Papers, Articles, and More

Publications


We have a strong track-record in publishing in top systems, networks, and security conferences and journals.

2021

SIGL: Securing Software Installations Through Deep Graph Learning X Han, X Yu, T Pasquier, D Li, J Rhee, J Mickens, M Seltzer, C Haifeng. USENIX Security 2021. [Link]

2020

To Tune or Not to Tune? In Search of Optimal Configurations for Data Analytics Ayat Fekry, Lucian Carata, Thomas Pasquier, Andrew Rice, Andy Hopper. KDD 2020. [Link]

Accelerating the Configuration Tuning of Big Data Analytics with Similarity-aware Multitask Bayesian Optimization Ayat Fekry, Lucian Carata, Thomas Pasquier, Andrew Rice. BigData 2020. [Link]

Generalized and Scalable Optimal Sparse Decision Trees Jimmy Lin, Chudi Zhong, Diane Hu, Cynthia Rudin, Margo Seltzer. ICML 2020. [Link]

Push-button Orchestration of Host Provenance Data Collection Han, X., Mickens, J., Gehani, A., Seltzer, M., Pasquier, T. PRECS 2020. [Link]

Solving the Combing Problems in Kronecker Graphs Anand, V., Mehrotra, P., Margo, D., Seltzer, M. [Link]

Rclean: A Tool for Writing Cleaner, More Transparent Code Lau, M., Pasquier T., Seltzer, M. [Link]

A user-centered, learning asthma smartphone application for patients and providers Gaynor, M., Schneider, D., Seltzer, M., Crannage, E., Barron, M., Waterman, J., Oberle, A. [Link]

Unicorn: Runtime Provennace-Based Detector for Advanced Persistent Threats Han, X., Pasquier, T., Bates, A., Mickens, J., Seltzer, M. NDSS 2020. [Link]

Improving Data Scientist Efficiency with Provenance Hu, J., Joung, J., Jacobs, M., Gajos, K., Seltzer, M. [Link]

Unexpected Performance of Intel® Optane™ DC Persistent Memory Tony Mason, Thaleia Dimitra-Doudali, Margo Seltzer, Ada Gavrilovska [Link]

2019

Towards Seamless Configuration Tuning of Big Data Analytics Ayat Fekry, Lucian Carata, Thomas Pasquier, Andrew Rice, Andy Hopper. ICDCS 2019. [Link]

Brokered Agreements in Multi-Party Machine Learning. Clement Fung, Ivan Beschastnikh. APSys 2019. [Link]

Optimal Sparse Decision Trees. Xiyang Hu, Cynthia Rudin, Margo I. Seltzer. ArXiv 2019. [Link]

Bandwidth-Efficient Transaction Relay for Bitcoin. Gleb Naumenko, Gregory Maxwell, Pieter Wuille, Sasha Fedorova, Ivan Beschastnikh. ArXiv 2019. [Link]

Aquarium Technical Report Preprint. Ming Kawaguchi, Jingmei Hu, Eric Lu, David A. Holland, Stephen Chong, Margo Seltzer. ArXiv 2019. [Link]

ProvMark - A Provenance Expressiveness Benchmarking System. Sheung Chi Chan, James Cheney, Pramod Bhatotia, Thomas Pasquier, Ashish Gehani, Hassaan Irshad, Lucian Carata, Margo Seltzer. ACM/IFIP Middleware 2019. [Link]

Erlay - Efficient Transaction Relay for Bitcoin. Gleb Naumenko, Gregory Maxwell, Pieter Wuille, Alexandra Fedorova, Ivan Beschastnikh. CCS 2019. [Link]

Vulnerability & Blame - Making Sense of Unauthorized Access to Smartphones. Diogo Marques, Tiago João Guerreiro, Luís Carriço, Ivan Beschastnikh, Konstantin Beznosov. CHI 2019. [Link]

Jumpgate - In-Network Processing as a Service for Data Analytics. Craig Mustard, Fabian Ruffy, Anny Gakhokidze, Ivan Beschastnikh, Alexandra Fedorova. HotCloud 2019. [Link]

Improving microservice-based applications with runtime placement adaptation. Adalberto R. Sampaio, Julia Rubin, Ivan Beschastnikh, Nelson S. Rosa. J. Internet Services and Applications 2019. [Link]

Permissions Plugins as Android Apps. Nisarg Raval, Ali Razeen, Ashwin Machanavajjhala, Landon P. Cox, Andrew Warfield. MobiSys 2019. [Link]

Learning to listen for design. Elisa L. A. Baniassad, Ivan Beschastnikh, Reid Holmes, Gregor Kiczales, Meghan Allen. Onward 2019. [Link]

Trials and Tribulations in Synthesizing Operating Systems. Jingmei Hu, Eric Lu, David A. Holland, Ming Kawaguchi, Stephen Chong, Margo I. Seltzer. PLOS@SOSP 2019. [Link]

From Here to Provtopia. Thomas Pasquier, David M. Eyers, Margo Seltzer. Poly/DMAH@VLDB 2019. [Link]

Mining Specifications from Documentation using a Crowd. Peng Sun, Chris Brown, Ivan Beschastnikh, Kathryn T. Stolee. SANER 2019. [Link]

Personal Data and the Internet of Things: It is time to care about digital provenance Thomas Pasquier, David Eyers, Jean Bacon. Communications of the ACM 2019. [Link]

2018

Runtime Analysis of Whole-System Provenance. Thomas Pasquier, Xueyuan Han, Thomas Moyer, Adam Bates, Olivier Hermant, David M. Eyers, Jean Bacon, Margo Seltzer. ACM Conference on Computer and Communications Security 2018. [Link]

VNF chain allocation and management at data center scale. Nodir Kodirov, Sam Bayless, Fabian Ruffy, Ivan Beschastnikh, Holger H. Hoos, Alan J. Hu. ANCS 2018. [Link]

Persistent Memory Transactions. Virendra J. Marathe, Achin Mishra, Amee Trivedi, Yihe Huang, Faisal Zaghloul, Sanidhya Kashyap, Margo Seltzer, Tim Harris, Steve Byan, Bill Bridge, Dave Dice. ArXiv 2018. [Link]

Mitigating Sybils in Federated Learning Poisoning. Clement Fung, Chris J. M. Yoon, Ivan Beschastnikh. ArXiv 2018. [Link]

Automatic Parallelization of Sequential Programs. Peter Kraft, Amos Waterland, Daniel Y. Fu, Anitha Gollamudi, Shai Szulanski, Margo Seltzer. ArXiv 2018. [Link]

Dancing in the Dark - Private Multi-Party Machine Learning in an Untrusted Setting. Clement Fung, Jamie Koerner, Stewart Grant, Ivan Beschastnikh. ArXiv 2018. [Link]

Biscotti - A Ledger for Private and Secure Peer-to-Peer Machine Learning. Muhammad Shayan, Clement Fung, Chris J. M. Yoon, Ivan Beschastnikh. ArXiv 2018. [Link]

Iroko - A Framework to Prototype Reinforcement Learning for Data Center Traffic Control. Fabian Ruffy, Michael Przystupa, Ivan Beschastnikh. ArXiv 2018. [Link]

Sharing and Preserving Computational Analyses for Posterity with encapsulator. Thomas Pasquier, Matthew K. Lau, Xueyuan Han, Elizabeth Fong, Barbara Staudt Lerner, Emery R. Boose, Merce Crosas, Aaron M. Ellison, Margo Seltzer. Computing in Science and Engineering 2018. [Link]

Towards Accountable Systems (Dagstuhl Seminar 18181). David M. Eyers, Christopher Millard, Margo Seltzer, Jatinder Singh. Dagstuhl Reports 2018. [Link]

Performance comprehension at WiredTiger. Alexandra Fedorova, Craig Mustard, Ivan Beschastnikh, Julia Rubin, Augustine Wong, Svetozar Miucin, Louis Ye. ESEC/SIGSOFT FSE 2018. [Link]

An NVM Carol - Visions of NVM Past, Present, and Future. Margo Seltzer, Virendra J. Marathe, Steve Byan. ICDE 2018. [Link]

Inferring and asserting distributed system invariants. Stewart Grant, Hendrik Cech, Ivan Beschastnikh. ICSE 2018. [Link]

Tsumiki - A Meta-Platform for Building Your Own Testbed. Justin Cappos, Yanyan Zhuang, Albert Rafetseder, Ivan Beschastnikh. IEEE Trans. Parallel Distrib. Syst. 2018. [Link]

Data provenance to audit compliance with privacy policy in the Internet of Things. Thomas Pasquier, Jatinder Singh, Julia E. Powles, David M. Eyers, Margo Seltzer, Jean Bacon. Personal and Ubiquitous Computing 2018. [Link]

Provenance-based Intrusion Detection - Opportunities and Challenges. Xueyuan Han, Thomas Pasquier, Margo Seltzer. TaPP 2018. [Link]

Closing the Performance Gap Between Volatile and Persistent Key-Value Stores Using Cross-Referencing Logs. Yihe Huang, Matej Pavlovic, Virendra J. Marathe, Margo Seltzer, Tim Harris, Steve Byan. USENIX Annual Technical Conference 2018. [Link]

2017

Flipping Out in Computer Science. Margo Seltzer. ;login- 2017. [Link]

Learning Certifiably Optimal Rule Lists for Categorical Data. Elaine Angelino, Nicholas Larus-Stone, Daniel Alabi, Margo Seltzer, Cynthia Rudin. ArXiv 2017. [Link]

Characterizing Social Insider Attacks on Facebook. Wali Ahmed Usmani, Diogo Marques, Ivan Beschastnikh, Konstantin Beznosov, Tiago João Vieira Guerreiro, Luís Carriço. CHI 2017. [Link]

Mirador - An Active Control Plane for Datacenter Storage. Jake Wires, Andrew Warfield. FAST 2017. [Link]

FRAPpuccino - Fault-detection through Runtime Analysis of Provenance. Xueyuan Han, Thomas Pasquier, Tanvi Ranjan, Mark Goldstein, Margo Seltzer. HotCloud 2017. [Link]

Persistent Memcached - Bringing Legacy Code to Byte-Addressable Persistent Memory. Virendra J. Marathe, Margo Seltzer, Steve Byan, Tim Harris. HotStorage 2017. [Link]

Scalable Bayesian Rule Lists. Hongyu Yang, Cynthia Rudin, Margo Seltzer. ICML 2017. [Link]

Studying multi-threaded behavior with TSViz. Matheus Nunes, Harjeet Lalh, Ashaya Sharma, Augustine Wong, Svetozar Miucin, Alexandra Fedorova, Ivan Beschastnikh. ICSE 2017. [Link]

Accelerating Software Engineering Research Adoption with Analysis Bots. Ivan Beschastnikh, Mircea Filip Lungu, Yanyan Zhuang. ICSE-NIER 2017. [Link]

Refactoring Asynchrony in JavaScript. Keheliya Gallaba, Quinn Hanam, Ali Mesbah, Ivan Beschastnikh. ICSME 2017. [Link]

Supporting Microservice Evolution. Adalberto R. Sampaio, Harshavardhan Kadiyala, Bo Hu, John Steinbacher, Tony Erwin, Nelson S. Rosa, Ivan Beschastnikh, Julia Rubin. ICSME 2017. [Link]

Scalable Constraint-based Virtual Data Center Allocation. Sam Bayless, Nodir Kodirov, Ivan Beschastnikh, Holger H. Hoos, Alan J. Hu. IJCAI 2017. [Link]

Learning Certifiably Optimal Rule Lists for Categorical Data. Elaine Angelino, Nicholas Larus-Stone, Daniel Alabi, Margo Seltzer, Cynthia Rudin. J. Mach. Learn. Res. 2017. [Link]

Learning Certifiably Optimal Rule Lists. Elaine Angelino, Nicholas Larus-Stone, Daniel Alabi, Margo Seltzer, Cynthia Rudin. KDD 2017. [Link]

A Crowdsourcing Approach to Collecting Tutorial Videos - Toward Personalized Learning-at-Scale. Jacob Whitehill, Margo Seltzer. L@S 2017. [Link]

Scalable and Fault Tolerant Platform for Distributed Learning on Private Medical Data. Alborz Amir-Khalili, Soheil Kianzad, Rafeef Abugharbieh, Ivan Beschastnikh. MLMI@MICCAI 2017. [Link]

Decibel - Isolation and Sharing in Disaggregated Rack-Scale Storage. Mihir Nanavati, Jake Wires, Andrew Warfield. NSDI 2017. [Link]

Practical whole-system provenance capture. Thomas Pasquier, Xueyuan Han, Mark Goldstein, Thomas Moyer, David M. Eyers, Margo Seltzer, Jean Bacon. SoCC 2017. [Link]

Sketches of space - ownership accounting for shared storage. Jake Wires, Pradeep Ganesan, Andrew Warfield. SoCC 2017. [Link]

2015

Counter Stacks and the Elusive Working Set. Jake Wires, Stephen Ingram, Zachary Drudi, Nicholas J. A. Harvey, Andrew Warfield. ;login- 2015. [Link]

Non-volatile Storage. Mihir Nanavati, Malte Schwarzkopf, Jake Wires, Andrew Warfield. ACM Queue 2015. [Link]

Approximating Hit Rate Curves using Streaming Algorithms. Zachary Drudi, Nicholas J. A. Harvey, Stephen Ingram, Andrew Warfield, Jake Wires. APPROX-RANDOM 2015. [Link]

Using Declarative Specification to Improve the Understanding, Extensibility, and Comparison of Model-Inference Algorithms. Ivan Beschastnikh, Yuriy Brun, Jenny Abrahamson, Michael D. Ernst, Arvind Krishnamurthy. IEEE Trans. Software Eng. 2015. [Link]

Tardigrade - Leveraging Lightweight Virtual Machines to Easily and Efficiently Construct Fault-Tolerant Services. Jacob R. Lorch, Andrew Baumann, Lisa Glendenning, Dutch T. Meyer, Andrew Warfield. NSDI 2015. [Link]

2014

Preface. Jennifer L. Burke, Alan Wagner, Donald A. Sofge, William F. Lawless. AAAI Spring Symposia 2014. [Link]

Cloud security - a gathering storm. Mihir Nanavati, Patrick Colp, Bill Aiello, Andrew Warfield. Commun. ACM 2014. [Link]

An integrated fine-grain runtime system for MPI. Humaira Kamal, Alan Wagner. Computing 2014. [Link]

Strata - scalable high-performance storage on virtualized non-volatile memory. Brendan Cully, Jake Wires, Dutch T. Meyer, Kevin Jamieson, Keir Fraser, Tim Deegan, Daniel Stodden, Geoffrey Lefebvre, Daniel Ferstay, Andrew Warfield. FAST 2014. [Link]

A scalable distributed skip list for range queries. Sarwar Alam, Humaira Kamal, Alan Wagner. HPDC 2014. [Link]

Innesto - a multi-attribute searchable consistent key/value store. Mahdi Tayarani Najaran, Norman C. Hutchinson. IJBDI 2014. [Link]

SPEX - scalable spatial publish/subscribe for distributed virtual worlds without borders. Mahdi Tayarani Najaran, Shun-Yun Hu, Norman C. Hutchinson. MMSys 2014. [Link]

Characterizing Storage Workloads with Counter Stacks. Jake Wires, Stephen Ingram, Zachary Drudi, Nicholas J. A. Harvey, Andrew Warfield. OSDI 2014. [Link]

2013

Service Oriented Programming in MPI. Sarwar Alam, Humaira Kamal, Alan Wagner. CPA 2013. [Link]

Innesto - A Searchable Key/Value Store for Highly Dimensional Data. Mahdi Tayarani Najaran, Norman C. Hutchinson. CloudCom 2013. [Link]

Whose cache line is it anyway? - operating system support for live detection and repair of false sharing. Mihir Nanavati, Mark Spear, Nathan Taylor, Shriram Rajagopalan, Dutch T. Meyer, William Aiello, Andrew Warfield. EuroSys 2013. [Link]

Escape Capsule - Explicit State Is Robust and Scalable. Shriram Rajagopalan, Dan Williams, Hani Jamjoom, Andrew Warfield. HotOS 2013. [Link]

Split/Merge - System Support for Elastic Execution in Virtual Middleboxes. Shriram Rajagopalan, Dan Williams, Hani Jamjoom, Andrew Warfield. NSDI 2013. [Link]

Tolerating business failures in hosted applications. Jean-Sébastien Légaré, Dutch T. Meyer, Mark Spear, Alexandru Totolici, Sara Bainbridge, Kalan MacRow, Róbert Sumi, Quinlan Jung, Dennis Tjandra, David Williams-King, William Aiello, Andrew Warfield. SoCC 2013. [Link]

RemusDB - transparent high availability for database systems. Umar Farooq Minhas, Shriram Rajagopalan, Brendan Cully, Ashraf Aboulnaga, Kenneth Salem, Andrew Warfield. VLDB J. 2013. [Link]

2012

An Integrated Runtime Scheduler for MPI. Humaira Kamal, Alan Wagner. EuroMPI 2012. [Link]

Portable and Performant Userspace SCTP Stack. Brad Penoff, Alan Wagner, Michael Tüxen, Irene Rüngeler. ICCCN 2012. [Link]

Added Concurrency to Improve MPI Performance on Multicore. Humaira Kamal, Alan Wagner. ICPP 2012. [Link]

Execution mining. Geoffrey Lefebvre, Brendan Cully, Christopher Head, Mark Spear, Norman C. Hutchinson, Mike Feeley, Andrew Warfield. VEE 2012. [Link]

SecondSite - disaster tolerance as a service. Shriram Rajagopalan, Brendan Cully, Ryan O'Connor, Andrew Warfield. VEE 2012. [Link]

DOHA - scalable real-time web applications through adaptive concurrent execution. Aiman Erbad, Norman C. Hutchinson, Charles Krasic. WWW 2012. [Link]

2011

Namespace Management in Virtual Desktops. Dutch T. Meyer, Jake Wires, Norman C. Hutchinson, Andrew Warfield. ;login- 2011. [Link]

Protecting consumer privacy from electric load monitoring. Stephen E. McLaughlin, Patrick D. McDaniel, William Aiello. ACM Conference on Computer and Communications Security 2011. [Link]

Capo - Recapitulating Storage for Virtual Desktops. Mohammad Shamma, Dutch T. Meyer, Jake Wires, Maria Ivanova, Norman C. Hutchinson, Andrew Warfield. FAST 2011. [Link]

Herbert West - Deanonymizer. Mihir Nanavati, Nathan Taylor, William Aiello, Andrew Warfield. HotSec 2011. [Link]

Exposing File System Mappings with MapFS. Jake Wires, Mark Spear, Andrew Warfield. HotStorage 2011. [Link]

RemusDB - Transparent High Availability for Database Systems. Umar Farooq Minhas, Shriram Rajagopalan, Brendan Cully, Ashraf Aboulnaga, Kenneth Salem, Andrew Warfield. PVLDB 2011. [Link]

Breaking up is hard to do - security and functionality in a commodity hypervisor. Patrick Colp, Mihir Nanavati, Jun Zhu, William Aiello, George Coker, Tim Deegan, Peter Loscocco, Andrew Warfield. SOSP 2011. [Link]

A new fast algorithm for connecting the INET simulation framework to applications in real-time. Irene Rüngeler, Michael Tüxen, Brad Penoff, Alan Wagner. SimuTools 2011. [Link]

Retroactive aspects - programming in the past. Robin Salkeld, Wenhao Xu, Brendan Cully, Geoffrey Lefebvre, Andrew Warfield, Gregor Kiczales. WODA 2011. [Link]

2010

Beyond Blocks and Files. Jake Wires, Andrew Warfield. ;login- 2010. [Link]

Scalability of communicators and groups in MPI. Humaira Kamal, Seyed M. Mirtaheri, Alan Wagner. HPDC 2010. [Link]

Fast and Cautious Evolution of Cloud Storage. Dutch T. Meyer, Mohammad Shamma, Jake Wires, Quan Zhang, Norman C. Hutchinson, Andrew Warfield. HotStorage 2010. [Link]

FG-MPI - Fine-grain MPI for multicore and clusters. Humaira Kamal, Alan Wagner. IPDPS Workshops 2010. [Link]

Employing transport layer multi-railing in cluster networks. Brad Penoff, Humaira Kamal, Alan Wagner, Mike Tsai, Karol Mroz, Janardhan R. Iyengar. J. Parallel Distrib. Comput. 2010. [Link]

Systopia lab is supported by a number of government and industrial sources, including Cisco Systems, the Communications Security Establishment Canada, Intel Research, the National Sciences and Engineering Research Council of Canada (NSERC), Network Appliance, Office of the Privacy Commissioner of Canada, and the National Science Foundation (NSF).