The VT CS department’s Systems Reading Group (SRG) reads papers from a variety of systems-related conferences, including SOSP/OSDI, EuroSys, ASPLOS, FAST, CCS, USENIX Security, ICSE, FSE, and further afield. It should be of interest to students studying computer systems from many perspectives.
Each week the SRG discusses 1-3 papers from a top conference, striving to broaden our knowledge of computer science and to improve our own skills in researching, evaluating, and reporting our work.
The SRG also provides a supportive setting in which members can share research ideas or practice giving research talks for upcoming conferences.
Participants enjoy regular interaction with members of other research groups as well as exposure to a breadth of recent research. As a result, their research horizons are broadened and their ongoing research strengthened.
Tasty treats generously funded by stack@cs.
Join the mailing list!
|11/28||11:30 - 12:30||KW2 2225||Security Errors in Practice||Sazzadur Rahaman, Finding Cryptographic API misuse in Java|
|11/14||11:30 - 12:30||KW2 2225||Practice talk for SATE’18||CMSuggester: Method Change Suggestion to Complement Multi-entity Edits, Wang et al.|
|10/31||11:30 - 12:30||KW2 2225||ESEC/FSE practice talk and discussion||The Impact of Regular Expression Denial of Service (REDOS) in Practice: an Empirical Study at the Ecosystem Scale, Davis et al.|
|10/24||11:30 - 12:30||KW2 2225||TBA||TBA|
|10/17||11:30 - 12:30||KW2 2225||- Micro51 practice talk
- OSDI’18 conference report
|- Exploring and Optimizing Chipkill-correct for Persistent Memory Based on High-density NVRAMs
- Bharti and Jingoo will report
|10/10||11:30 - 12:30||KW2 2225||HotNets’17||1. Harvesting Randomness to Optimize Distributed Systems
2. The Barriers to Overthrowing Internet Feudalism
3. Online Advertising under Internet Censorship
4. Wi-Fly: Widespread Opportunistic Connectivity via Commercial Air Transport
5. In-Network Computation is a Dumb Idea Whose Time Has Come
|10/03||11:30 - 12:30||KW2 2225||CCS’18 #1||JN-SAF: Precise and Efficient NDK/JNI-aware Inter-languageStatic Analysis Framework for Security Vetting of AndroidApplications with Native Code|
|09/26||11:30 - 12:30||KW2 2225||ATC’18 #2||Soteria: Automated IoT Safety and Security Analysis, Celik et al.|
|09/19||11:30 - 12:30||KW2 2225||ICSME practice talks||An Empirical Study of Flaky Tests in Android Apps and An Empirical Study of Multi-Entity Changes in Real Bug Fixes|
|09/12||11:30 - 12:30||KW2 2225||ATC’18 #1||Log-free Concurrent Data Structures, David et al.|
|09/05||11:30 - 12:30||KW2 2225||Transducer attacks||Blue Note: How Intentional Acoustic Interference Damages Availability and Integrity in Hard Disk Drives and Operating Systems|
|08/29||11:30 - 12:30||KW2 2225||Welcome back!||Risks of trusting the physics of sensors|
|4/28||3:30-5:00 PM||KW2 1127||Machine Learning in Security||(1) Automatically Evading Classifiers NDSS 2016.
(2) Malicious PDF detection using metadata and structural features ACSAC 2012
|4/21||N/A||N/A||N/A||No meeting this week.|
|4/14||3:30-5:00 PM||KW2 1127||Linux APIs||A study of modern Linux API usage and compatibility: what to support when you’re supporting EuroSys 2016|
|4/7||3:30-5:00 PM||KW2 1127||Cyber-Physical Security||Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses IEEE S&P 2008|
|3/31||3:00-4:30 PM||KW2 2500||Experimental Correctness||Producing wrong data without doing anything obviously wrong! ASPLOS 2009|