This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision Next revision Both sides next revision | ||
readings [2014/11/14 04:12] yixinluo |
readings [2014/11/14 04:16] yixinluo |
||
---|---|---|---|
Line 6: | Line 6: | ||
==== Reading List (in reverse order) ==== | ==== Reading List (in reverse order) ==== | ||
+ | === 11/18/2014 === | ||
+ | Review required for the following paper, due on Tuesday, Nov 18. | ||
+ | * **Justin Meza et al., "Memory Errors at Scale: What the Trends Across a Billion-User Web Services Company Foretell", under submission. (Please do not distribute)** | ||
+ | |||
=== 11/13/2014 === | === 11/13/2014 === | ||
Reviews required for both papers, due on Wednesday, Nov 12. | Reviews required for both papers, due on Wednesday, Nov 12. | ||
Line 15: | Line 19: | ||
* **[[https://www.cs.princeton.edu/~appel/papers/memerr.pdf|Sudhakar Govindavajhala, Andrew W. Appel, "Using Memory Errors to Attack a Virtual Machine", SP 2003.]]** | * **[[https://www.cs.princeton.edu/~appel/papers/memerr.pdf|Sudhakar Govindavajhala, Andrew W. Appel, "Using Memory Errors to Attack a Virtual Machine", SP 2003.]]** | ||
* [[https://www.usenix.org/legacy/event/sec08/tech/full_papers/halderman/halderman.pdf|J. Alex Halderman et al., "Lest We Remember: Cold Boot Attacks on Encryption Keys", USENIX Security Symposium 2008.]] | * [[https://www.usenix.org/legacy/event/sec08/tech/full_papers/halderman/halderman.pdf|J. Alex Halderman et al., "Lest We Remember: Cold Boot Attacks on Encryption Keys", USENIX Security Symposium 2008.]] | ||
+ | |||
=== 11/12/2014 === | === 11/12/2014 === | ||
Reviews required for both papers, due on Tuesday, Nov 11. | Reviews required for both papers, due on Tuesday, Nov 11. |