전체 글
[논문 리뷰] Pspray: Timing Side-Channel based Linux Kernel Heap Exploitation Technique
Authors: Yoochan Lee and Jinhan Kwak, Seoul National University; Junesoo Kang and Yuseok Jeon, UNIST; Byoungyoung Lee, Seoul National University Journal/Conference: USENIX security '23 (open access) Source: https://www.usenix.org/conference/usenixsecurity23/presentation/lee Abstract The stealthiness of an attack is the most vital consideration for an attacker to reach their goals without being d..
[논문 리뷰] Privbox: Faster System Calls Through Sandboxed Privileged Execution
Authors: Dmitry Kuznetsov and Adam Morrison, Tel Aviv University Journal/Conference: USENIX ATC 22' Source: https://www.usenix.org/conference/atc22/presentation/kuznetsov Presentation material: Abstract System calls are the main method for applications to request services from the operating system, but their invocation incurs considerable overhead, which has been aggravated by mitigation mechani..
[논문 리뷰] IPLFS: Log-Structured File System without Garbage Collection
Authors: Juwon Kim, Minsu Jang, Muhammad Danish Tehseen, Joontaek Oh, and YouJip Won, KAIST Journal/Conference: USENIX ATC '22 Source: https://www.usenix.org/conference/atc22/presentation/kim-juwon Abstract In this work, we develop the log-structured filesystem that is free from garbage collection. There are two key technical ingredients: \emph{IPLFS}, a log-structured filesystem for infinite pa..
[논문 리뷰] SoftTRR: Protect Page Tables against Rowhammer Attacks using Software-only Target Row Refresh
Authors: Zhi Zhang, CSIRO’s Data61, Australia; Yueqiang Cheng, NIO Security Research; Minghua Wang, Baidu Security; Wei He and Wenhao Wang, State Key Laboratory of Information Security, Institute of Information Engineering, CAS and University of Chinese Academy of Sciences; Surya Nepal, CSIRO’s Data61, Australia; Yansong Gao, Nanjing University of Science and Technology, China; Kang Li, Baidu Se..
[논문 리뷰] Drammer: Deterministic Rowhammer Attacks on Mobile Platforms
Authors: Victor van der Veen (Vrije Universiteit Amsterdam), Yanick Fratantonio, Martina Lindorfer (UC Santa Barbara), Daniel Gruss, Clementine Maurice (TU Graz), Giovanni Vigna (UC Santa Barbara), Herbert Bos, Kaveh Razavi and Cristiano Giuffrida (Vrije Universiteit Amsterdam) Journal/Conference: In Proceeding of the 23rd ACM Conference on Computer and Communications Security Source: https://dl..
[논문 리뷰] Mobile Traffic Forecasting for Network Slices: A Federated-Learning Approach
Authors: H. P. Phyu, D. Naboulsi and R. Stanica, Journal/Conference: 2022 IEEE 33rd Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), Kyoto, Japan, 2022, pp. 745-751 Source: https://ieeexplore.ieee.org/document/9977882 Presentation meterials: Abstract Network slicing is one of the cornerstones for next-generation mobile communication systems. Specificall..
[논문 리뷰] L^2 5GC: A Low Latency 5G Core Network Based on High-Performance NFV Platforms
Authors: Jain, Vivek and Chu, Hao-Tse and Qi, Shixiong and Lee, Chia-An and Chang, Hung-Cheng and Hsieh, Cheng-Ying and Ramakrishnan, K. K. and Chen, Jyh-Cheng Journal/Conference: In Proceedings of the ACM SIGCOMM 2022 Conference (SIGCOMM '22). Association for Computing Machinery Source: https://dl.acm.org/doi/10.1145/3544216.3544267 Presentation materials: Abstract Cellular network control proc..
[논문 리뷰] Quick Block Transport System for Scalable Hyperledger Fabric Blockchain Over D2D-Assisted 5G networks
Authors: R. H. Kim, H. Noh, H. Song and G. S. Park. Journal/Conference: IEEE/ACM Transactions on Network and Service Management, 2022 Source: https://ieeexplore.ieee.org/document/9585564 Presentation materials: Abstract: This paper presents a quick block transport system for scalable Hyperledger Fabric (HLF) blockchain over device-to-device (D2D)-assisted 5G networks. The objective of the propos..