분류 전체보기
![[KCC 2023] Survey on Asynchronous BFT consensus Algorithms for Scalable and Robust Blockchain](https://img1.daumcdn.net/thumb/R750x0/?scode=mtistory2&fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FcolDuv%2FbtskSoFZlY1%2FrTUa4jjCewSOk7KnM2Uad0%2Fimg.png)
[KCC 2023] Survey on Asynchronous BFT consensus Algorithms for Scalable and Robust Blockchain
Author: Donghyeon Ryu, Chanik Park in POSTECH Journal/Conference: KCC '23 Paper: (eng) (kor) Abstract Blockchain technology is being applied to various areas such as non-fungible tokens (NFTs), decentralized finance (DeFi), security tokens (STs), central bank digital currencies (CBDCs), and decentralized identity (DID) based on its decentralization, transparency, and high reliability. However, t..
Paper references about Hyperledger fabric
[StreamChain] StreamChain: Do Blockchains Need Blocks? (ACM SERIAL'18) : https://doi.org/10.1145/3284764.3284765 [FastFabric] FastFabric: Scaling Hyperledger Fabric to 20,000 Transactions per Second (IEEE ICBC '19) : https://arxiv.org/abs/1901.00910 [Fabric++] Blurring the Lines between Blockchains and Database Systems: the Case of Hyperledger Fabric. (ACM PODS ’19) : https://bigdata.uni-saarlan..
![[논문 리뷰] Pspray: Timing Side-Channel based Linux Kernel Heap Exploitation Technique](https://img1.daumcdn.net/thumb/R750x0/?scode=mtistory2&fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FceVWRn%2FbtshbsyWHJX%2Fc1WnvPWxNdqRzMUb7hOWNK%2Fimg.png)
[논문 리뷰] Pspray: Timing Side-Channel based Linux Kernel Heap Exploitation Technique
Authors: Yoochan Lee and Jinhan Kwak, Seoul National University; Junesoo Kang and Yuseok Jeon, UNIST; Byoungyoung Lee, Seoul National University Journal/Conference: USENIX security '23 (open access) Source: https://www.usenix.org/conference/usenixsecurity23/presentation/lee Abstract The stealthiness of an attack is the most vital consideration for an attacker to reach their goals without being d..
![[논문 리뷰] Privbox: Faster System Calls Through Sandboxed Privileged Execution](https://img1.daumcdn.net/thumb/R750x0/?scode=mtistory2&fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FoOTcF%2FbtshaUbpig9%2FmU2mHaOl1frYDkZFBLg0Y0%2Fimg.png)
[논문 리뷰] Privbox: Faster System Calls Through Sandboxed Privileged Execution
Authors: Dmitry Kuznetsov and Adam Morrison, Tel Aviv University Journal/Conference: USENIX ATC 22' Source: https://www.usenix.org/conference/atc22/presentation/kuznetsov Presentation material: Abstract System calls are the main method for applications to request services from the operating system, but their invocation incurs considerable overhead, which has been aggravated by mitigation mechani..
![[논문 리뷰] IPLFS: Log-Structured File System without Garbage Collection](https://img1.daumcdn.net/thumb/R750x0/?scode=mtistory2&fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FcCEzAx%2FbtsgGlNTa7g%2FJ2IUz0utbW8MGeozbIO5Ik%2Fimg.png)
[논문 리뷰] IPLFS: Log-Structured File System without Garbage Collection
Authors: Juwon Kim, Minsu Jang, Muhammad Danish Tehseen, Joontaek Oh, and YouJip Won, KAIST Journal/Conference: USENIX ATC '22 Source: https://www.usenix.org/conference/atc22/presentation/kim-juwon Abstract In this work, we develop the log-structured filesystem that is free from garbage collection. There are two key technical ingredients: \emph{IPLFS}, a log-structured filesystem for infinite pa..
![[논문 리뷰] SoftTRR: Protect Page Tables against Rowhammer Attacks using Software-only Target Row Refresh](https://img1.daumcdn.net/thumb/R750x0/?scode=mtistory2&fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FNSGwg%2FbtsgE7PZdRG%2FgwK3VKhkefPKbzDcL7jZk0%2Fimg.png)
[논문 리뷰] SoftTRR: Protect Page Tables against Rowhammer Attacks using Software-only Target Row Refresh
Authors: Zhi Zhang, CSIRO’s Data61, Australia; Yueqiang Cheng, NIO Security Research; Minghua Wang, Baidu Security; Wei He and Wenhao Wang, State Key Laboratory of Information Security, Institute of Information Engineering, CAS and University of Chinese Academy of Sciences; Surya Nepal, CSIRO’s Data61, Australia; Yansong Gao, Nanjing University of Science and Technology, China; Kang Li, Baidu Se..
![[논문 리뷰] Drammer: Deterministic Rowhammer Attacks on Mobile Platforms](https://img1.daumcdn.net/thumb/R750x0/?scode=mtistory2&fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FpdNZj%2FbtsgyL7Lytj%2Fe2uJs33kJsa2JXid2L4WCk%2Fimg.png)
[논문 리뷰] Drammer: Deterministic Rowhammer Attacks on Mobile Platforms
Authors: Victor van der Veen (Vrije Universiteit Amsterdam), Yanick Fratantonio, Martina Lindorfer (UC Santa Barbara), Daniel Gruss, Clementine Maurice (TU Graz), Giovanni Vigna (UC Santa Barbara), Herbert Bos, Kaveh Razavi and Cristiano Giuffrida (Vrije Universiteit Amsterdam) Journal/Conference: In Proceeding of the 23rd ACM Conference on Computer and Communications Security Source: https://dl..
![[논문 리뷰] Mobile Traffic Forecasting for Network Slices: A Federated-Learning Approach](https://img1.daumcdn.net/thumb/R750x0/?scode=mtistory2&fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FHcman%2FbtsgpYTJDSl%2F80ujOGek0wSkdSsxPGBK4K%2Fimg.png)
[논문 리뷰] Mobile Traffic Forecasting for Network Slices: A Federated-Learning Approach
Authors: H. P. Phyu, D. Naboulsi and R. Stanica, Journal/Conference: 2022 IEEE 33rd Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), Kyoto, Japan, 2022, pp. 745-751 Source: https://ieeexplore.ieee.org/document/9977882 Presentation meterials: Abstract Network slicing is one of the cornerstones for next-generation mobile communication systems. Specificall..