Author of the publication

vFair: latency-aware fair storage scheduling via per-IO cost-based differentiation.

, , , and . SoCC, page 125-138. ACM, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automating Patching of Vulnerable Open-Source Software Versions in Application Binaries., , , , , , , and . NDSS, The Internet Society, (2019)Invited Tutorial: Counteracting Web Application Abuse in Malware., , , , , and . SecDev, page 1-2. IEEE, (2023)C3PO: Large-Scale Study Of Covert Monitoring of C&C Servers via Over-Permissioned Protocol Infiltration., , , , , , , and . CCS, page 3352-3365. ACM, (2021)PUMM: Preventing Use-After-Free Using Execution Unit Partitioning., , , and . USENIX Security Symposium, page 823-840. USENIX Association, (2023)BASS: Improving I/O Performance for Cloud Block Storage via Byte-Addressable Storage Stack., , , , and . SoCC, page 169-181. ACM, (2016)This Hacker Knows Physics: Device Physics Aware Mimicry Attacks in Cyber-Physical Systems., , , , , and . IEEE Trans. Dependable Secur. Comput., 19 (5): 3218-3230 (2022)Automated Bug Hunting With Data-Driven Symbolic Root Cause Analysis., , , and . CCS, page 320-336. ACM, (2021)ARCUS: Symbolic Root Cause Analysis of Exploits in Production Systems., , , , , and . USENIX Security Symposium, page 1989-2006. USENIX Association, (2021)Forecasting Malware Capabilities From Cyber Attack Memory Images., , , , , , , and . USENIX Security Symposium, page 3523-3540. USENIX Association, (2021)On the Feasibility of Automating Stock Market Manipulation., , , , , and . ACSAC, page 277-290. ACM, (2020)