environment for Commodity Operating Systems
John Criswell et al.; 2007
- Overshadow: A Virtualization-Based Approach to Retrofitting Protection in Commodity Operating Systems
Xiaoxin Chen, Tal Garfinkel, E. Christopher Lewis, Pratap Subrahmanyam, Carl A. Waldspurger, Dan Boneh, Jeffrey Dwoskin, Dan R. K. Ports; 2008
- SnowFlock: Rapid Virtual Machine Cloning for Cloud Computing
Horacio Andrés Lagar-Cavilla, Joseph A. Whitney, Adin Scannell, Philip Patchin, Stephen M. Rumble, Eyal de Lara, Michael Brudno, Mahadev Satyanarayanan; 2009
- vNUMA: A Virtual Shared-Memory Multiprocessor
Matthew Chapman, Gernot Heiser; 2009
- Phase-based reboot: Reusing operating system execution phases for cheap reboot-based recovery
K. Yamakita, H. Yamada, K. Kono; 2011
|
Contact
Dipl.-Inf. Marcus Hähnel
Phone: 38534 Fax:
e-mail contact form
Regulations
-
Modules: INF-PM-ANW, INF-PM-FOR
-
3 Credit Points
-
0/2/0 = 2 SWS
Time and Place
-
Seminar, weekly
Thu, 11.10 AM
APB 3105
Mailing List
|