BLeak: Automatically debugging memory leaks in web applications Vilk & Berger, PLDI’18 BLeak is a Browser Leak debugger that finds memory leaks in web applications. You can use BLeak to t… | Continue reading
On the criteria to be used in decomposing systems into modules David L Parnas, 1971 Welcome back to a new term of The Morning Paper! I thought I’d kick things off by revisiting a few of my fa… | Continue reading
Oblix: an efficient oblivious search index Mishra et al., IEEE Security & Privacy 2018 Unfortunately, many known schemes that enable search queries on encrypted data achieve efficiency at the e… | Continue reading
EnclaveDB: A secure database using SGX Priebe et al., IEEE Security & Privacy 2018 This is a really interesting paper (if you’re into this kind of thing I guess!) bringing together the security… | Continue reading
Grand Pwning Unit: Accelerating microarchitectural attacks with the GPU Frigo et al., IEEE Security & Privacy The general awareness of microarchitectural attacks is greatly increased since melt… | Continue reading
Privacy risks with Facebook’s PII-based targeting: auditing a data broker’s advertising interface Venkatadri et al., IEEE Security and Privacy 2018 This is one of those jaw-hits-the-floor, can’t qu… | Continue reading
The rise of the citizen developer: assessing the security impact of online app generators Oltrogge et al., IEEE Security & Privacy 2018 “Low code”, “no code”, “cit… | Continue reading
Debugging data flows in reactive programs Banken et al., ICSE’18 To round off our look at papers from ICSE, here’s a really interesting look at the challenges of debugging reactive applicatio… | Continue reading
How not to structure your database-backed web applications: a study of performance bugs in the wild Yang et al., ICSE’18 This is a fascinating study of the problems people get into when using… | Continue reading
Secure coding practices in Java: challenges and vulnerabilities Meng et al., ICSE’18 TL;DR : don’t trust everything you read on Stack Overflow. Meng et al. conduct a study of Stack Overflow p… | Continue reading
Deep code search Gu et al., ICSE’18 The problem with searching for code is that the query, e.g. “read an object from xml,” doesn’t look very much like the source code snippets tha… | Continue reading
To distribute or not to distribute? Why licensing bugs matter Vendome et al., ICSE’18 Software licensing can quickly get quite complicated, with over 100 known open source licenses out there,… | Continue reading
Automated localization for unreproducible builds Ren et al., ICSE’18 Reproducible builds are an important component of integrity in the software supply chain. Attacks against package reposito… | Continue reading
Generalized data structure synthesis Loncaric et al., ICSE’18 Many systems have a few key data structures at their heart. Finding correct and efficient implementations for these data structur… | Continue reading
ConflictJS: finding and understanding conflicts between JavaScript libraries Patra et al., ICSE’18 The JavaScript ecosystem is fertile ground for dependency hell. With so many libraries being… | Continue reading
Debugging with intelligence via probabilistic inference Xu et al., ICSE’18 Xu et al. have built a automated debugger that can take a single failing test execution, and with minimal interactio… | Continue reading
DeepTest: automated testing of deep-neural-network-driven autonomous cars Tian et al., ICSE’18 How do you test a DNN? We’ve seen plenty of examples of adversarial attacks in previous editions… | Continue reading
Popular is cheaper: curtailing memory costs in interactive analytics engines Ghosh et al., EuroSys’18 (If you don’t have ACM Digital Library access, the paper can be accessed either by follow… | Continue reading
Analytics with smart arrays: adaptive and efficient language-independent data Psaroudakis et al., EuroSys’18 (If you don’t have ACM Digital Library access, the paper can be accessed either by… | Continue reading
Medea: scheduling of long running applications in shared production clusters Garefalakis et al., EuroSys’18 (If you don’t have ACM Digital Library access, the paper can be accessed either by … | Continue reading
Optimus: an efficient dynamic resource scheduler for deep learning clusters Peng et al., EuroSys’18 (If you don’t have ACM Digital Library access, the paper can be accessed either by followin… | Continue reading
Improving the expressiveness of deep learning frameworks with recursion Jeong, Jeong et al., EuroSys’18 (If you don’t have ACM Digital Library access, the paper can be accessed either by foll… | Continue reading
BDS: A centralized near-optimal overlay network for inter-datacenter data replication Zhang et al., EuroSys’18 (If you don’t have ACM Digital Library access, the paper can be accessed either … | Continue reading
Dynamic control flow in large-scale machine learning Yu et al., EuroSys’18 (If you don’t have ACM Digital Library access, the paper can be accessed either by following the link above directly… | Continue reading
Reducing DRAM footprint with NVM in Facebook Eisenman et al., EuroSys’18 (If you don’t have ACM Digital Library access, the paper can be accessed either by following the link above directly f… | Continue reading
ServiceFabric: a distributed platform for building microservices in the cloud Kakivaya et al., EuroSys’18 (If you don’t have ACM Digital Library access, the paper can be accessed either by fo… | Continue reading
Hyperledger fabric: a distributed operating system for permissioned blockchains Androulaki et al., EuroSys’18 (If you don’t have ACM Digital Library access, the paper can be accessed either b… | Continue reading
ForkBase: an efficient storage engine for blockchain and forkable applications Wang et al., arXiv’18 ForkBase is a data storage system designed to support applications that need a combination… | Continue reading
zkLedger: privacy-preserving auditing for distributed ledgers Narula et al., NSDI’18 Somewhat similarly to Solidus that we looked at late last year, zkLedger (presumably this stands for zero-… | Continue reading
Towards a design philosophy for interoperable blockchain systems Hardjono et al., arXiv 2018 Once upon a time there were networks and inter-networking, which let carefully managed groups of compute… | Continue reading
Measuring the tendency of CNNs to learn surface statistical regularities Jo et al., arXiv’17 With thanks to Cris Conde for bringing this paper to my attention. We’ve looked at quite a few adv… | Continue reading
Large-scale analysis of style injection by relative path overwrite Arshad et al., WWW’18 (If you don’t have ACM Digital Library access, the paper can be accessed either by following the link … | Continue reading
Unsupervised anomaly detection via variational auto-encoder for seasonal KPIs in web applications Xu et al., WWW’18 (If you don’t have ACM Digital Library access, the paper can be accessed ei… | Continue reading
Algorithmic glass ceiling in social networks: the effects of social recommendations on network diversity Stoica et al., WWW’18 (If you don’t have ACM Digital Library access, the paper can be … | Continue reading
Pixie: a system for recommending 3+ billion items to 200+ million users in real-time Eksombatchai et al., WWW’18 (If you don’t have ACM Digital Library access, the paper can be accessed eithe… | Continue reading
SafeKeeper: protecting web passwords using trusted execution environments Krawiecka et al., WWW’18 (If you don’t have ACM Digital Library access, the paper can be accessed either by following… | Continue reading
Semantics and complexity of GraphQL Hartig & Pérez, WWW’18 (If you don’t have ACM Digital Library access, the paper can be accessed either by following the link above directly from The Mo… | Continue reading
This is part IV of our tour through the papers from the Re-coding Black Mirror workshop exploring future technology scenarios and their social and ethical implications. Is this the era of misinform… | Continue reading
This is part III of our tour through the papers from the Re-coding Black Mirror workshop exploring future technology scenarios and their social and ethical implications. Shut up and run: the never-… | Continue reading
We’ll be looking at a couple more papers from the re-coding Black Mirror workshop today: Pitfalls of affective computing, Cooney et al. Ease and ethics of user profiling in Black Mirror, Pandit &am… | Continue reading
In looking through the WWW’18 proceedings, I came across the co-located ‘Re-coding Black Mirror’ workshop. Re-coding Black Mirror is a full day workshop which explores how the widespread adoption o… | Continue reading
On the design of distributed programming models Meiklejohn, arXiv 2017. Today’s choice is a lovely thought piece by Christopher Meiklejohn, making the case for distributed programming models.… | Continue reading
Inaudible voice commands: the long-range attack and defense Roy et al., NSDI’18 Although you can’t hear them, I’m sure you heard about the inaudible ultrasound attacks on always-on voice-base… | Continue reading
Equality of opportunity in supervised learning Hardt et al., NIPS’16 With thanks to Rob Harrop for highlighting this paper to me. There is a a lot of concern about discrimination and bias entering … | Continue reading
Progressive growing of GANs for improved quality, stability, and variation Karras et al., ICLR’18 Let’s play “spot the celebrity”! (Not your usual #themorningpaper fodder I know, … | Continue reading
Photo-realistic single image super-resolution using a generative adversarial network Ledig et al., arXiv’16 Today’s paper choice also addresses an image-to-image translation problem, but here… | Continue reading
Image-to-image translation with conditional adversarial networks Isola et al., CVPR’17 It’s time we looked at some machine learning papers again! Over the next few days I’ve selected a few papers t… | Continue reading
Equality of opportunity in supervised learning Hardt et al., NIPS’16 With thanks to Rob Harrop for highlighting this paper to me. There is a a lot of concern about discrimination and bias entering … | Continue reading