News

Return-to-user (ret2usr) attacks redirect corrupted kernel pointers to data residing in user space. In response, several kernel-hardening approaches have been proposed to enforce a more strict address ...
Recently, UNIX lost one of its most stalwart pioneers. In eulogizing him in a tweet, I claimed that Roger Faulkner was the "godfather of post-AT&T UNIX"—and I can't imagine that anyone who knew Roger ...
Published in the Proceedings of the Third Symposium on Operating Systems Design and Implementation, New Orleans, USA, February 1999. This research was supported in part by DARPA under contract ...
Who Is Answering My Queries: Understanding and Characterizing Interception of the DNS Resolution Path ...
Deep Neural Networks have recently gained lots of success after enabling several breakthroughs in notoriously challenging problems. Training these networks is computationally expensive and requires ...
Large service providers use load balancers to dispatch millions of incoming connections per second towards thousands of servers. There are two basic yet critical requirements for a load balancer: ...
Sanctum offers the same promise as Intel’s Software Guard Extensions (SGX), namely strong provable isolation of software modules running concurrently and sharing resources, but protects against an ...
Hypervisors are widely deployed by cloud computing providers to support virtual machines, but their growing complexity poses a security risk as large codebases contain many vulnerabilities. We have ...
FIRM: An Intelligent Fine-grained Resource Management Framework for SLO-Oriented Microservices ...
Metron enables NFV service chains to operate at the true speed of underlying hardware, enhancing efficiency and performance in network functions virtualization.
Many modern scalable cloud networking architectures rely on host networking for implementing VM network policy - e.g. tunneling for virtual networks, NAT for load balancing, stateful ACLs, QoS, and ...
Where can we find malware source code? This question is motivated by a real need: there is a dearth of malware source code, which impedes various types of security research. Our work is driven by the ...