Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for +publisher:"Georgia Tech" +contributor:("Kim, Taesoo"). Showing records 1 – 22 of 22 total matches.

Search Limiters

Last 2 Years | English Only

No search limiters apply to these results.

▼ Search Limiters


Georgia Tech

1. Alzahrani, Ibtehaj M. Identifying and clustering attack-driven crash reports using machine learning.

Degree: MS, Computer Science, 2019, Georgia Tech

 We propose a tool to identify crashes caused by filed exploits from benign crashes, and cluster them based on the exploited vulnerabilities to prioritize crashes… (more)

Subjects/Keywords: Attack-driven crash reports

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Alzahrani, I. M. (2019). Identifying and clustering attack-driven crash reports using machine learning. (Masters Thesis). Georgia Tech. Retrieved from http://hdl.handle.net/1853/62701

Chicago Manual of Style (16th Edition):

Alzahrani, Ibtehaj M. “Identifying and clustering attack-driven crash reports using machine learning.” 2019. Masters Thesis, Georgia Tech. Accessed March 04, 2021. http://hdl.handle.net/1853/62701.

MLA Handbook (7th Edition):

Alzahrani, Ibtehaj M. “Identifying and clustering attack-driven crash reports using machine learning.” 2019. Web. 04 Mar 2021.

Vancouver:

Alzahrani IM. Identifying and clustering attack-driven crash reports using machine learning. [Internet] [Masters thesis]. Georgia Tech; 2019. [cited 2021 Mar 04]. Available from: http://hdl.handle.net/1853/62701.

Council of Science Editors:

Alzahrani IM. Identifying and clustering attack-driven crash reports using machine learning. [Masters Thesis]. Georgia Tech; 2019. Available from: http://hdl.handle.net/1853/62701


Georgia Tech

2. Hesse, Michael Winfried. Extending the lifecycle of IoT devices using selective deactivation.

Degree: MS, Computer Science, 2020, Georgia Tech

 IoT devices are known for long-lived hardware and short-lived software support by the vendor, which sets the wrong security incentives for users of expensive IoT… (more)

Subjects/Keywords: IoT; Security; HAL; TCB

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hesse, M. W. (2020). Extending the lifecycle of IoT devices using selective deactivation. (Masters Thesis). Georgia Tech. Retrieved from http://hdl.handle.net/1853/63605

Chicago Manual of Style (16th Edition):

Hesse, Michael Winfried. “Extending the lifecycle of IoT devices using selective deactivation.” 2020. Masters Thesis, Georgia Tech. Accessed March 04, 2021. http://hdl.handle.net/1853/63605.

MLA Handbook (7th Edition):

Hesse, Michael Winfried. “Extending the lifecycle of IoT devices using selective deactivation.” 2020. Web. 04 Mar 2021.

Vancouver:

Hesse MW. Extending the lifecycle of IoT devices using selective deactivation. [Internet] [Masters thesis]. Georgia Tech; 2020. [cited 2021 Mar 04]. Available from: http://hdl.handle.net/1853/63605.

Council of Science Editors:

Hesse MW. Extending the lifecycle of IoT devices using selective deactivation. [Masters Thesis]. Georgia Tech; 2020. Available from: http://hdl.handle.net/1853/63605


Georgia Tech

3. Bobek, Jan. Hidden fallacies in formally verified systems.

Degree: MS, Computer Science, 2020, Georgia Tech

 Formal verification or formal methods represent a rising trend in approaches to correct software construction, i.e. they help us answer the question of how to… (more)

Subjects/Keywords: Formal verification; Fuzzing; File systems

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bobek, J. (2020). Hidden fallacies in formally verified systems. (Masters Thesis). Georgia Tech. Retrieved from http://hdl.handle.net/1853/62855

Chicago Manual of Style (16th Edition):

Bobek, Jan. “Hidden fallacies in formally verified systems.” 2020. Masters Thesis, Georgia Tech. Accessed March 04, 2021. http://hdl.handle.net/1853/62855.

MLA Handbook (7th Edition):

Bobek, Jan. “Hidden fallacies in formally verified systems.” 2020. Web. 04 Mar 2021.

Vancouver:

Bobek J. Hidden fallacies in formally verified systems. [Internet] [Masters thesis]. Georgia Tech; 2020. [cited 2021 Mar 04]. Available from: http://hdl.handle.net/1853/62855.

Council of Science Editors:

Bobek J. Hidden fallacies in formally verified systems. [Masters Thesis]. Georgia Tech; 2020. Available from: http://hdl.handle.net/1853/62855


Georgia Tech

4. Flansburg, Kevin. A framework for automated management of exploit testing environments.

Degree: MS, Computational Science and Engineering, 2015, Georgia Tech

 To demonstrate working exploits or vulnerabilities, people often share their findings as a form of proof-of-concept (PoC) prototype. Such practices are particularly useful to learn… (more)

Subjects/Keywords: Software testing; Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Flansburg, K. (2015). A framework for automated management of exploit testing environments. (Masters Thesis). Georgia Tech. Retrieved from http://hdl.handle.net/1853/54912

Chicago Manual of Style (16th Edition):

Flansburg, Kevin. “A framework for automated management of exploit testing environments.” 2015. Masters Thesis, Georgia Tech. Accessed March 04, 2021. http://hdl.handle.net/1853/54912.

MLA Handbook (7th Edition):

Flansburg, Kevin. “A framework for automated management of exploit testing environments.” 2015. Web. 04 Mar 2021.

Vancouver:

Flansburg K. A framework for automated management of exploit testing environments. [Internet] [Masters thesis]. Georgia Tech; 2015. [cited 2021 Mar 04]. Available from: http://hdl.handle.net/1853/54912.

Council of Science Editors:

Flansburg K. A framework for automated management of exploit testing environments. [Masters Thesis]. Georgia Tech; 2015. Available from: http://hdl.handle.net/1853/54912


Georgia Tech

5. Lee, Byoungyoung. Protecting computer systems through eliminating or analyzing vulnerabilities.

Degree: PhD, Computer Science, 2016, Georgia Tech

 There have been tremendous efforts to build fully secure computer systems, but it is not an easy goal. Making a simple mistake introduces a vulnerability,… (more)

Subjects/Keywords: Security; Vulnerability; Use after free; Bad casting; Timing channel

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lee, B. (2016). Protecting computer systems through eliminating or analyzing vulnerabilities. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/58603

Chicago Manual of Style (16th Edition):

Lee, Byoungyoung. “Protecting computer systems through eliminating or analyzing vulnerabilities.” 2016. Doctoral Dissertation, Georgia Tech. Accessed March 04, 2021. http://hdl.handle.net/1853/58603.

MLA Handbook (7th Edition):

Lee, Byoungyoung. “Protecting computer systems through eliminating or analyzing vulnerabilities.” 2016. Web. 04 Mar 2021.

Vancouver:

Lee B. Protecting computer systems through eliminating or analyzing vulnerabilities. [Internet] [Doctoral dissertation]. Georgia Tech; 2016. [cited 2021 Mar 04]. Available from: http://hdl.handle.net/1853/58603.

Council of Science Editors:

Lee B. Protecting computer systems through eliminating or analyzing vulnerabilities. [Doctoral Dissertation]. Georgia Tech; 2016. Available from: http://hdl.handle.net/1853/58603


Georgia Tech

6. Maass, Steffen Alexander. Systems abstractions for big data processing on a single machine.

Degree: PhD, Computer Science, 2019, Georgia Tech

 Large-scale internet services, such as Facebook or Google, are using clusters of many servers for problems such as search, machine learning, and social networks. However,… (more)

Subjects/Keywords: Runtime system; Big data; Graph analytics; Performance optimization; Incremental processing; Heterogeneous computing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Maass, S. A. (2019). Systems abstractions for big data processing on a single machine. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/61679

Chicago Manual of Style (16th Edition):

Maass, Steffen Alexander. “Systems abstractions for big data processing on a single machine.” 2019. Doctoral Dissertation, Georgia Tech. Accessed March 04, 2021. http://hdl.handle.net/1853/61679.

MLA Handbook (7th Edition):

Maass, Steffen Alexander. “Systems abstractions for big data processing on a single machine.” 2019. Web. 04 Mar 2021.

Vancouver:

Maass SA. Systems abstractions for big data processing on a single machine. [Internet] [Doctoral dissertation]. Georgia Tech; 2019. [cited 2021 Mar 04]. Available from: http://hdl.handle.net/1853/61679.

Council of Science Editors:

Maass SA. Systems abstractions for big data processing on a single machine. [Doctoral Dissertation]. Georgia Tech; 2019. Available from: http://hdl.handle.net/1853/61679


Georgia Tech

7. Shih, Mingwei. Securing Intel SGX against side-channel attacks via load-time synthesis.

Degree: PhD, Computer Science, 2019, Georgia Tech

 In response to the growing need for securing user data in the cloud, recent Intel processors have supported a new feature, Intel Software Guard Extensions… (more)

Subjects/Keywords: Intel SGX; Side-channel attacks

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Shih, M. (2019). Securing Intel SGX against side-channel attacks via load-time synthesis. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/62337

Chicago Manual of Style (16th Edition):

Shih, Mingwei. “Securing Intel SGX against side-channel attacks via load-time synthesis.” 2019. Doctoral Dissertation, Georgia Tech. Accessed March 04, 2021. http://hdl.handle.net/1853/62337.

MLA Handbook (7th Edition):

Shih, Mingwei. “Securing Intel SGX against side-channel attacks via load-time synthesis.” 2019. Web. 04 Mar 2021.

Vancouver:

Shih M. Securing Intel SGX against side-channel attacks via load-time synthesis. [Internet] [Doctoral dissertation]. Georgia Tech; 2019. [cited 2021 Mar 04]. Available from: http://hdl.handle.net/1853/62337.

Council of Science Editors:

Shih M. Securing Intel SGX against side-channel attacks via load-time synthesis. [Doctoral Dissertation]. Georgia Tech; 2019. Available from: http://hdl.handle.net/1853/62337


Georgia Tech

8. Song, Chengyu. Preventing exploits against memory corruption vulnerabilities.

Degree: PhD, Computer Science, 2016, Georgia Tech

 The most common cyber-attack vector is exploit of software vulnerability. Despite much efforts toward building secure software, software systems of even modest complexity still routinely… (more)

Subjects/Keywords: Memory corruption; Exploit prevention; Code injection; Privilege escalation; Data-flow integrity

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Song, C. (2016). Preventing exploits against memory corruption vulnerabilities. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/55651

Chicago Manual of Style (16th Edition):

Song, Chengyu. “Preventing exploits against memory corruption vulnerabilities.” 2016. Doctoral Dissertation, Georgia Tech. Accessed March 04, 2021. http://hdl.handle.net/1853/55651.

MLA Handbook (7th Edition):

Song, Chengyu. “Preventing exploits against memory corruption vulnerabilities.” 2016. Web. 04 Mar 2021.

Vancouver:

Song C. Preventing exploits against memory corruption vulnerabilities. [Internet] [Doctoral dissertation]. Georgia Tech; 2016. [cited 2021 Mar 04]. Available from: http://hdl.handle.net/1853/55651.

Council of Science Editors:

Song C. Preventing exploits against memory corruption vulnerabilities. [Doctoral Dissertation]. Georgia Tech; 2016. Available from: http://hdl.handle.net/1853/55651


Georgia Tech

9. Xu, Meng. Finding race conditions in kernels: The symbolic way and the fuzzy way.

Degree: PhD, Computer Science, 2020, Georgia Tech

 The scale and pervasiveness of concurrent software pose challenges for security researchers: race conditions are more prevalent than ever, and the growing software complexity keeps… (more)

Subjects/Keywords: Race condition; Fuzz testing; Symbolic execution; Bug finding; OS kernel

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Xu, M. (2020). Finding race conditions in kernels: The symbolic way and the fuzzy way. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/63668

Chicago Manual of Style (16th Edition):

Xu, Meng. “Finding race conditions in kernels: The symbolic way and the fuzzy way.” 2020. Doctoral Dissertation, Georgia Tech. Accessed March 04, 2021. http://hdl.handle.net/1853/63668.

MLA Handbook (7th Edition):

Xu, Meng. “Finding race conditions in kernels: The symbolic way and the fuzzy way.” 2020. Web. 04 Mar 2021.

Vancouver:

Xu M. Finding race conditions in kernels: The symbolic way and the fuzzy way. [Internet] [Doctoral dissertation]. Georgia Tech; 2020. [cited 2021 Mar 04]. Available from: http://hdl.handle.net/1853/63668.

Council of Science Editors:

Xu M. Finding race conditions in kernels: The symbolic way and the fuzzy way. [Doctoral Dissertation]. Georgia Tech; 2020. Available from: http://hdl.handle.net/1853/63668


Georgia Tech

10. Kashyap, Sanidhya. Scaling synchronization primitives.

Degree: PhD, Computer Science, 2020, Georgia Tech

 Over the past decade, multicore machines have become the norm. A single machine is capable of having thousands of hardware threads or cores. Even cloud… (more)

Subjects/Keywords: OS; Concurrency; Mutual exclusion; File system; Scalability; Timestamping; Database

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kashyap, S. (2020). Scaling synchronization primitives. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/63677

Chicago Manual of Style (16th Edition):

Kashyap, Sanidhya. “Scaling synchronization primitives.” 2020. Doctoral Dissertation, Georgia Tech. Accessed March 04, 2021. http://hdl.handle.net/1853/63677.

MLA Handbook (7th Edition):

Kashyap, Sanidhya. “Scaling synchronization primitives.” 2020. Web. 04 Mar 2021.

Vancouver:

Kashyap S. Scaling synchronization primitives. [Internet] [Doctoral dissertation]. Georgia Tech; 2020. [cited 2021 Mar 04]. Available from: http://hdl.handle.net/1853/63677.

Council of Science Editors:

Kashyap S. Scaling synchronization primitives. [Doctoral Dissertation]. Georgia Tech; 2020. Available from: http://hdl.handle.net/1853/63677


Georgia Tech

11. Yun, Insu. Concolic Execution Tailored for Hybrid Fuzzing.

Degree: PhD, Computer Science, 2020, Georgia Tech

 Recently, hybrid fuzzing, which combines fuzzing and concolic execution, has been highlighted to overcome limitations of both techniques. Despite its success in contrived programs such… (more)

Subjects/Keywords: Hybrid fuzzing; Concolic execution; Fuzzing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yun, I. (2020). Concolic Execution Tailored for Hybrid Fuzzing. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/64153

Chicago Manual of Style (16th Edition):

Yun, Insu. “Concolic Execution Tailored for Hybrid Fuzzing.” 2020. Doctoral Dissertation, Georgia Tech. Accessed March 04, 2021. http://hdl.handle.net/1853/64153.

MLA Handbook (7th Edition):

Yun, Insu. “Concolic Execution Tailored for Hybrid Fuzzing.” 2020. Web. 04 Mar 2021.

Vancouver:

Yun I. Concolic Execution Tailored for Hybrid Fuzzing. [Internet] [Doctoral dissertation]. Georgia Tech; 2020. [cited 2021 Mar 04]. Available from: http://hdl.handle.net/1853/64153.

Council of Science Editors:

Yun I. Concolic Execution Tailored for Hybrid Fuzzing. [Doctoral Dissertation]. Georgia Tech; 2020. Available from: http://hdl.handle.net/1853/64153

12. Forster, Jeffrey Edward. Using Intel® SGX technologies to secure large scale systems in public cloud environments.

Degree: MS, Computer Science, 2018, Georgia Tech

 Intel SGX enables securing applications at the hardware level, which makes it a very useful tool for running applications on untrusted hosts. Security based on… (more)

Subjects/Keywords: Intel; SGX; Enclave; Security; SQL; MySQL

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Forster, J. E. (2018). Using Intel® SGX technologies to secure large scale systems in public cloud environments. (Masters Thesis). Georgia Tech. Retrieved from http://hdl.handle.net/1853/59840

Chicago Manual of Style (16th Edition):

Forster, Jeffrey Edward. “Using Intel® SGX technologies to secure large scale systems in public cloud environments.” 2018. Masters Thesis, Georgia Tech. Accessed March 04, 2021. http://hdl.handle.net/1853/59840.

MLA Handbook (7th Edition):

Forster, Jeffrey Edward. “Using Intel® SGX technologies to secure large scale systems in public cloud environments.” 2018. Web. 04 Mar 2021.

Vancouver:

Forster JE. Using Intel® SGX technologies to secure large scale systems in public cloud environments. [Internet] [Masters thesis]. Georgia Tech; 2018. [cited 2021 Mar 04]. Available from: http://hdl.handle.net/1853/59840.

Council of Science Editors:

Forster JE. Using Intel® SGX technologies to secure large scale systems in public cloud environments. [Masters Thesis]. Georgia Tech; 2018. Available from: http://hdl.handle.net/1853/59840


Georgia Tech

13. Huang, Jian. Exploiting intrinsic flash properties to enhance modern storage systems.

Degree: PhD, Computer Science, 2017, Georgia Tech

 The longstanding goals of storage system design have been to provide simple abstractions for applications to efficiently access data while ensuring the data durability and… (more)

Subjects/Keywords: Flash memory; Storage systems; Cloud storage; Wearable storage; Performance isolation; System security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Huang, J. (2017). Exploiting intrinsic flash properties to enhance modern storage systems. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/60162

Chicago Manual of Style (16th Edition):

Huang, Jian. “Exploiting intrinsic flash properties to enhance modern storage systems.” 2017. Doctoral Dissertation, Georgia Tech. Accessed March 04, 2021. http://hdl.handle.net/1853/60162.

MLA Handbook (7th Edition):

Huang, Jian. “Exploiting intrinsic flash properties to enhance modern storage systems.” 2017. Web. 04 Mar 2021.

Vancouver:

Huang J. Exploiting intrinsic flash properties to enhance modern storage systems. [Internet] [Doctoral dissertation]. Georgia Tech; 2017. [cited 2021 Mar 04]. Available from: http://hdl.handle.net/1853/60162.

Council of Science Editors:

Huang J. Exploiting intrinsic flash properties to enhance modern storage systems. [Doctoral Dissertation]. Georgia Tech; 2017. Available from: http://hdl.handle.net/1853/60162


Georgia Tech

14. Bhardwaj, Ketan. Frame, rods and beads of the edge computing abacus.

Degree: PhD, Computer Science, 2016, Georgia Tech

 Emerging applications enabled by powerful end-user devices and 5G technologies, pose demands for reduced access latencies to web services and dramatic increase in the back-haul… (more)

Subjects/Keywords: Edge computing; Edge functions; Secure edge functions; Secure protocol extensions; Android app streaming; Ephemeral apps; App slices

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bhardwaj, K. (2016). Frame, rods and beads of the edge computing abacus. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/56332

Chicago Manual of Style (16th Edition):

Bhardwaj, Ketan. “Frame, rods and beads of the edge computing abacus.” 2016. Doctoral Dissertation, Georgia Tech. Accessed March 04, 2021. http://hdl.handle.net/1853/56332.

MLA Handbook (7th Edition):

Bhardwaj, Ketan. “Frame, rods and beads of the edge computing abacus.” 2016. Web. 04 Mar 2021.

Vancouver:

Bhardwaj K. Frame, rods and beads of the edge computing abacus. [Internet] [Doctoral dissertation]. Georgia Tech; 2016. [cited 2021 Mar 04]. Available from: http://hdl.handle.net/1853/56332.

Council of Science Editors:

Bhardwaj K. Frame, rods and beads of the edge computing abacus. [Doctoral Dissertation]. Georgia Tech; 2016. Available from: http://hdl.handle.net/1853/56332

15. Jin, Wei. Automated support for reproducing and debugging field failures.

Degree: PhD, Computer Science, 2015, Georgia Tech

 As confirmed by a recent survey conducted among developers of the Apache, Eclipse, and Mozilla projects, two extremely challenging tasks during maintenance are reproducing and… (more)

Subjects/Keywords: Debugging; Fault localization; Field failures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jin, W. (2015). Automated support for reproducing and debugging field failures. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/53894

Chicago Manual of Style (16th Edition):

Jin, Wei. “Automated support for reproducing and debugging field failures.” 2015. Doctoral Dissertation, Georgia Tech. Accessed March 04, 2021. http://hdl.handle.net/1853/53894.

MLA Handbook (7th Edition):

Jin, Wei. “Automated support for reproducing and debugging field failures.” 2015. Web. 04 Mar 2021.

Vancouver:

Jin W. Automated support for reproducing and debugging field failures. [Internet] [Doctoral dissertation]. Georgia Tech; 2015. [cited 2021 Mar 04]. Available from: http://hdl.handle.net/1853/53894.

Council of Science Editors:

Jin W. Automated support for reproducing and debugging field failures. [Doctoral Dissertation]. Georgia Tech; 2015. Available from: http://hdl.handle.net/1853/53894

16. Narain, Abhinav. Near field deniable communication.

Degree: PhD, Computer Science, 2017, Georgia Tech

 There is an increasing interest of companies and government agencies to snoop on people's daily lives the increasing difficulty for people to handle such scenarios.… (more)

Subjects/Keywords: Deniable; Communication

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Narain, A. (2017). Near field deniable communication. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/58703

Chicago Manual of Style (16th Edition):

Narain, Abhinav. “Near field deniable communication.” 2017. Doctoral Dissertation, Georgia Tech. Accessed March 04, 2021. http://hdl.handle.net/1853/58703.

MLA Handbook (7th Edition):

Narain, Abhinav. “Near field deniable communication.” 2017. Web. 04 Mar 2021.

Vancouver:

Narain A. Near field deniable communication. [Internet] [Doctoral dissertation]. Georgia Tech; 2017. [cited 2021 Mar 04]. Available from: http://hdl.handle.net/1853/58703.

Council of Science Editors:

Narain A. Near field deniable communication. [Doctoral Dissertation]. Georgia Tech; 2017. Available from: http://hdl.handle.net/1853/58703

17. Jang, Yeong Jin. Building trust in the user I/O in computer systems.

Degree: PhD, Computer Science, 2017, Georgia Tech

 User input plays an essential role in computer security because it can control system behavior and make security decisions in the system. System output to… (more)

Subjects/Keywords: Security; I/O

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jang, Y. J. (2017). Building trust in the user I/O in computer systems. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/58732

Chicago Manual of Style (16th Edition):

Jang, Yeong Jin. “Building trust in the user I/O in computer systems.” 2017. Doctoral Dissertation, Georgia Tech. Accessed March 04, 2021. http://hdl.handle.net/1853/58732.

MLA Handbook (7th Edition):

Jang, Yeong Jin. “Building trust in the user I/O in computer systems.” 2017. Web. 04 Mar 2021.

Vancouver:

Jang YJ. Building trust in the user I/O in computer systems. [Internet] [Doctoral dissertation]. Georgia Tech; 2017. [cited 2021 Mar 04]. Available from: http://hdl.handle.net/1853/58732.

Council of Science Editors:

Jang YJ. Building trust in the user I/O in computer systems. [Doctoral Dissertation]. Georgia Tech; 2017. Available from: http://hdl.handle.net/1853/58732

18. Kumar, Mohan Kumar. Taming latency in data center applications.

Degree: PhD, Computer Science, 2019, Georgia Tech

 A new breed of low-latency I/O devices, such as the emerging remote memory access and the high-speed Ethernet NICs, are becoming ubiquitous in current data… (more)

Subjects/Keywords: Latency; Data center; Smart NICs; Protocol stack; Consensus; TLB shootdown

Page 1 Page 2 Page 3 Page 4 Page 5 Page 6 Page 7

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kumar, M. K. (2019). Taming latency in data center applications. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/61693

Chicago Manual of Style (16th Edition):

Kumar, Mohan Kumar. “Taming latency in data center applications.” 2019. Doctoral Dissertation, Georgia Tech. Accessed March 04, 2021. http://hdl.handle.net/1853/61693.

MLA Handbook (7th Edition):

Kumar, Mohan Kumar. “Taming latency in data center applications.” 2019. Web. 04 Mar 2021.

Vancouver:

Kumar MK. Taming latency in data center applications. [Internet] [Doctoral dissertation]. Georgia Tech; 2019. [cited 2021 Mar 04]. Available from: http://hdl.handle.net/1853/61693.

Council of Science Editors:

Kumar MK. Taming latency in data center applications. [Doctoral Dissertation]. Georgia Tech; 2019. Available from: http://hdl.handle.net/1853/61693

19. Meng, Wei. Identifying and mitigating threats from embedding third-party content.

Degree: PhD, Computer Science, 2017, Georgia Tech

 Embedding content from third parties to enrich features is a common practice in the development of modern web applications and mobile applications. Such practices can… (more)

Subjects/Keywords: Permission; Third-party content

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Meng, W. (2017). Identifying and mitigating threats from embedding third-party content. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/58766

Chicago Manual of Style (16th Edition):

Meng, Wei. “Identifying and mitigating threats from embedding third-party content.” 2017. Doctoral Dissertation, Georgia Tech. Accessed March 04, 2021. http://hdl.handle.net/1853/58766.

MLA Handbook (7th Edition):

Meng, Wei. “Identifying and mitigating threats from embedding third-party content.” 2017. Web. 04 Mar 2021.

Vancouver:

Meng W. Identifying and mitigating threats from embedding third-party content. [Internet] [Doctoral dissertation]. Georgia Tech; 2017. [cited 2021 Mar 04]. Available from: http://hdl.handle.net/1853/58766.

Council of Science Editors:

Meng W. Identifying and mitigating threats from embedding third-party content. [Doctoral Dissertation]. Georgia Tech; 2017. Available from: http://hdl.handle.net/1853/58766

20. Jung, Seungwoo. Optimization of SiGe HBT BiCMOS analog building blocks for operation in extreme environments.

Degree: PhD, Electrical and Computer Engineering, 2015, Georgia Tech

 The objective of this research is to optimize silicon-germanium (SiGe) heterojunction bipolar transistor (HBT) BiCMOS analog circuit building blocks for operation in extreme environments utilizing… (more)

Subjects/Keywords: Analog circuit; SEE; SET; Radiation hardening; ADC; Analog-to-digital converter; SiGe; HBT; BiCMOS

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jung, S. (2015). Optimization of SiGe HBT BiCMOS analog building blocks for operation in extreme environments. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/54419

Chicago Manual of Style (16th Edition):

Jung, Seungwoo. “Optimization of SiGe HBT BiCMOS analog building blocks for operation in extreme environments.” 2015. Doctoral Dissertation, Georgia Tech. Accessed March 04, 2021. http://hdl.handle.net/1853/54419.

MLA Handbook (7th Edition):

Jung, Seungwoo. “Optimization of SiGe HBT BiCMOS analog building blocks for operation in extreme environments.” 2015. Web. 04 Mar 2021.

Vancouver:

Jung S. Optimization of SiGe HBT BiCMOS analog building blocks for operation in extreme environments. [Internet] [Doctoral dissertation]. Georgia Tech; 2015. [cited 2021 Mar 04]. Available from: http://hdl.handle.net/1853/54419.

Council of Science Editors:

Jung S. Optimization of SiGe HBT BiCMOS analog building blocks for operation in extreme environments. [Doctoral Dissertation]. Georgia Tech; 2015. Available from: http://hdl.handle.net/1853/54419

21. Lu, Kangjie. Securing software systems by preventing information leaks.

Degree: PhD, Computer Science, 2017, Georgia Tech

 Foundational software systems such as operating systems and web servers are implemented in unsafe programming languages for efficiency, and system designers often prioritize performance over… (more)

Subjects/Keywords: System security; Vulnerability; Control-flow attack; Information leak; ASLR; Re-randomization; Replicated execution; Uninitialized-data use

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lu, K. (2017). Securing software systems by preventing information leaks. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/58749

Chicago Manual of Style (16th Edition):

Lu, Kangjie. “Securing software systems by preventing information leaks.” 2017. Doctoral Dissertation, Georgia Tech. Accessed March 04, 2021. http://hdl.handle.net/1853/58749.

MLA Handbook (7th Edition):

Lu, Kangjie. “Securing software systems by preventing information leaks.” 2017. Web. 04 Mar 2021.

Vancouver:

Lu K. Securing software systems by preventing information leaks. [Internet] [Doctoral dissertation]. Georgia Tech; 2017. [cited 2021 Mar 04]. Available from: http://hdl.handle.net/1853/58749.

Council of Science Editors:

Lu K. Securing software systems by preventing information leaks. [Doctoral Dissertation]. Georgia Tech; 2017. Available from: http://hdl.handle.net/1853/58749

22. Merritt, Alexander Marshall. Efficient programming of massive-memory machines.

Degree: PhD, Computer Science, 2017, Georgia Tech

 New and emerging memory technologies combined with enormous growths in data collection and mining within industry are giving rise to servers with massive pools of… (more)

Subjects/Keywords: Key-value store; Address space; Operating system; Big data; Memory; Scalability; Concurrency

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Merritt, A. M. (2017). Efficient programming of massive-memory machines. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/59202

Chicago Manual of Style (16th Edition):

Merritt, Alexander Marshall. “Efficient programming of massive-memory machines.” 2017. Doctoral Dissertation, Georgia Tech. Accessed March 04, 2021. http://hdl.handle.net/1853/59202.

MLA Handbook (7th Edition):

Merritt, Alexander Marshall. “Efficient programming of massive-memory machines.” 2017. Web. 04 Mar 2021.

Vancouver:

Merritt AM. Efficient programming of massive-memory machines. [Internet] [Doctoral dissertation]. Georgia Tech; 2017. [cited 2021 Mar 04]. Available from: http://hdl.handle.net/1853/59202.

Council of Science Editors:

Merritt AM. Efficient programming of massive-memory machines. [Doctoral Dissertation]. Georgia Tech; 2017. Available from: http://hdl.handle.net/1853/59202

.