CS 4960: Papers List


Rakesh Agrawal, Tomasz Imielinski, and Arun Swami. 1993. Mining association rules between sets of items in large databases. In Proceedings of the 1993 ACM SIGMOD international conference on Management of data (SIGMOD '93). Association for Computing Machinery, New York, NY, USA, 207-216. https://doi.org/10.1145/170035.170072

Manos Antonakakis, Tim April, Michael Bailey, Matt Bernhard, Elie Bursztein, Jaime Cochran, Zakir Durumeric, J Alex Halderman, Luca Invernizzi, Michalis Kallitsis, et al. 2017. Understanding the Mirai Botnet. 26th USENIX Security Symposium (USENIX Security 17). 1093--1110. Also available here.

Scott Atchley, Christopher Zimmer, John Lange, David Bernholdt, Veronica Melesse Vergara, Thomas Beck, Michael Brim, Reuben Budiardja, Sunita Chandrasekaran, Markus Eisenbach, Thomas Evans, Matthew Ezell, Nicholas Frontiere, Antigoni Georgiadou, Joe Glenski, Philipp Grete, Steven Hamilton, John Holmen, Axel Huebl, Daniel Jacobson, Wayne Joubert, Kim Mcmahon, Elia Merzari, Stan Moore, Andrew Myers, Stephen Nichols, Sarp Oral, Thomas Papatheodore, Danny Perez, David M. Rogers, Evan Schneider, Jean-Luc Vay, and P. K. Yeung. 2023. Frontier: Exploring Exascale. In Proceedings of the International Conference for High Performance Computing, Networking, Storage and Analysis (SC '23). Association for Computing Machinery, New York, NY, USA, Article 52, 1-16. https://doi.org/10.1145/3581784.3607089

Fay Chang, Jeffrey Dean, Sanjay Ghemawat, Wilson C. Hsieh, Deborah A. Wallach, Mike Burrows, Tushar Deepak Chandra, Andrew Fikes and Robert E. Gruber. 2006. Bigtable: A Distributed Storage System for Structured Data. 7th USENIX Symposium on Operating Systems Design and Implementation (OSDI), pp. 205-218.

Crispan Cowan, Calton Pu, Dave Maier, Jonathan Walpole, Peat Bakke, Steve Beattie, Aaron Grier, Perry Wagle, Qian Zhang, Heather Hinton. 1998. StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks. 7th USENIX Security Symposium (USENIX Security 98). January 26-29, 1998. San Antonio, Texas, USA. Also available here.

Jeffrey Dean and Sanjay Ghemawat. 2008. MapReduce: simplified data processing on large clusters. Communications of the ACM 51, 1 (January 2008), 107-113. https://doi.org/10.1145/1327452.1327492

Kimberly Keeton, Cipriano Santos, Dirk Beyer, Jeffrey Chase, and John Wilkes. March 2004. Designing for Disasters. FAST '04: Proceedings of the Third USENIX Conference on File and Storage Technologies. March 31-April 2, 2004. San Francisco, CA. (Winner of Test of Time Award given at FAST '18.) Also available here.

Moritz Lipp and Michael Schwarz and Daniel Gruss and Thomas Prescher and Werner Haas and Anders Fogh and Jann Horn and Stefan Mangard and Paul Kocher and Daniel Genkin and Yuval Yarom and Mike Hamburg. Meltdown: Reading Kernel Memory from User Space. 2018. 27th USENIX Security Symposium (USENIX Security 18). Aug 2018. Baltimore, MD. Also available here.

Changwoo Min, Kangnyeon Kim, Hyunjin Cho, Sang-Won Lee, and Young Ik Eom. 2012. SFS: Random Write Considered Harmful in Solid State Drives. FAST '12: Proceedings of the Third USENIX Conference on File and Storage Technologies. February 2012. San Jose, CA. (Winner of Test of Time Award given at FAST '24.) Also available here.

Vern Paxson. 1998. Bro: A System for Detecting Network Intruders in Real-Time. 7th USENIX Security Symposium (USENIX Security 98). January 26-29, 1998. San Antonio, Texas, USA. Also available here.

Adrienne Porter Felt, Erika Chin, Steve Hanna, Dawn Song, and David Wagner. 2011. Android permissions demystified. In Proceedings of the 18th ACM conference on Computer and communications security (CCS '11). Association for Computing Machinery, New York, NY, USA, 627-638.

Franziska Roesner, Tadayoshi Kohno, and David Wetherall. 2012. Detecting and Defending Against Third-Party Tracking on the Web. NSDI '12: 9th USENIX Symposium on Networked Systems Design and Implementation. April 25-27, 2012. San Jose, CA. (Winner of Test of Time Award given at NSDI '23.) Also available here.

Mitsuhisa Sato, Yuetsu Kodama, Miwako Tsuji, and Tesuya Odajima. 2022. Co-Design and System for the Supercomputer “Fugaku” IEEE Micro 42, 2 (March-April 2022), 26-34. https://doi.org/10.1109/MM.2021.3136882

Ruonan Wang, Rodrigo Tobar, Markus Dolensky, Tao An, Andreas Wicenec, Chen Wu, Fred Dulwich, Norbert Podhorszki, Valentine Anantharaj, Eric Suchyta, Baoqiang Lao, and Scott Klasky. 2020. Processing full-scale square kilometre array data on the Summit supercomputer. In Proceedings of the International Conference for High Performance Computing, Networking, Storage and Analysis (SC '20). IEEE Press, Article 2, 1 - 12.

Mingshi Wu, GFW Report; Jackson Sippe, University of Colorado Boulder; Danesh Sivakumar and Jack Burg, University of Maryland; Peter Anderson, Independent researcher; Xiaokang Wang, V2Ray Project; Kevin Bock, University of Maryland; Amir Houmansadr, University of Massachusetts Amherst; Dave Levin, University of Maryland; Eric Wustrow. 2023. How the Great Firewall of China Detects and Blocks Fully Encrypted Traffic. 32nd Usenix Security Symposium. August 9-11, 2012. Anaheim, CA. Also available here.





CS 4960: Data Structures List