Papers, Articles, and More

Publications


We have a strong track-record in publishing in top systems, networking, security, and machine learning conferences and journals.

2024

NetShaper: A Differentially Private Network Side-Channel Mitigation System Amir Sabzi, Rut Vora, Swati Goswami, Margo Seltzer, Mathias Lécuyer, Aastha Mehta (USENIX Security 2024) [Link]

KAIROS: Practical Intrusion Detection and Investigation using Whole-system Provenance Zijun Cheng, Qiujian Lv, Jinyuan Liang, Yan Wang, Degang Sun, Thomas Pasquier, Xueyuan Han (IEEE S&P 2024) [Link]

2023

CAT-Walk: Inductive Hypergraph Learning via Set Walks Ali Behrouz, Farnoosh Hashemi, Sadaf Sadeghian, Margo Seltzer (NeurIPS 2023) [Link]

Exploring and Interacting with the Set of Good Sparse Generalized Additive Models Chudi Zhong, Zhi Chen, Jiachang Liu, Margo Seltzer, Cynthia Rudin (NeurIPS 2023) [Link]

Synthesizing Device Drivers with Ghost Writer Bingyao Wang, Sepehr Noorafshan, Reto Achermann, Margo Seltzer (PLOS 2023) [Link]

CHERI-picking: Leveraging capability hardware for prefetching Shaurya Patel, Sidharth Agrawal, Alexandra (Sasha) Fedorova, Margo Seltzer (PLOS @ SOSP'23) [Link]

Turbo: Effective Caching in Differentially-Private Databases Kelly Kostopoulou, Pierre Tholoniat, Asaf Cidon, Roxana Geambasu, Mathias Lécuyer (SOSP 2023) [Link]

Anomaly Detection in Human Brain via Inductive Learning on Temporal Multiplex Networks Ali Behrouz, Margo Seltzer (Machine Learning in Healthcare 2023) [Link]

ADMIRE++: Explainable Anomaly Detection in the Human Brain via Inductive Learning on Temporal Multiplex Networks Ali Behrouz, Margo Seltzer (ICML IMLH Workshop 2023) [Link]

CS-TGN: Community Search via Temporal Graph Neural Networks Farnoosh Hashemi, Ali Behrouz, Milad Rezaei Hajidehi (WWW Companion 2023) [Link]

DP-Adam: Correcting DP Bias in Adam's Second Moment Estimation Qiaoyue Tang, Mathias Lécuyer (RTML workshop at ICLR 2023) [Link]

Reproducibility as a Service Joseph Wonsil, Nichole Boufford, Prakhar Agrawal, Christopher Chen, Tianhang Cui, Akash Sivaram, Margo Seltzer (Software: Practice and Experience 2023) [Link]

Making Provenance Work for You Barbara Lerner, Emery Boose, Orenna Brand, Aaron M Ellison, Elizabeth Fong, Matthew K Lau, Khanh Ngo, Thomas Pasquier, Luis Perez, Margo Seltzer, Rose Sheehan, Joseph Wonsil (The R Journal 2023). [Link]

Understanding Inconsistency in Azure Cosmos DB with TLA+ Finn Hackett, Joshua Rowe, Markus Alexander Kuppe (ICSE '23-SEIP) [Link]

Compiling Distributed System Models with PGo Finn Hackett, Shayan Hosseini, Renato Costa, Matthew Do, Ivan Beschastnikh (ASPLOS '23). [Link]

GlueFL: Reconciling Client Sampling and Model Masking for Bandwidth Efficient Federated Learning Shiqi He, Qifan Yan, Feijie Wu, Lanjun Wang, Mathias Lécuyer, Ivan Beschastnikh (MLSys 2023). [Link]

Scaling Blockchain Consensus via a Robust Shared Mempool Fangyu Gai, Jianyu Niu, Ivan Beschastnikh, Chen Feng, Sheng Wang (ICDE 2023). [Link]

Mercury: Fast Transaction Broadcast in High Performance Blockchain Systems Mingxun Zhou, Yilin Han, Liyi Zeng, Peilun Li, Fan Long, Dong Zhou, Ivan Beschastnikh, Ming Wu (INFOCOM 2023). [Link]

Auto-tuning Elastic Applications in Production Adalberto R. Sampaio Junior, Ivan Beschastnikh, Daryl Maier, Don Bourne, Vijay Sundaresan (ICSE 2023, SEIP track). [Link]

FirmTruss Community Search in Multilayer Networks Ali Behrouz, Farnoosh Hashemi, Laks V. S. Lakshmanan (VLDB 2023) [Link]

Optimal Sparse Regression Trees Rui Zhang, Rui Xin, Margo Seltzer, Cynthia Rudin (AAAI 2023) [Link]

Unleashing Unprivileged eBPF Potential with Dynamic Sandboxing Soo Yee Lim, Xueyuan Han, Thomas Pasquier (SIGCOMM eBPF Workshop 2023) [Link]

2022

Anomaly Detection in Multiplex Dynamic Networks: from Blockchain Security to Brain Disease Prediction Ali Behrouz, Margo Seltzer (NeurIPS 2022 Temporal Graph Learning Workshop). [Link]

Fast Optimization of Weighted Sparse Decision Trees for use in Optimal Treatment Regimes and Optimal Policy Design Ali Behrouz, Mathias Lécuyer, Cynthia Rudin, Margo Seltzer (AIMLAI 2022). [Link]

CS-MLGCN: Multiplex Graph Convolutional Networks for Community Search in Multiplex Networks Ali Behrouz, Farnoosh Hashemi (CIKM 2022). [Link]

FirmCore Decomposition of Multilayer Networks Farnoosh Hashemi, Ali Behrouz, Laks V. S. Lakshmanan (WWW 2022). [Link]

Augmenting Operations Research with Auto-Formulation of Optimization Models From Problem Descriptions Rindra Ramamonjison, Haley Li, Timothy Yu, Shiqi He, Vishnu Rengan, Amin Banitalebi-dehkordi, Zirui Zhou, and Yong Zhang. Proceedings of EMNLP 2022 Industry Track (EMNLP 2022). [Link]

Repairing Failure-inducing Inputs with Input Reflection Yan Xiao, Yun Lin, Ivan Beschastnikh, Changsheng Sun, David S. Rosenblum, Jin Song Dong (ASE 2022). [Link]

Affective robots need therapy Paul Bucci, David Marino, Ivan Beschastnikh (ACM Transactions on Human-Robot Interaction (THRI), 2022). [Link]

Self-Checking Deep Neural Networks for Anomalies and Adversaries in Deployment Yan Xiao, Ivan Beschastnikh, Yun Lin, Rajdeep Singh Hundal, Xiaofei Xie, David S. Rosenblum, Jin Song Dong (IEEE Transactions on Dependable and Secure Computing (TDSC), 2022). [Link]

Linear-time Temporal Logic guided Greybox Fuzzing Ruijie Meng, Zhen Dong, Jialin Li, Ivan Beschastnikh, Abhik Roychoudhury (ICSE 2022). [Link]

One Bad Apple Spoils the Bunch: Transaction DoS in MimbleWimble Blockchains Seyed Ali Tabatabaee, Charlene Nicer, Ivan Beschastnikh, Chen Feng (ICBC 2022). [Link]

Fair Decision Making via Automated Repair of Decision Trees Zhang Jiang, Ivan Beschastnikh, Sergey Mechtaev, Abhik Roychoudhury (Fairware workshop at ICSE 2022). [Link]

CoSpot: A Cooperative VM Allocation Framework for Increased Revenue from Spot Instances Syed M. Iqbal, Haley Li, Shane Bergsma, Ivan Beschastnikh, and Alan J. Hu. Symposium on Cloud Computing (SoCC '22). [Link]

In-ConcReTeS: Interactive Consistency meets Distributed Real-Time Systems, Again! Arpan Gujarati, Ningfeng Yang, Björn B. Brandenburg. RTSS 2022. [Link]

Measuring the Effect of Training Data on Deep Learning Predictions via Randomized Experiments Jinkun Lin, Anqi Zhang, Mathias Lécuyer, Jinyang Li, Aurojit Panda, Siddhartha Sen. ICML 2022. [Link]

The Fault in Our Data Stars: Studying Mitigation Techniques against Faulty Training Data in Machine Learning Applications Abraham Chan, Arpan Gujarati, Karthik Pattabiraman, Sathish Gopalakrishnan. DSN 2022. [Link]

Arming IDS Researchers with a Robotic Arm Dataset Arpan Gujarati, Zainab Saeed Wattoo, Maryam Aliabadi, Sean Clark, Xiaoman Liu, Parisa Shiri, Amee Trivedi, Ruizhe Zhu, Jason Hein, Margo Seltzer. DSN 2022. [Link]

Listening to bluetooth beacons for epidemic risk mitgation Gilles Barthe, Roberta De Viti, Peter Druschel, Deepak Garg, Manuel Gomez-Rodriguez, Pierfrancesco Ingo, Heiner Kremer, Matthew Lentz, Lars Lorch, Aastha Mehta, Bernhard Schölkopf. Nature Scientific Reports 2022. [Link]

Pacer: Comprehensive Network Side-Channel Mitigation in the Cloud Aastha Mehta, Mohamed Alzayat, Roberta De Viti, Björn B. Brandenburg, Peter Druschel, Deepak Garg. USENIX Security 2022. [Link]

Fast Sparse Decision Tree Optimization via Reference Ensembles Hayden McTavish, Chudi Zhong, Reto Achermann, Ilias Karimalis, Jacques Chen, Cynthia Rudin, Margo Seltzer. AAAI-22. [Link]

A large-scale study on research code quality and execution Ana Trisovic, Matthew K Lau, Thomas Pasquier, Merce Crosas. Nature Scientific Data 2022. [Link]

2021

Macchiato: Importing Cache Side Channels to SDNs Amir Sabzi, Liron Schif, Kashyap Thimmaraju, Andreas Blenk, Stefan Schmid. ANCS 2021. Best Paper Award. [Link]

Understanding the Resilience of Neural Network Ensembles against Faulty Training Data Abraham Chan, Niranjhana Narayanan, Arpan Gujarati, Karthik Pattabiraman, Sathish Gopalakrishnan. QRS 2021. Best Paper Award. [Link]

Secure Namespaced Kernel Audit for Containers Soo Yee Lim, Bogdan Stelea, Xueyuan Han, Thomas Pasquier. SoCC 2021. [Link]

Sayer: Using Implicit Feedback to Optimize System Policies. Mathias Lécuyer, Sang Hoon Kim, Mihir Nanavati, Junchen Jiang, Siddhartha Sen, Amit Sharma, Aleksandrs Slivkins. SoCC 2021. [Link]

Assuage: Assembly Synthesis Using A Guided Exploration Jingmei Hu, Priyan Vaithilingam, Stephen Chong, Margo Seltzer, Elena Glassman. UIST 2021. [Link]

ARTINALI++: Multi-dimensional Specification Mining for Complex Cyber-Physical System Security Maryam Raiyat Aliabadi, Mojtaba Vahidi Asl, Ramak Ghavamizadeh. Journal of Systems and Software (JSS) 2021. [Link]

mmapx: Uniform Memory Protection in a Heterogeneous World Reto Achermann, David Cock, Roni Haecki, Nora Hossle, Lukas Humbel, Timothy Roscoe and Daniel Schwyn. HotOS 2021. [Link]

Fast local page-tables for virtualized NUMA servers with vMitosis Ashish Panwar, Reto Achermann, Arkaprava Basu, Abhishek Bhattacharjee, K. Gopinath, Jayneel Gandhi. ASPLOS 2021. [Link]

ARTINALI#: An Efficient Intrusion Detection Technique for Resource-Constrained Cyber-Physical Systems Maryam Raiyat Aliabadi, Margo Seltzer, Mojtaba Vahidi Asl, Ramak Ghavamizadeh. International Journal of Critical Infrastructure Protection (IJCIP), 2021. [Link]

SIGL: Securing Software Installations Through Deep Graph Learning X Han, X Yu, T Pasquier, D Li, J Rhee, J Mickens, M Seltzer, C Haifeng. USENIX Security 2021. [Link]

Privacy Budget Scheduling. Tao Luo, Mingen Pan, Pierre Tholoniat, Asaf Cidon, Roxana Geambasu, Mathias Lécuyer. OSDI 2021. [Link]

2020

Parking Packet Payload with P4 Swati Goswami, Nodir Kodirov, Craig Mustard, Ivan Beschastnikh, Margo Seltzer. CoNEXT 2020. [Link]

To Tune or Not to Tune? In Search of Optimal Configurations for Data Analytics Ayat Fekry, Lucian Carata, Thomas Pasquier, Andrew Rice, Andy Hopper. KDD 2020. [Link]

Accelerating the Configuration Tuning of Big Data Analytics with Similarity-aware Multitask Bayesian Optimization Ayat Fekry, Lucian Carata, Thomas Pasquier, Andrew Rice. BigData 2020. [Link]

Generalized and Scalable Optimal Sparse Decision Trees Jimmy Lin, Chudi Zhong, Diane Hu, Cynthia Rudin, Margo Seltzer. ICML 2020. [Link]

Push-button Orchestration of Host Provenance Data Collection Han, X., Mickens, J., Gehani, A., Seltzer, M., Pasquier, T. PRECS 2020. [Link]

Solving the Combing Problems in Kronecker Graphs Anand, V., Mehrotra, P., Margo, D., Seltzer, M. [Link]

Rclean: A Tool for Writing Cleaner, More Transparent Code Lau, M., Pasquier T., Seltzer, M. [Link]

A user-centered, learning asthma smartphone application for patients and providers Gaynor, M., Schneider, D., Seltzer, M., Crannage, E., Barron, M., Waterman, J., Oberle, A. [Link]

Unicorn: Runtime Provennace-Based Detector for Advanced Persistent Threats Han, X., Pasquier, T., Bates, A., Mickens, J., Seltzer, M. NDSS 2020. [Link]

Improving Data Scientist Efficiency with Provenance Hu, J., Joung, J., Jacobs, M., Gajos, K., Seltzer, M. [Link]

Unexpected Performance of Intel® Optane™ DC Persistent Memory Tony Mason, Thaleia Dimitra-Doudali, Margo Seltzer, Ada Gavrilovska [Link]

Scalable Constraint-based Virtual Data Center Allocation. Sam Bayless, Nodir Kodirov, Syed M. Iqbal, Ivan Beschastnikh, Holger H. Hoos, Alan J. Hu. AIJ 2020. [Link]

2019

Towards Seamless Configuration Tuning of Big Data Analytics Ayat Fekry, Lucian Carata, Thomas Pasquier, Andrew Rice, Andy Hopper. ICDCS 2019. [Link]

Brokered Agreements in Multi-Party Machine Learning. Clement Fung, Ivan Beschastnikh. APSys 2019. [Link]

Optimal Sparse Decision Trees. Xiyang Hu, Cynthia Rudin, Margo I. Seltzer. ArXiv 2019. [Link]

Bandwidth-Efficient Transaction Relay for Bitcoin. Gleb Naumenko, Gregory Maxwell, Pieter Wuille, Sasha Fedorova, Ivan Beschastnikh. ArXiv 2019. [Link]

Aquarium Technical Report Preprint. Ming Kawaguchi, Jingmei Hu, Eric Lu, David A. Holland, Stephen Chong, Margo Seltzer. ArXiv 2019. [Link]

ProvMark - A Provenance Expressiveness Benchmarking System. Sheung Chi Chan, James Cheney, Pramod Bhatotia, Thomas Pasquier, Ashish Gehani, Hassaan Irshad, Lucian Carata, Margo Seltzer. ACM/IFIP Middleware 2019. [Link]

Erlay - Efficient Transaction Relay for Bitcoin. Gleb Naumenko, Gregory Maxwell, Pieter Wuille, Alexandra Fedorova, Ivan Beschastnikh. CCS 2019. [Link]

Vulnerability & Blame - Making Sense of Unauthorized Access to Smartphones. Diogo Marques, Tiago João Guerreiro, Luís Carriço, Ivan Beschastnikh, Konstantin Beznosov. CHI 2019. [Link]

Jumpgate - In-Network Processing as a Service for Data Analytics. Craig Mustard, Fabian Ruffy, Anny Gakhokidze, Ivan Beschastnikh, Alexandra Fedorova. HotCloud 2019. [Link]

Improving microservice-based applications with runtime placement adaptation. Adalberto R. Sampaio, Julia Rubin, Ivan Beschastnikh, Nelson S. Rosa. J. Internet Services and Applications 2019. [Link]

Permissions Plugins as Android Apps. Nisarg Raval, Ali Razeen, Ashwin Machanavajjhala, Landon P. Cox, Andrew Warfield. MobiSys 2019. [Link]

Learning to listen for design. Elisa L. A. Baniassad, Ivan Beschastnikh, Reid Holmes, Gregor Kiczales, Meghan Allen. Onward 2019. [Link]

Trials and Tribulations in Synthesizing Operating Systems. Jingmei Hu, Eric Lu, David A. Holland, Ming Kawaguchi, Stephen Chong, Margo I. Seltzer. PLOS@SOSP 2019. [Link]

From Here to Provtopia. Thomas Pasquier, David M. Eyers, Margo Seltzer. Poly/DMAH@VLDB 2019. [Link]

Mining Specifications from Documentation using a Crowd. Peng Sun, Chris Brown, Ivan Beschastnikh, Kathryn T. Stolee. SANER 2019. [Link]

Personal Data and the Internet of Things: It is time to care about digital provenance Thomas Pasquier, David Eyers, Jean Bacon. Communications of the ACM 2019. [Link]

Certified Robustness to Adversarial Examples with Differential Privacy. Mathias Lécuyer, Vaggelis Atlidakis, Roxana Geambasu, Daniel Hsu, Suman Jana. S&P 2019. [Link]

Privacy Accounting and Quality Control in the Sage Differentially Private ML Platform. Mathias Lécuyer, Riley Spahn, Kiran Vodrahalli, Roxana Geambasu, Daniel Hsu. SOSP 2019. [Link]

2018

Runtime Analysis of Whole-System Provenance. Thomas Pasquier, Xueyuan Han, Thomas Moyer, Adam Bates, Olivier Hermant, David M. Eyers, Jean Bacon, Margo Seltzer. ACM Conference on Computer and Communications Security 2018. [Link]

VNF chain allocation and management at data center scale. Nodir Kodirov, Sam Bayless, Fabian Ruffy, Ivan Beschastnikh, Holger H. Hoos, Alan J. Hu. ANCS 2018. [Link]

Persistent Memory Transactions. Virendra J. Marathe, Achin Mishra, Amee Trivedi, Yihe Huang, Faisal Zaghloul, Sanidhya Kashyap, Margo Seltzer, Tim Harris, Steve Byan, Bill Bridge, Dave Dice. ArXiv 2018. [Link]

Mitigating Sybils in Federated Learning Poisoning. Clement Fung, Chris J. M. Yoon, Ivan Beschastnikh. ArXiv 2018. [Link]

Automatic Parallelization of Sequential Programs. Peter Kraft, Amos Waterland, Daniel Y. Fu, Anitha Gollamudi, Shai Szulanski, Margo Seltzer. ArXiv 2018. [Link]

Dancing in the Dark - Private Multi-Party Machine Learning in an Untrusted Setting. Clement Fung, Jamie Koerner, Stewart Grant, Ivan Beschastnikh. ArXiv 2018. [Link]

Biscotti - A Ledger for Private and Secure Peer-to-Peer Machine Learning. Muhammad Shayan, Clement Fung, Chris J. M. Yoon, Ivan Beschastnikh. ArXiv 2018. [Link]

Iroko - A Framework to Prototype Reinforcement Learning for Data Center Traffic Control. Fabian Ruffy, Michael Przystupa, Ivan Beschastnikh. ArXiv 2018. [Link]

Sharing and Preserving Computational Analyses for Posterity with encapsulator. Thomas Pasquier, Matthew K. Lau, Xueyuan Han, Elizabeth Fong, Barbara Staudt Lerner, Emery R. Boose, Merce Crosas, Aaron M. Ellison, Margo Seltzer. Computing in Science and Engineering 2018. [Link]

Towards Accountable Systems (Dagstuhl Seminar 18181). David M. Eyers, Christopher Millard, Margo Seltzer, Jatinder Singh. Dagstuhl Reports 2018. [Link]

Performance comprehension at WiredTiger. Alexandra Fedorova, Craig Mustard, Ivan Beschastnikh, Julia Rubin, Augustine Wong, Svetozar Miucin, Louis Ye. ESEC/SIGSOFT FSE 2018. [Link]

An NVM Carol - Visions of NVM Past, Present, and Future. Margo Seltzer, Virendra J. Marathe, Steve Byan. ICDE 2018. [Link]

Inferring and asserting distributed system invariants. Stewart Grant, Hendrik Cech, Ivan Beschastnikh. ICSE 2018. [Link]

Tsumiki - A Meta-Platform for Building Your Own Testbed. Justin Cappos, Yanyan Zhuang, Albert Rafetseder, Ivan Beschastnikh. IEEE Trans. Parallel Distrib. Syst. 2018. [Link]

Data provenance to audit compliance with privacy policy in the Internet of Things. Thomas Pasquier, Jatinder Singh, Julia E. Powles, David M. Eyers, Margo Seltzer, Jean Bacon. Personal and Ubiquitous Computing 2018. [Link]

Provenance-based Intrusion Detection - Opportunities and Challenges. Xueyuan Han, Thomas Pasquier, Margo Seltzer. TaPP 2018. [Link]

Closing the Performance Gap Between Volatile and Persistent Key-Value Stores Using Cross-Referencing Logs. Yihe Huang, Matej Pavlovic, Virendra J. Marathe, Margo Seltzer, Tim Harris, Steve Byan. USENIX Annual Technical Conference 2018. [Link]

2017

Flipping Out in Computer Science. Margo Seltzer. ;login- 2017. [Link]

Learning Certifiably Optimal Rule Lists for Categorical Data. Elaine Angelino, Nicholas Larus-Stone, Daniel Alabi, Margo Seltzer, Cynthia Rudin. ArXiv 2017. [Link]

Characterizing Social Insider Attacks on Facebook. Wali Ahmed Usmani, Diogo Marques, Ivan Beschastnikh, Konstantin Beznosov, Tiago João Vieira Guerreiro, Luís Carriço. CHI 2017. [Link]

Mirador - An Active Control Plane for Datacenter Storage. Jake Wires, Andrew Warfield. FAST 2017. [Link]

FRAPpuccino - Fault-detection through Runtime Analysis of Provenance. Xueyuan Han, Thomas Pasquier, Tanvi Ranjan, Mark Goldstein, Margo Seltzer. HotCloud 2017. [Link]

Persistent Memcached - Bringing Legacy Code to Byte-Addressable Persistent Memory. Virendra J. Marathe, Margo Seltzer, Steve Byan, Tim Harris. HotStorage 2017. [Link]

Scalable Bayesian Rule Lists. Hongyu Yang, Cynthia Rudin, Margo Seltzer. ICML 2017. [Link]

Studying multi-threaded behavior with TSViz. Matheus Nunes, Harjeet Lalh, Ashaya Sharma, Augustine Wong, Svetozar Miucin, Alexandra Fedorova, Ivan Beschastnikh. ICSE 2017. [Link]

Accelerating Software Engineering Research Adoption with Analysis Bots. Ivan Beschastnikh, Mircea Filip Lungu, Yanyan Zhuang. ICSE-NIER 2017. [Link]

Refactoring Asynchrony in JavaScript. Keheliya Gallaba, Quinn Hanam, Ali Mesbah, Ivan Beschastnikh. ICSME 2017. [Link]

Supporting Microservice Evolution. Adalberto R. Sampaio, Harshavardhan Kadiyala, Bo Hu, John Steinbacher, Tony Erwin, Nelson S. Rosa, Ivan Beschastnikh, Julia Rubin. ICSME 2017. [Link]

Scalable Constraint-based Virtual Data Center Allocation. Sam Bayless, Nodir Kodirov, Ivan Beschastnikh, Holger H. Hoos, Alan J. Hu. IJCAI 2017. [Link]

Learning Certifiably Optimal Rule Lists for Categorical Data. Elaine Angelino, Nicholas Larus-Stone, Daniel Alabi, Margo Seltzer, Cynthia Rudin. J. Mach. Learn. Res. 2017. [Link]

Learning Certifiably Optimal Rule Lists. Elaine Angelino, Nicholas Larus-Stone, Daniel Alabi, Margo Seltzer, Cynthia Rudin. KDD 2017. [Link]

A Crowdsourcing Approach to Collecting Tutorial Videos - Toward Personalized Learning-at-Scale. Jacob Whitehill, Margo Seltzer. L@S 2017. [Link]

Scalable and Fault Tolerant Platform for Distributed Learning on Private Medical Data. Alborz Amir-Khalili, Soheil Kianzad, Rafeef Abugharbieh, Ivan Beschastnikh. MLMI@MICCAI 2017. [Link]

Decibel - Isolation and Sharing in Disaggregated Rack-Scale Storage. Mihir Nanavati, Jake Wires, Andrew Warfield. NSDI 2017. [Link]

Practical whole-system provenance capture. Thomas Pasquier, Xueyuan Han, Mark Goldstein, Thomas Moyer, David M. Eyers, Margo Seltzer, Jean Bacon. SoCC 2017. [Link]

Sketches of space - ownership accounting for shared storage. Jake Wires, Pradeep Ganesan, Andrew Warfield. SoCC 2017. [Link]

2015

Counter Stacks and the Elusive Working Set. Jake Wires, Stephen Ingram, Zachary Drudi, Nicholas J. A. Harvey, Andrew Warfield. ;login- 2015. [Link]

Non-volatile Storage. Mihir Nanavati, Malte Schwarzkopf, Jake Wires, Andrew Warfield. ACM Queue 2015. [Link]

Approximating Hit Rate Curves using Streaming Algorithms. Zachary Drudi, Nicholas J. A. Harvey, Stephen Ingram, Andrew Warfield, Jake Wires. APPROX-RANDOM 2015. [Link]

Using Declarative Specification to Improve the Understanding, Extensibility, and Comparison of Model-Inference Algorithms. Ivan Beschastnikh, Yuriy Brun, Jenny Abrahamson, Michael D. Ernst, Arvind Krishnamurthy. IEEE Trans. Software Eng. 2015. [Link]

Tardigrade - Leveraging Lightweight Virtual Machines to Easily and Efficiently Construct Fault-Tolerant Services. Jacob R. Lorch, Andrew Baumann, Lisa Glendenning, Dutch T. Meyer, Andrew Warfield. NSDI 2015. [Link]

2014

Preface. Jennifer L. Burke, Alan Wagner, Donald A. Sofge, William F. Lawless. AAAI Spring Symposia 2014. [Link]

Cloud security - a gathering storm. Mihir Nanavati, Patrick Colp, Bill Aiello, Andrew Warfield. Commun. ACM 2014. [Link]

An integrated fine-grain runtime system for MPI. Humaira Kamal, Alan Wagner. Computing 2014. [Link]

Strata - scalable high-performance storage on virtualized non-volatile memory. Brendan Cully, Jake Wires, Dutch T. Meyer, Kevin Jamieson, Keir Fraser, Tim Deegan, Daniel Stodden, Geoffrey Lefebvre, Daniel Ferstay, Andrew Warfield. FAST 2014. [Link]

A scalable distributed skip list for range queries. Sarwar Alam, Humaira Kamal, Alan Wagner. HPDC 2014. [Link]

Innesto - a multi-attribute searchable consistent key/value store. Mahdi Tayarani Najaran, Norman C. Hutchinson. IJBDI 2014. [Link]

SPEX - scalable spatial publish/subscribe for distributed virtual worlds without borders. Mahdi Tayarani Najaran, Shun-Yun Hu, Norman C. Hutchinson. MMSys 2014. [Link]

Characterizing Storage Workloads with Counter Stacks. Jake Wires, Stephen Ingram, Zachary Drudi, Nicholas J. A. Harvey, Andrew Warfield. OSDI 2014. [Link]

2013

Service Oriented Programming in MPI. Sarwar Alam, Humaira Kamal, Alan Wagner. CPA 2013. [Link]

Innesto - A Searchable Key/Value Store for Highly Dimensional Data. Mahdi Tayarani Najaran, Norman C. Hutchinson. CloudCom 2013. [Link]

Whose cache line is it anyway? - operating system support for live detection and repair of false sharing. Mihir Nanavati, Mark Spear, Nathan Taylor, Shriram Rajagopalan, Dutch T. Meyer, William Aiello, Andrew Warfield. EuroSys 2013. [Link]

Escape Capsule - Explicit State Is Robust and Scalable. Shriram Rajagopalan, Dan Williams, Hani Jamjoom, Andrew Warfield. HotOS 2013. [Link]

Split/Merge - System Support for Elastic Execution in Virtual Middleboxes. Shriram Rajagopalan, Dan Williams, Hani Jamjoom, Andrew Warfield. NSDI 2013. [Link]

Tolerating business failures in hosted applications. Jean-Sébastien Légaré, Dutch T. Meyer, Mark Spear, Alexandru Totolici, Sara Bainbridge, Kalan MacRow, Róbert Sumi, Quinlan Jung, Dennis Tjandra, David Williams-King, William Aiello, Andrew Warfield. SoCC 2013. [Link]

RemusDB - transparent high availability for database systems. Umar Farooq Minhas, Shriram Rajagopalan, Brendan Cully, Ashraf Aboulnaga, Kenneth Salem, Andrew Warfield. VLDB J. 2013. [Link]

2012

An Integrated Runtime Scheduler for MPI. Humaira Kamal, Alan Wagner. EuroMPI 2012. [Link]

Portable and Performant Userspace SCTP Stack. Brad Penoff, Alan Wagner, Michael Tüxen, Irene Rüngeler. ICCCN 2012. [Link]

Added Concurrency to Improve MPI Performance on Multicore. Humaira Kamal, Alan Wagner. ICPP 2012. [Link]

Execution mining. Geoffrey Lefebvre, Brendan Cully, Christopher Head, Mark Spear, Norman C. Hutchinson, Mike Feeley, Andrew Warfield. VEE 2012. [Link]

SecondSite - disaster tolerance as a service. Shriram Rajagopalan, Brendan Cully, Ryan O'Connor, Andrew Warfield. VEE 2012. [Link]

DOHA - scalable real-time web applications through adaptive concurrent execution. Aiman Erbad, Norman C. Hutchinson, Charles Krasic. WWW 2012. [Link]

2011

Namespace Management in Virtual Desktops. Dutch T. Meyer, Jake Wires, Norman C. Hutchinson, Andrew Warfield. ;login- 2011. [Link]

Protecting consumer privacy from electric load monitoring. Stephen E. McLaughlin, Patrick D. McDaniel, William Aiello. ACM Conference on Computer and Communications Security 2011. [Link]

Capo - Recapitulating Storage for Virtual Desktops. Mohammad Shamma, Dutch T. Meyer, Jake Wires, Maria Ivanova, Norman C. Hutchinson, Andrew Warfield. FAST 2011. [Link]

Herbert West - Deanonymizer. Mihir Nanavati, Nathan Taylor, William Aiello, Andrew Warfield. HotSec 2011. [Link]

Exposing File System Mappings with MapFS. Jake Wires, Mark Spear, Andrew Warfield. HotStorage 2011. [Link]

RemusDB - Transparent High Availability for Database Systems. Umar Farooq Minhas, Shriram Rajagopalan, Brendan Cully, Ashraf Aboulnaga, Kenneth Salem, Andrew Warfield. PVLDB 2011. [Link]

Breaking up is hard to do - security and functionality in a commodity hypervisor. Patrick Colp, Mihir Nanavati, Jun Zhu, William Aiello, George Coker, Tim Deegan, Peter Loscocco, Andrew Warfield. SOSP 2011. [Link]

A new fast algorithm for connecting the INET simulation framework to applications in real-time. Irene Rüngeler, Michael Tüxen, Brad Penoff, Alan Wagner. SimuTools 2011. [Link]

Retroactive aspects - programming in the past. Robin Salkeld, Wenhao Xu, Brendan Cully, Geoffrey Lefebvre, Andrew Warfield, Gregor Kiczales. WODA 2011. [Link]

2010

Beyond Blocks and Files. Jake Wires, Andrew Warfield. ;login- 2010. [Link]

Scalability of communicators and groups in MPI. Humaira Kamal, Seyed M. Mirtaheri, Alan Wagner. HPDC 2010. [Link]

Fast and Cautious Evolution of Cloud Storage. Dutch T. Meyer, Mohammad Shamma, Jake Wires, Quan Zhang, Norman C. Hutchinson, Andrew Warfield. HotStorage 2010. [Link]

FG-MPI - Fine-grain MPI for multicore and clusters. Humaira Kamal, Alan Wagner. IPDPS Workshops 2010. [Link]

Employing transport layer multi-railing in cluster networks. Brad Penoff, Humaira Kamal, Alan Wagner, Mike Tsai, Karol Mroz, Janardhan R. Iyengar. J. Parallel Distrib. Comput. 2010. [Link]

Systopia lab is supported by a number of government and industrial sources, including Cisco Systems, the Communications Security Establishment Canada, Intel Research, the National Sciences and Engineering Research Council of Canada (NSERC), Network Appliance, Office of the Privacy Commissioner of Canada, and the National Science Foundation (NSF).