Posters

The Poster session will be held in the central room of GYOUN (暁雲) on the 4th floor of Hotel Okura Kyoto.

The room will only open from 15:00, so please give your poster to a staff member during the afternoon coffee break (14:30-15:00). The staff will then put it up during Session 3.

16:15-17:15 Poster session

(1) Performance Evaluation of Confidential Containers in the Edge-Cloud Computing Continuum

Itsuki Nakai (Toyohashi University of Technology); Takaaki Fukai, Takahiro Hirofuchi (National Institute of Advanced Industrial Science and Technology); Yukinori Sato (Toyohashi University of Technology)
[Abstract]

(2) A Static Analysis Approach for Cross Language FiT Bugs Detection

Shengyang Li, Kenta Ishiguro, Kenji Kono (Keio University)
[Abstract]

(3) Protecting Nested VMs with AMD SEV

Kazuki Takiguchi, Kenichi Kourai (Kyushu Institute of Technology)
[Abstract]

(4) Toward Optimizing OS Image Deployment Using SmartNIC

Taiki Miyakawa (Shibaura Institute of Technology); Takaaki Fukai (National Institute of Advanced Industrial Science and Technology); Li Yanzhi (Shibaura Institute of Technology); Takahiro Hirofuchi (National Institute of Advanced Industrial Science and Technology); Midori Sugaya (Shibaura Institute of Technology)
[Abstract]

(5) Hybrid Transactional Index with Scalable Phantom Avoidance

Yutaro Bessho (NTT); Hideyuki Kawashima (Keio University)
[Abstract]

(6) An Open-Source TEE-based Data Clean Room for Secure Trusted Research & AI Collaboration

Vini Jaiswal, Dayeol Lee, Mingshen Sun (TikTok)
[Abstract]

(7) Effective Mitigation for XMRig-based Cryptojacking on Web Servers

Shuhei Enomoto, Hiroki Kuzuno, Yoshiaki Shiraishi, Masakatu Morii (Kobe University)
[Abstract]

(8) Design of Hybrid Storage System for server Consolidation environments (HSSC)

Kazuichi Oe, Kento Aida (National Institute of Informatics)
[Abstract]

(9) Toward A Secure and Highly Available Credit Card Payment Scheme with Trusted Execution Environments

Shintaro Hodai, Takahiro Shinagawa (The University of Tokyo)
[Abstract]

(10) Software-Based RowHammer Mitigation with Randomized Memory Allocation

Kento Murata, Soramichi Akiyama (Ritsumeikan University)
[Abstract]

(11) A lightweight isolated execution environment in SmartNIC

Manami Mori (National Institute of Advanced Industrial Science and Technology, Tokyo Metropolitan University); Takaaki Fukai (National Institute of Advanced Industrial Science and Technology); Ryuichi Sakamoto (Tokyo Institute of Technology); Takahiro Hirofuchi (National Institute of Advanced Industrial Science and Technology); Takuya Asaka (Tokyo Metropolitan University)
[Abstract]

(12) EdgeScaler: Smart (Auto-)Scaling for the 5G Edge

Lauren Trinks, Bilal Saleem, Muhammad Shahbaz (Purdue University)
[Abstract]

(13) “Permission Denied!” Why?

Hiroki Nakajima, Kenta Ishiguro, Kenji Kono (Keio University)
[Abstract]

(14) Towards Cold/Hot Range Partitioning for Compute/Memory Load Balancing in Processing-in-Memory

Takato Hideshima, Tomoharu Ugawa (The University of Tokyo)
[Abstract]

(15) Toward Efficient Fuzzing for Container Escape Vulnerability Detection

Seiga Ueno, Takahiro Shinagawa (The University of Tokyo)
[Abstract]

(16) Design of SR-IOV Driver to Mitigate Performance Degradation for Lightweight Hypervisor

Keisuke Iida (The University of Tokyo); Takaaki Fukai, Takahiro Hirofuchi (National Institute of Advanced Industrial Science and Technology); Takeshi Matsuya (Keio University)
[Abstract]

(17) Serval: A wait-free and NUMA-aware Deterministic Concurrency Control Scheme

Haowen Li, Rina Onishi, Hideyuki Kawashima (Keio University)
[Abstract]

(18) EUKL: A Prototype of a Linux-Based Unikernel for Resource-Constrained Embedded Systems

Yoshifumi Shu, Yutaka Matsubara, Yixiao Li, Hiroaki Takada (Nagoya University)
[Abstract]

(19) Tiered Memory Systems with Virtual Persistent Memory

Dustin Nguyen (Friedrich-Alexander-Universität Erlangen-Nürnberg); Oliver Giersch (Brandenburgische Technische Universität Cottbus-Senftenberg); Wolfgang Schröder-Preikschat (Friedrich-Alexander-Universität Erlangen-Nürnberg); Jörg Nolte (Brandenburgische Technische Universität Cottbus-Senftenberg)
[Abstract]

(20) Toward LLM-based Large-scale C-to-Rust Code Translation

Momoko Shiraishi, Takahiro Shinagawa (The University of Tokyo)
[Abstract]

(21) A Checkpoint/Restore Mechanism with Interoperability Among Distinctive WebAssembly Interpreters

Daigo Fujii, Katsuya Matsubara (Future University Hakodate); Yuki Nakata (SAKURA internet Inc.)
[Abstract]

(22) Toward NUMA-aware Multi-VM Cooperative Resource Scheduling

Sungying Chiang, Ryo Hayashi (The University of Tokyo); Masanori Misono (Technical University of Munich); Takahiro Shinagawa (The University of Tokyo)
[Abstract]

(23) Secure and Efficient Monitoring of Confidential VMs using eBPF

Kanta Uesugi, Kenichi Kourai (Kyushu Institute of Technology)
[Abstract]

(24) Collaborative Learning Experimentation Testbed

Janez Bozic (University of Ljubljana); Amandio Faustino (KAUST); Boris Radovic (KAUST / University of Ljubljana); Marco Canini (KAUST); Veljko Pejovic (University of Ljubljana)
[Abstract]

(25) Extension of Malware Dynamic Analysis System Alkanet for Windows Pico Process

Takatsugu Nakayama (Ritsumeikan University); Shoichi Saito (Nagoya Institute of Technology); Koichi Mouri (Ritsumeikan University)
[Abstract]

(26) Low Latency Kernel Monitoring with XDP in Large Distributed Environment

Yuki Maruyama, Tomohiro Kano, Kenta Ishiguro, Kenji Kono (Keio University)
[Abstract]

(27) Reducing Useless Agent Actions in RL-based Cache Structure Vulnerability Exploration

Kanato Nakanishi, Soramichi Akiyama (Ritsumeikan University)
[Abstract]

(28) Homare: Platform for Aggregating Embedded Systems on Multi-core Processor

Kanta Okugawa, Koichi Mouri (Ritsumeikan University)
[Abstract]

(29) Accelerating Transformer on GPUs with Sparse Ternary Weight Matrix

Yushi Ogiwara, Hideyuki Kawashima (Keio University)
[Abstract]