BLeak: automatically debugging memory leaks in web applications

BLeak: Automatically debugging memory leaks in web applications Vilk & Berger, PLDI’18 BLeak is a Browser Leak debugger that finds memory leaks in web applications. You can use BLeak to t… | Continue reading


@blog.acolyer.org | 6 years ago

On the criteria to be used in decomposing systems into modules

On the criteria to be used in decomposing systems into modules David L Parnas, 1971 Welcome back to a new term of The Morning Paper! I thought I’d kick things off by revisiting a few of my fa… | Continue reading


@blog.acolyer.org | 6 years ago

Oblix: an efficient oblivious search index

Oblix: an efficient oblivious search index Mishra et al., IEEE Security & Privacy 2018 Unfortunately, many known schemes that enable search queries on encrypted data achieve efficiency at the e… | Continue reading


@blog.acolyer.org | 6 years ago

EnclaveDB: a secure database using SGX – the morning paper

EnclaveDB: A secure database using SGX Priebe et al., IEEE Security & Privacy 2018 This is a really interesting paper (if you’re into this kind of thing I guess!) bringing together the security… | Continue reading


@blog.acolyer.org | 6 years ago

Grand Pwning Unit: Accelerating Microarchitectural Attacks with the GPU

Grand Pwning Unit: Accelerating microarchitectural attacks with the GPU Frigo et al., IEEE Security & Privacy The general awareness of microarchitectural attacks is greatly increased since melt… | Continue reading


@blog.acolyer.org | 6 years ago

Privacy risks with Facebook’s PII-based targeting: auditing a data broker

Privacy risks with Facebook’s PII-based targeting: auditing a data broker’s advertising interface Venkatadri et al., IEEE Security and Privacy 2018 This is one of those jaw-hits-the-floor, can’t qu… | Continue reading


@blog.acolyer.org | 6 years ago

The rise of the citizen developer: assessing security impact of online app gen

The rise of the citizen developer: assessing the security impact of online app generators Oltrogge et al., IEEE Security & Privacy 2018 “Low code”, “no code”, “cit… | Continue reading


@blog.acolyer.org | 6 years ago

Debugging data flows in reactive programs

Debugging data flows in reactive programs Banken et al., ICSE’18 To round off our look at papers from ICSE, here’s a really interesting look at the challenges of debugging reactive applicatio… | Continue reading


@blog.acolyer.org | 6 years ago

How not to structure database-backed web apps: performance bugs in the wild

How not to structure your database-backed web applications: a study of performance bugs in the wild Yang et al., ICSE’18 This is a fascinating study of the problems people get into when using… | Continue reading


@blog.acolyer.org | 6 years ago

Secure coding practices in Java: challenges and vulnerabilities

Secure coding practices in Java: challenges and vulnerabilities Meng et al., ICSE’18 TL;DR : don’t trust everything you read on Stack Overflow. Meng et al. conduct a study of Stack Overflow p… | Continue reading


@blog.acolyer.org | 6 years ago

Deep code search

Deep code search Gu et al., ICSE’18 The problem with searching for code is that the query, e.g. “read an object from xml,” doesn’t look very much like the source code snippets tha… | Continue reading


@blog.acolyer.org | 6 years ago

To distribute or not to distribute? Why licensing bugs matter

To distribute or not to distribute? Why licensing bugs matter Vendome et al., ICSE’18 Software licensing can quickly get quite complicated, with over 100 known open source licenses out there,… | Continue reading


@blog.acolyer.org | 6 years ago

Automated localization for unreproducible build

Automated localization for unreproducible builds Ren et al., ICSE’18 Reproducible builds are an important component of integrity in the software supply chain. Attacks against package reposito… | Continue reading


@blog.acolyer.org | 6 years ago

Generalized data structure synthesis

Generalized data structure synthesis Loncaric et al., ICSE’18 Many systems have a few key data structures at their heart. Finding correct and efficient implementations for these data structur… | Continue reading


@blog.acolyer.org | 6 years ago

ConflictJS: finding and understanding conflicts between JavaScript libraries

ConflictJS: finding and understanding conflicts between JavaScript libraries Patra et al., ICSE’18 The JavaScript ecosystem is fertile ground for dependency hell. With so many libraries being… | Continue reading


@blog.acolyer.org | 6 years ago

Debugging with intelligence via probabilistic inference

Debugging with intelligence via probabilistic inference Xu et al., ICSE’18 Xu et al. have built a automated debugger that can take a single failing test execution, and with minimal interactio… | Continue reading


@blog.acolyer.org | 6 years ago

DeepTest: automated testing of deep-neural-network-driven autonomous cars

DeepTest: automated testing of deep-neural-network-driven autonomous cars Tian et al., ICSE’18 How do you test a DNN? We’ve seen plenty of examples of adversarial attacks in previous editions… | Continue reading


@blog.acolyer.org | 6 years ago

Popular is cheaper: curtailing memory costs in interactive analytics engines

Popular is cheaper: curtailing memory costs in interactive analytics engines Ghosh et al., EuroSys’18 (If you don’t have ACM Digital Library access, the paper can be accessed either by follow… | Continue reading


@blog.acolyer.org | 6 years ago

Analytics with smart arrays: adaptive and efficient language-independent data

Analytics with smart arrays: adaptive and efficient language-independent data Psaroudakis et al., EuroSys’18 (If you don’t have ACM Digital Library access, the paper can be accessed either by… | Continue reading


@blog.acolyer.org | 6 years ago

Medea: scheduling of long running applications in shared production clusters

Medea: scheduling of long running applications in shared production clusters Garefalakis et al., EuroSys’18 (If you don’t have ACM Digital Library access, the paper can be accessed either by … | Continue reading


@blog.acolyer.org | 6 years ago

Optimus: an efficient dynamic resource scheduler for deep learning clusters

Optimus: an efficient dynamic resource scheduler for deep learning clusters Peng et al., EuroSys’18 (If you don’t have ACM Digital Library access, the paper can be accessed either by followin… | Continue reading


@blog.acolyer.org | 6 years ago

Improving the expressiveness of deep learning frameworks with recursion

Improving the expressiveness of deep learning frameworks with recursion Jeong, Jeong et al., EuroSys’18 (If you don’t have ACM Digital Library access, the paper can be accessed either by foll… | Continue reading


@blog.acolyer.org | 6 years ago

Centralized near-optimal overlay network for inter-datacenter data replication

BDS: A centralized near-optimal overlay network for inter-datacenter data replication Zhang et al., EuroSys’18 (If you don’t have ACM Digital Library access, the paper can be accessed either … | Continue reading


@blog.acolyer.org | 6 years ago

Dynamic control flow in large-scale machine learning

Dynamic control flow in large-scale machine learning Yu et al., EuroSys’18 (If you don’t have ACM Digital Library access, the paper can be accessed either by following the link above directly… | Continue reading


@blog.acolyer.org | 6 years ago

Reducing DRAM Footprint with NVM in Facebook

Reducing DRAM footprint with NVM in Facebook Eisenman et al., EuroSys’18 (If you don’t have ACM Digital Library access, the paper can be accessed either by following the link above directly f… | Continue reading


@blog.acolyer.org | 6 years ago

ServiceFabric: a distributed platform for building microservices in the cloud

ServiceFabric: a distributed platform for building microservices in the cloud Kakivaya et al., EuroSys’18 (If you don’t have ACM Digital Library access, the paper can be accessed either by fo… | Continue reading


@blog.acolyer.org | 6 years ago

Hyperledger fabric: a distributed OS for permissioned blockchains

Hyperledger fabric: a distributed operating system for permissioned blockchains Androulaki et al., EuroSys’18 (If you don’t have ACM Digital Library access, the paper can be accessed either b… | Continue reading


@blog.acolyer.org | 6 years ago

ForkBase: an efficient storage engine for blockchain and forkable applications

ForkBase: an efficient storage engine for blockchain and forkable applications Wang et al., arXiv’18 ForkBase is a data storage system designed to support applications that need a combination… | Continue reading


@blog.acolyer.org | 6 years ago

ZkLedger: privacy-preserving auditing for distributed ledgers

zkLedger: privacy-preserving auditing for distributed ledgers Narula et al., NSDI’18 Somewhat similarly to Solidus that we looked at late last year, zkLedger (presumably this stands for zero-… | Continue reading


@blog.acolyer.org | 6 years ago

Towards a design philosophy for interoperable blockchain systems

Towards a design philosophy for interoperable blockchain systems Hardjono et al., arXiv 2018 Once upon a time there were networks and inter-networking, which let carefully managed groups of compute… | Continue reading


@blog.acolyer.org | 6 years ago

Measuring the tendency of CNNs to learn surface statistical regularities

Measuring the tendency of CNNs to learn surface statistical regularities Jo et al., arXiv’17 With thanks to Cris Conde for bringing this paper to my attention. We’ve looked at quite a few adv… | Continue reading


@blog.acolyer.org | 6 years ago

Large-scale analysis of style injection by relative path overwrite

Large-scale analysis of style injection by relative path overwrite Arshad et al., WWW’18 (If you don’t have ACM Digital Library access, the paper can be accessed either by following the link … | Continue reading


@blog.acolyer.org | 6 years ago

Unsupervised anomaly detection via variational auto-encoder for KPIs in web app

Unsupervised anomaly detection via variational auto-encoder for seasonal KPIs in web applications Xu et al., WWW’18 (If you don’t have ACM Digital Library access, the paper can be accessed ei… | Continue reading


@blog.acolyer.org | 6 years ago

The effects of social recommendations on network diversity

Algorithmic glass ceiling in social networks: the effects of social recommendations on network diversity Stoica et al., WWW’18 (If you don’t have ACM Digital Library access, the paper can be … | Continue reading


@blog.acolyer.org | 6 years ago

Pixie:system fr recommending 3+ billion items to 200+ million users in real-time

Pixie: a system for recommending 3+ billion items to 200+ million users in real-time Eksombatchai et al., WWW’18 (If you don’t have ACM Digital Library access, the paper can be accessed eithe… | Continue reading


@blog.acolyer.org | 6 years ago

SafeKeeper: protecting web passwords using trusted execution environments

SafeKeeper: protecting web passwords using trusted execution environments Krawiecka et al., WWW’18 (If you don’t have ACM Digital Library access, the paper can be accessed either by following… | Continue reading


@blog.acolyer.org | 6 years ago

Semantics and complexity of GraphQL

Semantics and complexity of GraphQL Hartig & Pérez, WWW’18 (If you don’t have ACM Digital Library access, the paper can be accessed either by following the link above directly from The Mo… | Continue reading


@blog.acolyer.org | 6 years ago

Re-Coding Black Mirror Part IV

This is part IV of our tour through the papers from the Re-coding Black Mirror workshop exploring future technology scenarios and their social and ethical implications. Is this the era of misinform… | Continue reading


@blog.acolyer.org | 6 years ago

Re-Coding Black Mirror Part III

This is part III of our tour through the papers from the Re-coding Black Mirror workshop exploring future technology scenarios and their social and ethical implications. Shut up and run: the never-… | Continue reading


@blog.acolyer.org | 6 years ago

Re-Coding Black Mirror, Part II

We’ll be looking at a couple more papers from the re-coding Black Mirror workshop today: Pitfalls of affective computing, Cooney et al. Ease and ethics of user profiling in Black Mirror, Pandit &am… | Continue reading


@blog.acolyer.org | 6 years ago

Re-Coding Black Mirror, Part I

In looking through the WWW’18 proceedings, I came across the co-located ‘Re-coding Black Mirror’ workshop. Re-coding Black Mirror is a full day workshop which explores how the widespread adoption o… | Continue reading


@blog.acolyer.org | 6 years ago

On the design of distributed programming models

On the design of distributed programming models Meiklejohn, arXiv 2017. Today’s choice is a lovely thought piece by Christopher Meiklejohn, making the case for distributed programming models.… | Continue reading


@blog.acolyer.org | 6 years ago

Inaudible voice commands: the long-range attack and defense

Inaudible voice commands: the long-range attack and defense Roy et al., NSDI’18 Although you can’t hear them, I’m sure you heard about the inaudible ultrasound attacks on always-on voice-base… | Continue reading


@blog.acolyer.org | 6 years ago

Equality of Opportunity in Supervised Learning

Equality of opportunity in supervised learning Hardt et al., NIPS’16 With thanks to Rob Harrop for highlighting this paper to me. There is a a lot of concern about discrimination and bias entering … | Continue reading


@blog.acolyer.org | 6 years ago

Progressive growing of GANs for improved quality, stability, and variation

Progressive growing of GANs for improved quality, stability, and variation Karras et al., ICLR’18 Let’s play “spot the celebrity”! (Not your usual #themorningpaper fodder I know, … | Continue reading


@blog.acolyer.org | 6 years ago

Photo-realistic image super-resolution using a generative adversarial network

Photo-realistic single image super-resolution using a generative adversarial network Ledig et al., arXiv’16 Today’s paper choice also addresses an image-to-image translation problem, but here… | Continue reading


@blog.acolyer.org | 6 years ago

Image-to-image translation with conditional adversarial networks

Image-to-image translation with conditional adversarial networks Isola et al., CVPR’17 It’s time we looked at some machine learning papers again! Over the next few days I’ve selected a few papers t… | Continue reading


@blog.acolyer.org | 6 years ago

Equality of opportunity in supervised learning

Equality of opportunity in supervised learning Hardt et al., NIPS’16 With thanks to Rob Harrop for highlighting this paper to me. There is a a lot of concern about discrimination and bias entering … | Continue reading


@blog.acolyer.org | 6 years ago