2015
Date | Presenter | Title | Venue | Slide |
---|---|---|---|---|
07-06 | Dongup Kown | Scale-Out NUMA | ASPLOS '14 |
Enter Correct Password to Download
|
04-06 | Beumjin Cho | Mayhem in the Push Clouds | CCS '14 | |
03-16 | Ngo Xuan Hoa | Optimal Geo-Indistinguishable Mechanisms for Location Privacy | CCS '14 |
Enter Correct Password to Download
|
05-11 | Gyuhyeon Lee | SynFull: Synthetic Traffic Models Capturing Cache Coherent Behavior | ISCA '14 |
Enter Correct Password to Download
|
04-04 | Jihun Kim | CloudVisor: Retrofitting Protection of Virtual Machines in Multi-tenant Cloud with Nested Virtualization | SOSP '11 |
Enter Correct Password to Download
|
01-20 | Joonsung Kim | Quasar: Resource-Efficient and QoS-Aware Cluster Management | ASPLOS '14 |
Enter Correct Password to Download
|
01-20 | Xinyu Liu | CyberProbe: Towards Internet-Scale Active Detection of Malicious Servers | NDSS '14 |
Enter Correct Password to Download
|
01-27 | Jaehyung Ahn | IX: A Protected Dataplane Operating System for High Throughput and Low Latency | OSDI '14 |
Enter Correct Password to Download
|
03-02 | Dongju Chae | VSwapper: A Memory Swapper for Virtualized Environments | ASPLOS '14 |
Enter Correct Password to Download
|
03-09 | Xinyu Liu | Poisoning Network Visibility in Software-Defined Networks: New Attacks and Countermeasures | NDSS '15 |
Enter Correct Password to Download
|
03-30 | Dongju Chae | Rio: A System Solution for Sharing I/O between Mobile Systems | MobiSys '14 |
Enter Correct Password to Download
|
04-13 | Mohammadamin Ajdari | Automated Microprocessor Stressmark Generation | HPCA '08 |
Enter Correct Password to Download
|
05-04 | Dongup Kwon | Neural Network 101 | not conference |
Enter Correct Password to Download
|
05-04 | Xinyu Liu | AVANT-GUARD: Scalable and Vigilant Switch Flow Management in Software-Defined Networks | CCS '13 |
Enter Correct Password to Download
|
06-22 | Jaehyung Ahn | Architecting to Achieve a Billion Requests Per Second Throughput on a Single Key-Value Store Server Platform | ISCA '15 |
Enter Correct Password to Download
|
06-29 | Joonsung Kim | Ceph: A Scalable High-Performance Distributed File System | OSDI '06 |
Enter Correct Password to Download
|
06-29 | Mohammadamin Ajdari | ElasticTree: Saving Energy in Data Center Networks | NSDI '10 |
Enter Correct Password to Download
|
03-02 | Yoonji Kim | What’s in Your Dongle and Bank Account? Mandatory and Discretionary Protection of Android External Resources | NDSS '15 |
Enter Correct Password to Download
|
04-27 | Yoonji Kim | SemaDroid: A Privacy-Aware Sensor Management Framework for Smartphones | CODASPY '15 |
Enter Correct Password to Download
|
05-11 | Yoonji Kim | World-Driven Access Control for Continuous Sensing | CCS '14 |
Enter Correct Password to Download
|
04-13 | Jae-Eon Jo | Micro-sliced Virtual Processors | MICRO '14 | |
02-24 | Jae-Eon Jo | ProfileMe | MICRO '97 | |
02-17 | Nguyen Phuong Binh | Integro: Leveraging Victim Prediction for RobustFake Account Detection in OSNs | NDSS '2015 |
Enter Correct Password to Download
|
02-03 | Hanhwi Jang | PipeCheck: Specifying and Verifying Microarchitectural Enforcement of Memory Consistency Models | MICRO'14 |
Enter Correct Password to Download
|
05-18 | Hanhwi Jang | PyMTL: A Unified Framework for Vertically Integrated Computer Architecture Research | MICRO'14 |
Enter Correct Password to Download
|
06-01 | Hanhwi Jang | The Turtles Project: Design and Implementation of Nested Virtualization | OSDI'10 |
Enter Correct Password to Download
|
2014
Date | Presenter | Title | Venue | Slide |
---|---|---|---|---|
05-16 | Beumjin Cho | Upgrading Your Android Elevating My Malware Privilege Escalation Through Mobile OS Updating | S&P '14 | |
08-08 | Beumjin Cho | Inside Job Understanding and Mitigating the Threat of External Device Mis-Bonding on Android | NDSS '14 | |
10-13 | Beumjin Cho | A11y Attacks Exploiting Accessibility in Operating Systems | CCS '14 | |
12-01 | Beumjin Cho | Peeking into Your App without Actually Seeing it UI State Inference and Novel Android Attacks | Security '14 | |
05-30 | Ngo Xuan Hoa | Differential Identifiability | KDD '12 |
Enter Correct Password to Download
|
03-11 | Ngo Xuan Hoa | Geo-Indistinguishability: Differential Privacy for Location-Based Systems | CCS '13 |
Enter Correct Password to Download
|
03-28 | Ngo Xuan Hoa | Personal Privacy vs Population Privacy: Learning to Attack Anonymization | KDD '11 |
Enter Correct Password to Download
|
08-29 | Ngo Xuan Hoa | Privacy-Preserving and Content-Protecting Location Based Queries | ICDE '12 |
Enter Correct Password to Download
|
01-10 | Youngsok Kim | A Locality-Aware Memory Hierarchy for Energy-Efficient GPU Architectures | MICRO '13 |
Enter Correct Password to Download
|
07-11 | Youngsok Kim | A Scalable Multi-Path Microarchitecture for Efficient GPU Control Flow | HPCA '14 |
Enter Correct Password to Download
|
01-27 | Jihun Kim | SSDAlloc: Hybrid SSD/RAM Memory Management Made Easy | NSDI '11 |
Enter Correct Password to Download
|
03-09 | Jihun Kim | Towards SLO Complying SSDsThrough OPS Isolation | FAST '15 |
Enter Correct Password to Download
|
05-18 | Jihun Kim | An Efficient Page-level FTL to OptimizeAddress Translation in Flash Memory | EuroSys '15 |
Enter Correct Password to Download
|
09-12 | Jihun Kim | HIOS: A Host Interface I/O Schedulerfor Solid State Disks | ISCA '14 |
Enter Correct Password to Download
|
11-17 | Jihun Kim | Improving DRAM Performance by Parallelizing Refreshes with Accesses | HPCA '14 |
Enter Correct Password to Download
|
02-14 | Joonsung Kim | WebCore: Architectural Support for Mobile Web Browsing | ISCA '14 |
Enter Correct Password to Download
|
03-07 | Dongju Chae | Fast Crash Recovery in RAMCloud | SOSP '11 |
Enter Correct Password to Download
|
03-21 | Mohammadamin Ajdari | Minimal Multi-Threading: Finding and Removing Redundant Instructions in Multi-Threaded Processors | MICRO '10 |
Enter Correct Password to Download
|
03-28 | Jaehyung Ahn | QuickSAN: A Storage Area Network for Fast, Distributed Solid State Disks | ISCA '13 |
Enter Correct Password to Download
|
04-11 | Dongju Chae | ELVIS: Efficient and ScaLableParaVirtualI/O System | ATC '13 |
Enter Correct Password to Download
|
05-09 | Jaehyung Ahn | Providing Safe, User Space Access to Fast, Solid State Disk | ASPLOS '12 |
Enter Correct Password to Download
|
05-23 | Mohammadamin Ajdari | SDF: Software-Defined Flash for Web-Scale Internet Storage Systems | ASPLOS '14 |
Enter Correct Password to Download
|
07-04 | Joonsung Kim | VirtuOS: an operating system with kernel virtualization | SOSP '13 |
Enter Correct Password to Download
|
08-28 | Mohammadamin Ajdari | Moneta: A High-performance Storage Array Architecture for Next-generation, Non-volatile Memories | MICRO '10 |
Enter Correct Password to Download
|
09-29 | Dongju Chae | An Aggressive Worn-out Flash Block Management Scheme to Alleviate SSD Performance Degradation | Eurosys '14 |
Enter Correct Password to Download
|
10-06 | Jaehyung Ahn | Willow: A User-Programmable SSD | OSDI '14 |
Enter Correct Password to Download
|
10-27 | Mohammadamin Ajdari | FaRM: Fast Remote Memory | NSDI '14 |
Enter Correct Password to Download
|
11-10 | Xinyu Liu | ROPecker: A Generic and Practical Approach for Defending Against ROP Attacks | NDSS '14 |
Enter Correct Password to Download
|
12-08 | Jaehyung Ahn | Arrakis: The Operating System is the Control Plane | OSDI '14 |
Enter Correct Password to Download
|
12-23 | Dongju Chae | SMiTe: Precise QoSPrediction on Real-System SMT Processors to Improve Utilization in Warehouse Scale Computers | MICRO '14 |
Enter Correct Password to Download
|
12-29 | Joonsung Kim | Characterizing Storage Workloads with Counter Stacks | OSDI '14 |
Enter Correct Password to Download
|
12-29 | Mohammadamin Ajdari | ArchExplorer.org: A Methodology for Facilitating A Fair Comparison of Research Ideas | ISPASS '10 |
Enter Correct Password to Download
|
02-18 | Yoonji Kim | TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones | TOCS '14 |
Enter Correct Password to Download
|
07-04 | Yoonji Kim | An Operating System for the Home | NSDI '12 |
Enter Correct Password to Download
|
08-01 | Yoonji Kim | Building Web Application on Top of Encrypted Data using Mylar | NSDI '14 |
Enter Correct Password to Download
|
02-25 | Yoonji Kim | Take This Personally: Pollution Attacks on Personalized Services | Usenix Security '13 |
Enter Correct Password to Download
|
02-12 | Yoonji Kim | You Are What You Like! Information Leakage Through Users’ Interest | NDSS '12 |
Enter Correct Password to Download
|
12-22 | Jae-Eon Jo | Cognitive Computing Building Block | IJCNN '13 | |
10-27 | Jae-Eon Jo | Load Value Approximation | MICRO '14 | |
08-22 | Jae-Eon Jo | On the Simulation of Large-Scale Architectures | TACO '12 | |
08-22 | Jae-Eon Jo | Transactional memory: architectural support for lock-free data structures | ISCA '93 | |
08-22 | Jae-Eon Jo | Transactional memory: architectural support for lock-free data structures | ISCA '93 | |
05-09 | Jae-Eon Jo | The CHERI capability model | ISCA '14 | |
10-13 | Nguyen Phuong Binh | Community-Enhanced De-anonymization ofOnline Social Networks | CCS '14 |
Enter Correct Password to Download
|
08-08 | Nguyen Phuong Binh | Towards Detecting Anomalous User Behavior in Online Social Networks | USENIX SECURITY '14 |
Enter Correct Password to Download
|
05-16 | Nguyen Phuong Binh | Unauthorized Origin Crossing on Mobile Platforms: Threats and Mitigation | CCS '13 |
Enter Correct Password to Download
|
02-21 | Nguyen Phuong Binh | Identity, Location, Disease and More: Inferring Your Secrets from Android Public Resources | CCS '13 |
Enter Correct Password to Download
|
01-24 | Hanhwi Jang | Thin Servers with Smarts Pipes: Designing SoC Accelerators for Memcached | ISCA'13 |
Enter Correct Password to Download
|
07-11 | Hanhwi Jang | AddressSanitizer: A Fast Address Sanity Checker | ATC'12 |
Enter Correct Password to Download
|
11-17 | Hanhwi Jang | The Mystery Machine: End-to-end Performance Analysis of Large-scale Internet Services | OSDI'14 |
Enter Correct Password to Download
|
12-01 | Hanhwi Jang | Aladdin: A Pre-RTL, Power-Performance Accelerator Simulator Enabling Large Design Space Exploration of Customized Architectures | ISCA'14 |
Enter Correct Password to Download
|
2013
Date | Presenter | Title | Venue | Slide |
---|---|---|---|---|
01-13 | Beumjin Cho | Dissecting Android Malware | S&P '12 | |
01-22 | Beumjin Cho | You Are What You Like! | NDSS '12 | |
02-05 | Beumjin Cho | TaintDroid | OSDI '10 | |
05-24 | Beumjin Cho | Practical and Lightweight Domain Isolation on Android | SPSM '11 | |
07-19 | Beumjin Cho | XManDroid: A New Android Evolution to Mitigate Privilege Escalation Attacks | Technical report '11 | |
08-30 | Beumjin Cho | Flexibel and Fine-Grained Mandatory Access Control on Android for Diverse Security and Privacy Policies | Security '13 | |
11-05 | Beumjin Cho | Vetting Undesirable Behaviors in Android Apps with Permission Use Analysis | CCS '13 | |
11-19 | Jae-Eon Jo | Distributed GraphLab: a framework for machine learning and data mining in the cloud | VLDB '12 |