Abstract: Abstractions have proven essential for us to manage computing systems that are constantly growing in size and complexity. However, as core design primitives are obscured, these abstractions can also engender new...
Abstract: Abstractions have proven essential for us to manage computing systems that are constantly growing in size and complexity. However, as core design primitives are obscured, these abstractions can also engender new...
Abstract: Privacy-enhancing technologies (PETs) facilitate fine-grained control over how data can be accessed and used. While some PETs have found widespread adoption, most have yet to realize their potential social...
Abstract: Open-source software is everywhere and has become the backbone of today's cyber world, out of which, systems software such as operating-system kernels is arguably the most critical one, and its security may...
Abstract: Machine learning methods have become a commodity in the toolkits of both researchers and practitioners. For performance and privacy reasons, new applications often rely on third-party code or pretrained models,...