Managing performance vs. accuracy trade-offs with loop perforation
- Stelios Sidiroglou, Sasa Misailovic, H. Hoffmann, M. Rinard
- Computer ScienceESEC/FSE '11
- 5 September 2011
The results indicate that, for a range of applications, this approach typically delivers performance increases of over a factor of two (and up to a factors of seven) while changing the result that the application produces by less than 10%.
Automatically patching errors in deployed software
- J. Perkins, Sunghun Kim, M. Rinard
- Computer ScienceSymposium on Operating Systems Principles
- 11 October 2009
Aspects of ClearView that make it particularly appropriate for this context include its ability to generate patches without human intervention, apply and remove patchesto and from running applications without requiring restarts or otherwise perturbing the execution, and identify and discard ineffective or damaging patches by evaluating the continued behavior of patched applications.
Dynamic knobs for responsive power-aware computing
- H. Hoffmann, Stelios Sidiroglou, Michael Carbin, Sasa Misailovic, A. Agarwal, M. Rinard
- Computer Science, EngineeringASPLOS XVI
- 5 March 2011
The experimental results show that PowerDial can enable benchmark applications to execute responsively in the face of power caps that would otherwise significantly impair responsiveness, and can significantly reduce the number of machines required to service intermittent load spikes, enabling reductions in power and capital costs.
Control Jujutsu: On the Weaknesses of Fine-Grained Control Flow Integrity
- Isaac Evans, Fan Long, Stelios Sidiroglou
- Computer ScienceConference on Computer and Communications…
- 12 October 2015
It is shown that many popular code bases such as Apache and Nginx use coding practices that create flexibility in their intended control flow graph (CFG) even when a strong static analyzer is used to construct the CFG, which allows an attacker to gain control of the execution while strictly adhering to a fine-grained CFI.
Detecting Targeted Attacks Using Shadow Honeypots
- K. Anagnostakis, Stelios Sidiroglou, P. Akritidis, Konstantinos Xinidis, E. Markatos, A. Keromytis
- Computer ScienceUSENIX Security Symposium
- 31 July 2005
It is shown that despite a considerable overhead in the instrumentation of the shadow honeypot (up to 20% for Apache), the overall impact on the system is diminished by the ability to minimize the rate of false-positives.
Missing the Point(er): On the Effectiveness of Code Pointer Integrity
- Isaac Evans, Samuel Fingeret, H. Okhravi
- Computer ScienceIEEE Symposium on Security and Privacy
- 17 May 2015
It is shown that, for architectures that do not support segmentation in which CPI relies on information hiding, CPI's safe region can be leaked and then maliciously modified by using data pointer overwrites.
Quality of service profiling
- Sasa Misailovic, Stelios Sidiroglou, H. Hoffmann, M. Rinard
- Computer ScienceACM/IEEE 32nd International Conference on…
- 1 May 2010
The experimental results from applying the implemented quality of service profiler to a challenging set of benchmark applications show that it can enable developers to identify promising optimization opportunities and deliver successful optimizations that substantially increase the performance with only smallquality of service losses.
Automatic error elimination by horizontal code transfer across multiple applications
- Stelios Sidiroglou, Eric Lahtinen, Fan Long, M. Rinard
- Computer ScienceACM-SIGPLAN Symposium on Programming Language…
- 3 June 2015
Experimental results using seven donor applications to eliminate ten errors in seven recipient applications highlight the ability of CP to transfer code across applications to eliminated out of bounds access, integer overflow, and divide by zero errors.
Using Code Perforation to Improve Performance, Reduce Energy Consumption, and Respond to Failures
- A. Agarwal, M. Rinard, Stelios Sidiroglou, Sasa Misailovic, H. Hoffmann
- Computer Science
- 3 September 2009
The implemented SpeedPress compiler can automatically apply code perforation to existing computations with no developer intervention whatsoever and the result is a transformed computation that can respond almost immediately to a range of increased performance demands while keeping any resulting output distortion within acceptable user-defined bounds.
ASSURE: automatic software self-healing using rescue points
- Stelios Sidiroglou, Oren Laadan, C. Perez, N. Viennot, Jason Nieh, A. Keromytis
- Computer ScienceInternational Conference on Architectural Support…
- 28 February 2009
Experimental results show that ASSURE enabled recovery for all of the bugs tested with fast recovery times, has modest performance overhead, and provides automatic self-healing orders of magnitude faster than current human-driven patch deployment methods.