Skip to main content

Showing 1–2 of 2 results for author: Shirazi, S H A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2412.14519  [pdf, other

    cs.DB

    Optimizing Big Active Data Management Systems

    Authors: Shahrzad Haji Amin Shirazi, Xikui Wang, Michael J. Carey, Vassilis J. Tsotras

    Abstract: Within the dynamic world of Big Data, traditional systems typically operate in a passive mode, processing and responding to user queries by returning the requested data. However, this methodology falls short of meeting the evolving demands of users who not only wish to analyze data but also to receive proactive updates on topics of interest. To bridge this gap, Big Active Data (BAD) frameworks hav… ▽ More

    Submitted 20 December, 2024; v1 submitted 18 December, 2024; originally announced December 2024.

  2. arXiv:1906.01345  [pdf, other

    cs.CR

    SPECCFI: Mitigating Spectre Attacks using CFI Informed Speculation

    Authors: Esmaeil Mohammadian Koruyeh, Shirin Haji Amin Shirazi, Khaled N. Khasawneh, Chengyu Song, Nael Abu-Ghazaleh

    Abstract: Spectre attacks and their many subsequent variants are a new vulnerability class affecting modern CPUs. The attacks rely on the ability to misguide speculative execution, generally by exploiting the branch prediction structures, to execute a vulnerable code sequence speculatively. In this paper, we propose to use Control-Flow Integrity (CFI), a security technique used to stop control-flow hijackin… ▽ More

    Submitted 4 December, 2019; v1 submitted 4 June, 2019; originally announced June 2019.

    Comments: To appear in IEEE S&P 2020