Posters
The Poster session will be held in the central room of GYOUN (暁雲) on the 4th floor of Hotel Okura Kyoto.
The room will only open from 15:00, so please give your poster to a staff member during the afternoon coffee break (14:30-15:00). The staff will then put it up during Session 3.
16:15-17:15 Poster session
(1) Performance Evaluation of Confidential Containers in the Edge-Cloud Computing Continuum
Itsuki Nakai (Toyohashi University of Technology); Takaaki Fukai, Takahiro Hirofuchi (National Institute of Advanced Industrial Science and Technology); Yukinori Sato (Toyohashi University of Technology)
[Abstract]
(2) A Static Analysis Approach for Cross Language FiT Bugs Detection
Shengyang Li, Kenta Ishiguro, Kenji Kono (Keio University)
[Abstract]
(3) Protecting Nested VMs with AMD SEV
Kazuki Takiguchi, Kenichi Kourai (Kyushu Institute of Technology)
[Abstract]
(4) Toward Optimizing OS Image Deployment Using SmartNIC
Taiki Miyakawa (Shibaura Institute of Technology); Takaaki Fukai (National Institute of Advanced Industrial Science and Technology); Li Yanzhi (Shibaura Institute of Technology); Takahiro Hirofuchi (National Institute of Advanced Industrial Science and Technology); Midori Sugaya (Shibaura Institute of Technology)
[Abstract]
(5) Hybrid Transactional Index with Scalable Phantom Avoidance
Yutaro Bessho (NTT); Hideyuki Kawashima (Keio University)
[Abstract]
(6) An Open-Source TEE-based Data Clean Room for Secure Trusted Research & AI Collaboration
Vini Jaiswal, Dayeol Lee, Mingshen Sun (TikTok)
[Abstract]
(7) Effective Mitigation for XMRig-based Cryptojacking on Web Servers
Shuhei Enomoto, Hiroki Kuzuno, Yoshiaki Shiraishi, Masakatu Morii (Kobe University)
[Abstract]
(8) Design of Hybrid Storage System for server Consolidation environments (HSSC)
Kazuichi Oe, Kento Aida (National Institute of Informatics)
[Abstract]
(9) Toward A Secure and Highly Available Credit Card Payment Scheme with Trusted Execution Environments
Shintaro Hodai, Takahiro Shinagawa (The University of Tokyo)
[Abstract]
(10) Software-Based RowHammer Mitigation with Randomized Memory Allocation
Kento Murata, Soramichi Akiyama (Ritsumeikan University)
[Abstract]
(11) A lightweight isolated execution environment in SmartNIC
Manami Mori (National Institute of Advanced Industrial Science and Technology, Tokyo Metropolitan University); Takaaki Fukai (National Institute of Advanced Industrial Science and Technology); Ryuichi Sakamoto (Tokyo Institute of Technology); Takahiro Hirofuchi (National Institute of Advanced Industrial Science and Technology); Takuya Asaka (Tokyo Metropolitan University)
[Abstract]
(12) EdgeScaler: Smart (Auto-)Scaling for the 5G Edge
Lauren Trinks, Bilal Saleem, Muhammad Shahbaz (Purdue University)
[Abstract]
(13) “Permission Denied!” Why?
Hiroki Nakajima, Kenta Ishiguro, Kenji Kono (Keio University)
[Abstract]
(14) Towards Cold/Hot Range Partitioning for Compute/Memory Load Balancing in Processing-in-Memory
Takato Hideshima, Tomoharu Ugawa (The University of Tokyo)
[Abstract]
(15) Toward Efficient Fuzzing for Container Escape Vulnerability Detection
Seiga Ueno, Takahiro Shinagawa (The University of Tokyo)
[Abstract]
(16) Design of SR-IOV Driver to Mitigate Performance Degradation for Lightweight Hypervisor
Keisuke Iida (The University of Tokyo); Takaaki Fukai, Takahiro Hirofuchi (National Institute of Advanced Industrial Science and Technology); Takeshi Matsuya (Keio University)
[Abstract]
(17) Serval: A wait-free and NUMA-aware Deterministic Concurrency Control Scheme
Haowen Li, Rina Onishi, Hideyuki Kawashima (Keio University)
[Abstract]
(18) EUKL: A Prototype of a Linux-Based Unikernel for Resource-Constrained Embedded Systems
Yoshifumi Shu, Yutaka Matsubara, Yixiao Li, Hiroaki Takada (Nagoya University)
[Abstract]
(19) Tiered Memory Systems with Virtual Persistent Memory
Dustin Nguyen (Friedrich-Alexander-Universität Erlangen-Nürnberg); Oliver Giersch (Brandenburgische Technische Universität Cottbus-Senftenberg); Wolfgang Schröder-Preikschat (Friedrich-Alexander-Universität Erlangen-Nürnberg); Jörg Nolte (Brandenburgische Technische Universität Cottbus-Senftenberg)
[Abstract]
(20) Toward LLM-based Large-scale C-to-Rust Code Translation
Momoko Shiraishi, Takahiro Shinagawa (The University of Tokyo)
[Abstract]
(21) A Checkpoint/Restore Mechanism with Interoperability Among Distinctive WebAssembly Interpreters
Daigo Fujii, Katsuya Matsubara (Future University Hakodate); Yuki Nakata (SAKURA internet Inc.)
[Abstract]
(22) Toward NUMA-aware Multi-VM Cooperative Resource Scheduling
Sungying Chiang, Ryo Hayashi (The University of Tokyo); Masanori Misono (Technical University of Munich); Takahiro Shinagawa (The University of Tokyo)
[Abstract]
(23) Secure and Efficient Monitoring of Confidential VMs using eBPF
Kanta Uesugi, Kenichi Kourai (Kyushu Institute of Technology)
[Abstract]
(24) Collaborative Learning Experimentation Testbed
Janez Bozic (University of Ljubljana); Amandio Faustino (KAUST); Boris Radovic (KAUST / University of Ljubljana); Marco Canini (KAUST); Veljko Pejovic (University of Ljubljana)
[Abstract]
(25) Extension of Malware Dynamic Analysis System Alkanet for Windows Pico Process
Takatsugu Nakayama (Ritsumeikan University); Shoichi Saito (Nagoya Institute of Technology); Koichi Mouri (Ritsumeikan University)
[Abstract]
(26) Low Latency Kernel Monitoring with XDP in Large Distributed Environment
Yuki Maruyama, Tomohiro Kano, Kenta Ishiguro, Kenji Kono (Keio University)
[Abstract]
(27) Reducing Useless Agent Actions in RL-based Cache Structure Vulnerability Exploration
Kanato Nakanishi, Soramichi Akiyama (Ritsumeikan University)
[Abstract]
(28) Homare: Platform for Aggregating Embedded Systems on Multi-core Processor
Kanta Okugawa, Koichi Mouri (Ritsumeikan University)
[Abstract]
(29) Accelerating Transformer on GPUs with Sparse Ternary Weight Matrix
Yushi Ogiwara, Hideyuki Kawashima (Keio University)
[Abstract]