분류 전체보기
![[논문 리뷰] IPLFS: Log-Structured File System without Garbage Collection](https://img1.daumcdn.net/thumb/R750x0/?scode=mtistory2&fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdna%2FcCEzAx%2FbtsgGlNTa7g%2FAAAAAAAAAAAAAAAAAAAAAANp2n4bgg65bGTYdkG_jEtzQzgegE7YC4VGVZPw0PBp%2Fimg.png%3Fcredential%3DyqXZFxpELC7KVnFOS48ylbz2pIh7yKj8%26expires%3D1756652399%26allow_ip%3D%26allow_referer%3D%26signature%3Dt44dzNz7KB3lKpjS4Tkucd7j87Q%253D)
[논문 리뷰] IPLFS: Log-Structured File System without Garbage Collection
Authors: Juwon Kim, Minsu Jang, Muhammad Danish Tehseen, Joontaek Oh, and YouJip Won, KAIST Journal/Conference: USENIX ATC '22 Source: https://www.usenix.org/conference/atc22/presentation/kim-juwon Abstract In this work, we develop the log-structured filesystem that is free from garbage collection. There are two key technical ingredients: \emph{IPLFS}, a log-structured filesystem for infinite pa..
![[논문 리뷰] SoftTRR: Protect Page Tables against Rowhammer Attacks using Software-only Target Row Refresh](https://img1.daumcdn.net/thumb/R750x0/?scode=mtistory2&fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdna%2FNSGwg%2FbtsgE7PZdRG%2FAAAAAAAAAAAAAAAAAAAAADCFawniacFbs66mKiHKqqZjmejWVbCJOegiQh9L9zH7%2Fimg.png%3Fcredential%3DyqXZFxpELC7KVnFOS48ylbz2pIh7yKj8%26expires%3D1756652399%26allow_ip%3D%26allow_referer%3D%26signature%3DWBcpqZox%252BNVh%252F%252F80qF3jNzqcqrU%253D)
[논문 리뷰] SoftTRR: Protect Page Tables against Rowhammer Attacks using Software-only Target Row Refresh
Authors: Zhi Zhang, CSIRO’s Data61, Australia; Yueqiang Cheng, NIO Security Research; Minghua Wang, Baidu Security; Wei He and Wenhao Wang, State Key Laboratory of Information Security, Institute of Information Engineering, CAS and University of Chinese Academy of Sciences; Surya Nepal, CSIRO’s Data61, Australia; Yansong Gao, Nanjing University of Science and Technology, China; Kang Li, Baidu Se..
![[논문 리뷰] Drammer: Deterministic Rowhammer Attacks on Mobile Platforms](https://img1.daumcdn.net/thumb/R750x0/?scode=mtistory2&fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdna%2FpdNZj%2FbtsgyL7Lytj%2FAAAAAAAAAAAAAAAAAAAAAGvmMPsBZ3zyHtliJTE6yh7_K61kt_82xweeqwN6l-yi%2Fimg.png%3Fcredential%3DyqXZFxpELC7KVnFOS48ylbz2pIh7yKj8%26expires%3D1756652399%26allow_ip%3D%26allow_referer%3D%26signature%3Db4pZiust4pE8ugqEJn5AI%252BJXSc4%253D)
[논문 리뷰] Drammer: Deterministic Rowhammer Attacks on Mobile Platforms
Authors: Victor van der Veen (Vrije Universiteit Amsterdam), Yanick Fratantonio, Martina Lindorfer (UC Santa Barbara), Daniel Gruss, Clementine Maurice (TU Graz), Giovanni Vigna (UC Santa Barbara), Herbert Bos, Kaveh Razavi and Cristiano Giuffrida (Vrije Universiteit Amsterdam) Journal/Conference: In Proceeding of the 23rd ACM Conference on Computer and Communications Security Source: https://dl..
![[논문 리뷰] Mobile Traffic Forecasting for Network Slices: A Federated-Learning Approach](https://img1.daumcdn.net/thumb/R750x0/?scode=mtistory2&fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdna%2FHcman%2FbtsgpYTJDSl%2FAAAAAAAAAAAAAAAAAAAAAEwyp5qmbSWIDKG3e4UGlMQ2dtz7NzNmvd9lVf2cY-T9%2Fimg.png%3Fcredential%3DyqXZFxpELC7KVnFOS48ylbz2pIh7yKj8%26expires%3D1756652399%26allow_ip%3D%26allow_referer%3D%26signature%3D%252FzhUr4u4sO%252FpMYFwDHjMIMIFtXs%253D)
[논문 리뷰] Mobile Traffic Forecasting for Network Slices: A Federated-Learning Approach
Authors: H. P. Phyu, D. Naboulsi and R. Stanica, Journal/Conference: 2022 IEEE 33rd Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), Kyoto, Japan, 2022, pp. 745-751 Source: https://ieeexplore.ieee.org/document/9977882 Presentation meterials: Abstract Network slicing is one of the cornerstones for next-generation mobile communication systems. Specificall..
![[논문 리뷰] L^2 5GC: A Low Latency 5G Core Network Based on High-Performance NFV Platforms](https://img1.daumcdn.net/thumb/R750x0/?scode=mtistory2&fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdna%2FDUDWR%2Fbtsfbz9mR5T%2FAAAAAAAAAAAAAAAAAAAAAJnLLhSPNFwfdr-URRn-AfKPXgNAJfjvuBV8HSPoairs%2Fimg.png%3Fcredential%3DyqXZFxpELC7KVnFOS48ylbz2pIh7yKj8%26expires%3D1756652399%26allow_ip%3D%26allow_referer%3D%26signature%3DGQI%252BqeaBVERzZjnXAxl31ua7hvI%253D)
[논문 리뷰] L^2 5GC: A Low Latency 5G Core Network Based on High-Performance NFV Platforms
Authors: Jain, Vivek and Chu, Hao-Tse and Qi, Shixiong and Lee, Chia-An and Chang, Hung-Cheng and Hsieh, Cheng-Ying and Ramakrishnan, K. K. and Chen, Jyh-Cheng Journal/Conference: In Proceedings of the ACM SIGCOMM 2022 Conference (SIGCOMM '22). Association for Computing Machinery Source: https://dl.acm.org/doi/10.1145/3544216.3544267 Presentation materials: Abstract Cellular network control proc..
![[논문 리뷰] Quick Block Transport System for Scalable Hyperledger Fabric Blockchain Over D2D-Assisted 5G networks](https://img1.daumcdn.net/thumb/R750x0/?scode=mtistory2&fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdna%2FclETfC%2Fbtse99I4l9Q%2FAAAAAAAAAAAAAAAAAAAAAHOdrBaRfTOwSHvkhICInTvKLOiPFEeO1DuNZFJxrIAQ%2Fimg.png%3Fcredential%3DyqXZFxpELC7KVnFOS48ylbz2pIh7yKj8%26expires%3D1756652399%26allow_ip%3D%26allow_referer%3D%26signature%3DTGPQMSDFlXmRc%252Fpeq8oR65%252F3qQU%253D)
[논문 리뷰] Quick Block Transport System for Scalable Hyperledger Fabric Blockchain Over D2D-Assisted 5G networks
Authors: R. H. Kim, H. Noh, H. Song and G. S. Park. Journal/Conference: IEEE/ACM Transactions on Network and Service Management, 2022 Source: https://ieeexplore.ieee.org/document/9585564 Presentation materials: Abstract: This paper presents a quick block transport system for scalable Hyperledger Fabric (HLF) blockchain over device-to-device (D2D)-assisted 5G networks. The objective of the propos..
![[논문 리뷰] ProGraph: Robust Network Traffic Identification With Graph Propagation](https://img1.daumcdn.net/thumb/R750x0/?scode=mtistory2&fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdna%2FcidOkZ%2FbtsfaL8Us8H%2FAAAAAAAAAAAAAAAAAAAAAO5WJsNMh4KrjdWQkw2WOugZ3d0wuPys2Uwv4Qg81Ddn%2Fimg.png%3Fcredential%3DyqXZFxpELC7KVnFOS48ylbz2pIh7yKj8%26expires%3D1756652399%26allow_ip%3D%26allow_referer%3D%26signature%3DrsxuiTyF%252FUG%252B%252F7E7dhqayoSa7zk%253D)
[논문 리뷰] ProGraph: Robust Network Traffic Identification With Graph Propagation
Authors: W. Li, X. -Y. Zhang, H. Bao, H. Shi and Q. Wang Journal/Conference: IEEE/ACM Transactions on Networking, 2022 Source: https://ieeexplore.ieee.org/document/9933044 Presentation materials: Abstract Network traffic identification is critical for effective network management. Existing methods mostly focus on invariant network environments with stable attribute distributions. Unfortunately, ..
![[논문 세미나] Why and How zkSNARK Works Definitive Explanation](https://img1.daumcdn.net/thumb/R750x0/?scode=mtistory2&fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdna%2FcU3zZn%2FbtseBKaGOdn%2FAAAAAAAAAAAAAAAAAAAAAE_22lE-YS4vX23Sw5VO7vksb0Xw-Z23P6idJP6j8sRy%2Fimg.png%3Fcredential%3DyqXZFxpELC7KVnFOS48ylbz2pIh7yKj8%26expires%3D1756652399%26allow_ip%3D%26allow_referer%3D%26signature%3DlYMtL1EOw1XhTr0LG%252FrMsVxAucw%253D)
[논문 세미나] Why and How zkSNARK Works Definitive Explanation
Authors: Maksym Petkus Journal/Conference: arXiv '19 Source: https://arxiv.org/abs/1906.07221 Presentation material: Abstract Despite the existence of multiple great resources on zk-SNARK construction, from original papers1 to explainers2 , due to the sheer number of moving parts the subject remains a black box for many. While some pieces of the puzzle are given one can not see the full picture ..