Bringing IoT to sports analytics Gowda et al., NSDI 17 Welcome back to the summer term of #themorningpaper! To kick things off, we'll be looking at a selection of papers from last month's NSDI'17 conference. We haven't looked at an IoT paper for a while, and this one happens to be about cricket - how … Continue reading Bringing IoT to sports analytics
Year: 2017
End of term, and thank you to the ACM
We've reached the end of term again, and The Morning Paper will be taking a two week break to recharge my batteries and my paper backlog! We covered a lot of ground over the last few months, and I've selected a few highlighted papers/posts at the end of this piece to tide you over until … Continue reading End of term, and thank you to the ACM
SGXIO: Generic trusted I/O path for Intel SGX
SGXIO: Generic trusted I/O path for Intel SGX Weiser & Werner, CODASPY '17 Intel's SGX provides hardware-secured enclaves for trusted execution of applications in an untrusted environment. Previously we've looked at Haven, which uses SGX in the context of cloud infrastructure, SCONE which shows how to run docker containers under SGX, and Panoply which looks at … Continue reading SGXIO: Generic trusted I/O path for Intel SGX
Detecting ROP with statistical learning of program characteristics
Detecting ROP with statistical learning of program characteristics Elsabagh et al., CODASPY '17 Return-oriented programming (ROP) attacks work by finding short instruction sequences in a process' executable memory (called gadgets) and chaining them together to achieve some goal of the attacker. For a quick introduction to ROP, see "The geometry of innocent flesh on the … Continue reading Detecting ROP with statistical learning of program characteristics
The curious case of the PDF converter that likes Mozart
The curious case of the PDF converter that likes Mozart: dissecting and mitigating the privacy risk of personal cloud apps Harkous et al., PoPET '16 This is the paper that preceded "If you can't beat them, join them" we looked at yesterday, and well worth interrupting our coverage of CODASPY '17 for. Harkous et al., … Continue reading The curious case of the PDF converter that likes Mozart
If you can’t beat them, join them: a usability approach to interdependent privacy in cloud apps
If you can't beat them, join them: a usability approach to interdependent privacy in cloud apps Harkous & Aberer, CODASPY '17 I'm quite used to thinking carefully about permissions before installing a Chrome browser extensions (they all seem to want permission to see absolutely everything - no thank you!). A similar issue comes up with … Continue reading If you can’t beat them, join them: a usability approach to interdependent privacy in cloud apps
A study of security vulnerabilities on Docker Hub
A study of security vulnerabilities on Docker Hub Shu et al., CODASPY '17 This is the first of five papers we'll be looking at this week from the ACM Conference on Data and Application Security and Privacy which took place earlier this month. Today's choice is a study looking at image vulnerabilities for container images … Continue reading A study of security vulnerabilities on Docker Hub
BBR: Congestion-based congestion control
BBR: Congestion-based congestion control Cardwell et al., ACM Queue Sep-Oct 2016 With thanks to Hossein Ghodse (@hossg) for recommending today's paper selection. This is the story of how members of Google's make-tcp-fast project developed and deployed a new congestion control algorithm for TCP called BBR (for Bandwidth Bottleneck and Round-trip propagation time), leading to 2-25x … Continue reading BBR: Congestion-based congestion control
Stochastic program optimization
Stochastic program optimization Schkufza et al., CACM 2016 Yesterday we saw that DeepCoder can find solutions to simple programming problems using a guided search. DeepCoder needs a custom DSL, and a maximum program length of 5 functions. In 'Stochastic program optimization' Schkufza et al. also use a search strategy to generate code that meets a … Continue reading Stochastic program optimization
DeepCoder: Learning to write programs
DeepCoder: Learning to write programs Balog et al., ICLR 2017 I'm mostly trying to wait until the ICLR conference itself before diving into the papers to be presented there, but this particular paper follows nicely on from yesterday, so I've decided to bring it forward. In 'Large scale evolution of image classifiers' we saw how … Continue reading DeepCoder: Learning to write programs