dblp: Adam Morrison
https://dblp.org/pid/40/944.html
dblp person page RSS feedMon, 07 Oct 2024 21:24:10 +0200en-USdaily1released under the CC0 1.0 licensedblp@dagstuhl.de (dblp team)dblp@dagstuhl.de (dblp team)Computers/Computer_Science/Publications/Bibliographieshttp://www.rssboard.org/rss-specificationhttps://dblp.org/img/logo.144x51.pngdblp: Adam Morrisonhttps://dblp.org/pid/40/944.html14451Everywhere All at Once: Co-Location Attacks on Public Cloud FaaS.https://doi.org/10.1145/3617232.3624867Zirui Neil Zhao, Adam Morrison, Christopher W. Fletcher, Josep Torrellas: Everywhere All at Once: Co-Location Attacks on Public Cloud FaaS.ASPLOS (1)2024: 133-149]]>https://dblp.org/rec/conf/asplos/Zhao0FT24Mon, 01 Jan 2024 00:00:00 +0100Last-Level Cache Side-Channel Attacks Are Feasible in the Modern Public Cloud.https://doi.org/10.1145/3620665.3640403Zirui Neil Zhao, Adam Morrison, Christopher W. Fletcher, Josep Torrellas: Last-Level Cache Side-Channel Attacks Are Feasible in the Modern Public Cloud.ASPLOS (2)2024: 582-600]]>https://dblp.org/rec/conf/asplos/Zhao0FT24aMon, 01 Jan 2024 00:00:00 +0100Last-Level Cache Side-Channel Attacks Are Feasible in the Modern Public Cloud (Extended Version).https://doi.org/10.48550/arXiv.2405.12469Zirui Neil Zhao, Adam Morrison, Christopher W. Fletcher, Josep Torrellas: Last-Level Cache Side-Channel Attacks Are Feasible in the Modern Public Cloud (Extended Version).CoRRabs/2405.12469 (2024)]]>https://dblp.org/rec/journals/corr/abs-2405-12469Mon, 01 Jan 2024 00:00:00 +0100RLS Side Channels: Investigating Leakage of Row-Level Security Protected Data Through Query Execution Time.https://doi.org/10.1145/3588943Chen Dar, Moshik Hershcovitch, Adam Morrison: RLS Side Channels: Investigating Leakage of Row-Level Security Protected Data Through Query Execution Time.Proc. ACM Manag. Data1(1): 89:1-89:25 (2023)]]>https://dblp.org/rec/journals/pacmmod/DarH023Sun, 01 Jan 2023 00:00:00 +0100Untangle: A Principled Framework to Design Low-Leakage, High-Performance Dynamic Partitioning Schemes.https://doi.org/10.1145/3582016.3582033Zirui Neil Zhao, Adam Morrison, Christopher W. Fletcher, Josep Torrellas: Untangle: A Principled Framework to Design Low-Leakage, High-Performance Dynamic Partitioning Schemes.ASPLOS (3)2023: 771-788]]>https://dblp.org/rec/conf/asplos/Zhao0FT23Sun, 01 Jan 2023 00:00:00 +0100Declassiflow: A Static Analysis for Modeling Non-Speculative Knowledge to Relax Speculative Execution Security Measures.https://doi.org/10.1145/3576915.3623065Rutvik Choudhary, Alan Wang, Zirui Neil Zhao, Adam Morrison, Christopher W. Fletcher: Declassiflow: A Static Analysis for Modeling Non-Speculative Knowledge to Relax Speculative Execution Security Measures.CCS2023: 2053-2067]]>https://dblp.org/rec/conf/ccs/ChoudharyWZ0F23Sun, 01 Jan 2023 00:00:00 +0100ShRing: Networking with Shared Receive Rings.https://www.usenix.org/conference/osdi23/presentation/pismennyBoris Pismenny, Adam Morrison, Dan Tsafrir: ShRing: Networking with Shared Receive Rings.OSDI2023: 949-968]]>https://dblp.org/rec/conf/osdi/Pismenny0T23Sun, 01 Jan 2023 00:00:00 +0100WISE: Predicting the Performance of Sparse Matrix Vector Multiplication with Machine Learning.https://doi.org/10.1145/3572848.3577506Serif Yesil, Azin Heidarshenas, Adam Morrison, Josep Torrellas: WISE: Predicting the Performance of Sparse Matrix Vector Multiplication with Machine Learning.PPoPP2023: 329-341]]>https://dblp.org/rec/conf/ppopp/YesilH0T23Sun, 01 Jan 2023 00:00:00 +0100Prefix Siphoning: Exploiting LSM-Tree Range Filters For Information Disclosure.https://www.usenix.org/conference/atc23/presentation/kaufmanAdi Kaufman, Moshik Hershcovitch, Adam Morrison: Prefix Siphoning: Exploiting LSM-Tree Range Filters For Information Disclosure.USENIX ATC2023: 719-733]]>https://dblp.org/rec/conf/usenix/KaufmanH023Sun, 01 Jan 2023 00:00:00 +0100Prefix Siphoning: Exploiting LSM-Tree Range Filters For Information Disclosure (Full Version).https://doi.org/10.48550/arXiv.2306.04602Adi Kafuman, Moshik Hershcovitch, Adam Morrison: Prefix Siphoning: Exploiting LSM-Tree Range Filters For Information Disclosure (Full Version).CoRRabs/2306.04602 (2023)]]>https://dblp.org/rec/journals/corr/abs-2306-04602Sun, 01 Jan 2023 00:00:00 +0100DECLASSIFLOW: A Static Analysis for Modeling Non-Speculative Knowledge to Relax Speculative Execution Security Measures (Full Version).https://doi.org/10.48550/arXiv.2312.09336Rutvik Choudhary, Alan Wang, Zirui Neil Zhao, Adam Morrison, Christopher W. Fletcher: DECLASSIFLOW: A Static Analysis for Modeling Non-Speculative Knowledge to Relax Speculative Execution Security Measures (Full Version).CoRRabs/2312.09336 (2023)]]>https://dblp.org/rec/journals/corr/abs-2312-09336Sun, 01 Jan 2023 00:00:00 +0100Prefix Filter: Practically and Theoretically Better Than Bloom.https://www.vldb.org/pvldb/vol15/p1311-even.pdfTomer Even, Guy Even, Adam Morrison: Prefix Filter: Practically and Theoretically Better Than Bloom.Proc. VLDB Endow.15(7): 1311-1323 (2022)]]>https://dblp.org/rec/journals/pvldb/EvenEM22Sat, 01 Jan 2022 00:00:00 +0100Pinned loads: taming speculative loads in secure processors.https://doi.org/10.1145/3503222.3507724Zirui Neil Zhao, Houxiang Ji, Adam Morrison, Darko Marinov, Josep Torrellas: Pinned loads: taming speculative loads in secure processors.ASPLOS2022: 314-328]]>https://dblp.org/rec/conf/asplos/ZhaoJ0MT22Sat, 01 Jan 2022 00:00:00 +0100The benefits of general-purpose on-NIC memory.https://doi.org/10.1145/3503222.3507711Boris Pismenny, Liran Liss, Adam Morrison, Dan Tsafrir: The benefits of general-purpose on-NIC memory.ASPLOS2022: 1130-1147]]>https://dblp.org/rec/conf/asplos/PismennyL0T22Sat, 01 Jan 2022 00:00:00 +0100Elastic Indexes: Dynamic Space vs. Query Efficiency Tuning for In-Memory Database Indexing.https://doi.org/10.48786/edbt.2022.18Moshik Hershcovitch, Artem Khyzha, Daniel G. Waddington, Adam Morrison: Elastic Indexes: Dynamic Space vs. Query Efficiency Tuning for In-Memory Database Indexing.EDBT2022: 2:312-2:324]]>https://dblp.org/rec/conf/edbt/HershcovitchKW022Sat, 01 Jan 2022 00:00:00 +0100Occualizer: Optimistic Concurrent Search Trees From Sequential Code.https://www.usenix.org/conference/osdi22/presentation/shannyTomer Shanny, Adam Morrison: Occualizer: Optimistic Concurrent Search Trees From Sequential Code.OSDI2022: 321-337]]>https://dblp.org/rec/conf/osdi/Shanny022Sat, 01 Jan 2022 00:00:00 +0100Augury: Using Data Memory-Dependent Prefetchers to Leak Data at Rest.https://doi.org/10.1109/SP46214.2022.9833570Jose Rodrigo Sanchez Vicarte, Michael Flanders, Riccardo Paccagnella, Grant Garrett-Grossman, Adam Morrison, Christopher W. Fletcher, David Kohlbrenner: Augury: Using Data Memory-Dependent Prefetchers to Leak Data at Rest.SP2022: 1491-1505]]>https://dblp.org/rec/conf/sp/VicarteFPG0FK22Sat, 01 Jan 2022 00:00:00 +0100Evaluating compressed indexes in DBMS.https://doi.org/10.1145/3534056.3535006Oz Anani, Gal Lushi, Moshik Hershcovitch, Adam Morrison: Evaluating compressed indexes in DBMS.SYSTOR2022: 149]]>https://dblp.org/rec/conf/systor/AnaniLH022Sat, 01 Jan 2022 00:00:00 +0100System-level crash safe sorting on persistent memory.https://doi.org/10.1145/3534056.3535008Omri Arad, Yoav Ben Shimon, Ron Zadicario, Daniel G. Waddington, Moshik Hershcovitch, Adam Morrison: System-level crash safe sorting on persistent memory.SYSTOR2022: 151]]>https://dblp.org/rec/conf/systor/AradSZWH022Sat, 01 Jan 2022 00:00:00 +0100Privbox: Faster System Calls Through Sandboxed Privileged Execution.https://www.usenix.org/conference/atc22/presentation/kuznetsovDmitry Kuznetsov, Adam Morrison: Privbox: Faster System Calls Through Sandboxed Privileged Execution.USENIX ATC2022]]>https://dblp.org/rec/conf/usenix/Kuznetsov022Sat, 01 Jan 2022 00:00:00 +0100Binoculars: Contention-Based Side-Channel Attacks Exploiting the Page Walker.https://www.usenix.org/conference/usenixsecurity22/presentation/zhao-ziruiZirui Neil Zhao, Adam Morrison, Christopher W. Fletcher, Josep Torrellas: Binoculars: Contention-Based Side-Channel Attacks Exploiting the Page Walker.USENIX Security Symposium2022: 699-716]]>https://dblp.org/rec/conf/uss/Zhao0FT22Sat, 01 Jan 2022 00:00:00 +0100Cuckoo Trie: Exploiting Memory-Level Parallelism for Efficient DRAM Indexing.https://arxiv.org/abs/2201.09331Adar Zeitak, Adam Morrison: Cuckoo Trie: Exploiting Memory-Level Parallelism for Efficient DRAM Indexing.CoRRabs/2201.09331 (2022)]]>https://dblp.org/rec/journals/corr/abs-2201-09331Sat, 01 Jan 2022 00:00:00 +0100Prefix Filter: Practically and Theoretically Better Than Bloom.https://doi.org/10.48550/arXiv.2203.17139Tomer Even, Guy Even, Adam Morrison: Prefix Filter: Practically and Theoretically Better Than Bloom.CoRRabs/2203.17139 (2022)]]>https://dblp.org/rec/journals/corr/abs-2203-17139Sat, 01 Jan 2022 00:00:00 +0100Speculative taint tracking (STT): a comprehensive protection for speculatively accessed data.https://doi.org/10.1145/3491201Jiyong Yu, Mengjia Yan, Artem Khyzha, Adam Morrison, Josep Torrellas, Christopher W. Fletcher: Speculative taint tracking (STT): a comprehensive protection for speculatively accessed data.Commun. ACM64(12): 105-112 (2021)]]>https://dblp.org/rec/journals/cacm/YuYKMTF21Fri, 01 Jan 2021 00:00:00 +0100Specification and space complexity of collaborative text editing.https://doi.org/10.1016/j.tcs.2020.11.046Hagit Attiya, Sebastian Burckhardt, Alexey Gotsman, Adam Morrison, Hongseok Yang, Marek Zawirski: Specification and space complexity of collaborative text editing.Theor. Comput. Sci.855: 141-160 (2021)]]>https://dblp.org/rec/journals/tcs/AttiyaBGMYZ21Fri, 01 Jan 2021 00:00:00 +0100Autonomous NIC offloads.https://doi.org/10.1145/3445814.3446732Boris Pismenny, Haggai Eran, Aviad Yehezkel, Liran Liss, Adam Morrison, Dan Tsafrir: Autonomous NIC offloads.ASPLOS2021: 18-35]]>https://dblp.org/rec/conf/asplos/PismennyEYL0T21Fri, 01 Jan 2021 00:00:00 +0100Speculative interference attacks: breaking invisible speculation schemes.https://doi.org/10.1145/3445814.3446708Mohammad Behnia, Prateek Sahu, Riccardo Paccagnella, Jiyong Yu, Zirui Neil Zhao, Xiang Zou, Thomas Unterluggauer, Josep Torrellas, Carlos V. Rozas, Adam Morrison, Frank McKeen, Fangfei Liu, Ron Gabor, Christopher W. Fletcher, Abhishek Basak, Alaa R. Alameldeen: Speculative interference attacks: breaking invisible speculation schemes.ASPLOS2021: 1046-1060]]>https://dblp.org/rec/conf/asplos/BehniaSPYZZUTR021Fri, 01 Jan 2021 00:00:00 +0100Characterizing, exploiting, and detecting DMA code injection vulnerabilities in the presence of an IOMMU.https://doi.org/10.1145/3447786.3456249Alex Markuze, Shay Vargaftik, Gil Kupfer, Boris Pismenny, Nadav Amit, Adam Morrison, Dan Tsafrir: Characterizing, exploiting, and detecting DMA code injection vulnerabilities in the presence of an IOMMU.EuroSys2021: 395-409]]>https://dblp.org/rec/conf/eurosys/MarkuzeVKPA0T21Fri, 01 Jan 2021 00:00:00 +0100Opening Pandora's Box: A Systematic Study of New Ways Microarchitecture Can Leak Private Data.https://doi.org/10.1109/ISCA52012.2021.00035Jose Rodrigo Sanchez Vicarte, Pradyumna Shome, Nandeeka Nayak, Caroline Trippel, Adam Morrison, David Kohlbrenner, Christopher W. Fletcher: Opening Pandora's Box: A Systematic Study of New Ways Microarchitecture Can Leak Private Data.ISCA2021: 347-360]]>https://dblp.org/rec/conf/isca/VicarteSNT0KF21Fri, 01 Jan 2021 00:00:00 +0100Speculative Privacy Tracking (SPT): Leaking Information From Speculative Execution Without Compromising Privacy.https://doi.org/10.1145/3466752.3480068Rutvik Choudhary, Jiyong Yu, Christopher W. Fletcher, Adam Morrison: Speculative Privacy Tracking (SPT): Leaking Information From Speculative Execution Without Compromising Privacy.MICRO2021: 607-622]]>https://dblp.org/rec/conf/micro/ChoudharyYF021Fri, 01 Jan 2021 00:00:00 +0100Efficiently reclaiming memory in concurrent search data structures while bounding wasted memory.https://doi.org/10.1145/3437801.3441582Daniel Solomon, Adam Morrison: Efficiently reclaiming memory in concurrent search data structures while bounding wasted memory.PPoPP2021: 191-204]]>https://dblp.org/rec/conf/ppopp/Solomon021Fri, 01 Jan 2021 00:00:00 +0100Cuckoo Trie: Exploiting Memory-Level Parallelism for Efficient DRAM Indexing.https://doi.org/10.1145/3477132.3483551Adar Zeitak, Adam Morrison: Cuckoo Trie: Exploiting Memory-Level Parallelism for Efficient DRAM Indexing.SOSP2021: 147-162]]>https://dblp.org/rec/conf/sosp/Zeitak021Fri, 01 Jan 2021 00:00:00 +0100An Analysis of Speculative Type Confusion Vulnerabilities in the Wild.https://www.usenix.org/conference/usenixsecurity21/presentation/kirznerOfek Kirzner, Adam Morrison: An Analysis of Speculative Type Confusion Vulnerabilities in the Wild.USENIX Security Symposium2021: 2399-2416]]>https://dblp.org/rec/conf/uss/Kirzner021Fri, 01 Jan 2021 00:00:00 +0100An Analysis of Speculative Type Confusion Vulnerabilities in the Wild.https://arxiv.org/abs/2106.15601Ofek Kirzner, Adam Morrison: An Analysis of Speculative Type Confusion Vulnerabilities in the Wild.CoRRabs/2106.15601 (2021)]]>https://dblp.org/rec/journals/corr/abs-2106-15601Fri, 01 Jan 2021 00:00:00 +0100Speculative Taint Tracking (STT): A Comprehensive Protection for Speculatively Accessed Data.https://doi.org/10.1109/MM.2020.2985359Jiyong Yu, Mengjia Yan, Artem Khyzha, Adam Morrison, Josep Torrellas, Christopher W. Fletcher: Speculative Taint Tracking (STT): A Comprehensive Protection for Speculatively Accessed Data.IEEE Micro40(3): 81-90 (2020)]]>https://dblp.org/rec/journals/micro/YuYKMTF20Wed, 01 Jan 2020 00:00:00 +0100Proving highly-concurrent traversals correct.https://doi.org/10.1145/3428196Yotam M. Y. Feldman, Artem Khyzha, Constantin Enea, Adam Morrison, Aleksandar Nanevski, Noam Rinetzky, Sharon Shoham: Proving highly-concurrent traversals correct.Proc. ACM Program. Lang.4(OOPSLA): 128:1-128:29 (2020)]]>https://dblp.org/rec/journals/pacmpl/FeldmanKE0NRS20Wed, 01 Jan 2020 00:00:00 +0100IOctopus: Outsmarting Nonuniform DMA.https://doi.org/10.1145/3373376.3378509Igor Smolyar, Alex Markuze, Boris Pismenny, Haggai Eran, Gerd Zellweger, Austin Bolen, Liran Liss, Adam Morrison, Dan Tsafrir: IOctopus: Outsmarting Nonuniform DMA.ASPLOS2020: 101-115]]>https://dblp.org/rec/conf/asplos/SmolyarMPEZBL0T20Wed, 01 Jan 2020 00:00:00 +0100V-Combiner: speeding-up iterative graph processing on a shared-memory platform with vertex merging.https://doi.org/10.1145/3392717.3392739Azin Heidarshenas, Serif Yesil, Dimitrios Skarlatos, Sasa Misailovic, Adam Morrison, Josep Torrellas: V-Combiner: speeding-up iterative graph processing on a shared-memory platform with vertex merging.ICS2020: 9:1-9:13]]>https://dblp.org/rec/conf/ics/HeidarshenasYSM20Wed, 01 Jan 2020 00:00:00 +0100Snug: architectural support for relaxed concurrent priority queueing in chip multiprocessors.https://doi.org/10.1145/3392717.3392740Azin Heidarshenas, Tanmay Gangwani, Serif Yesil, Adam Morrison, Josep Torrellas: Snug: architectural support for relaxed concurrent priority queueing in chip multiprocessors.ICS2020: 18:1-18:13]]>https://dblp.org/rec/conf/ics/HeidarshenasGYM20Wed, 01 Jan 2020 00:00:00 +0100Speculative Data-Oblivious Execution: Mobilizing Safe Prediction For Safe and Efficient Speculative Execution.https://doi.org/10.1109/ISCA45697.2020.00064Jiyong Yu, Namrata Mantri, Josep Torrellas, Adam Morrison, Christopher W. Fletcher: Speculative Data-Oblivious Execution: Mobilizing Safe Prediction For Safe and Efficient Speculative Execution.ISCA2020: 707-720]]>https://dblp.org/rec/conf/isca/YuMT0F20Wed, 01 Jan 2020 00:00:00 +0100Speculation Invariance (InvarSpec): Faster Safe Execution Through Program Analysis.https://doi.org/10.1109/MICRO50266.2020.00094Zirui Neil Zhao, Houxiang Ji, Mengjia Yan, Jiyong Yu, Christopher W. Fletcher, Adam Morrison, Darko Marinov, Josep Torrellas: Speculation Invariance (InvarSpec): Faster Safe Execution Through Program Analysis.MICRO2020: 1138-1152]]>https://dblp.org/rec/conf/micro/ZhaoJYYF0MT20Wed, 01 Jan 2020 00:00:00 +0100Recoverable, Abortable, and Adaptive Mutual Exclusion with Sublogarithmic RMR Complexity.https://doi.org/10.4230/LIPIcs.OPODIS.2020.15Daniel Katzan, Adam Morrison: Recoverable, Abortable, and Adaptive Mutual Exclusion with Sublogarithmic RMR Complexity.OPODIS2020: 15:1-15:16]]>https://dblp.org/rec/conf/opodis/Katzan020Wed, 01 Jan 2020 00:00:00 +0100Scaling concurrent queues by using HTM to profit from failed atomic operations.https://doi.org/10.1145/3332466.3374511Or Ostrovsky, Adam Morrison: Scaling concurrent queues by using HTM to profit from failed atomic operations.PPoPP2020: 89-101]]>https://dblp.org/rec/conf/ppopp/OstrovskyM20Wed, 01 Jan 2020 00:00:00 +0100Speeding up SpMV for power-law graph analytics by enhancing locality & vectorization.https://doi.org/10.1109/SC41405.2020.00090Serif Yesil, Azin Heidarshenas, Adam Morrison, Josep Torrellas: Speeding up SpMV for power-law graph analytics by enhancing locality & vectorization.SC2020: 86]]>https://dblp.org/rec/conf/sc/YesilH0T20Wed, 01 Jan 2020 00:00:00 +0100Speculative Interference Attacks: Breaking Invisible Speculation Schemes.https://arxiv.org/abs/2007.11818Mohammad Behnia, Prateek Sahu, Riccardo Paccagnella, Jiyong Yu, Zirui Neil Zhao, Xiang Zou, Thomas Unterluggauer, Josep Torrellas, Carlos V. Rozas, Adam Morrison, Frank McKeen, Fangfei Liu, Ron Gabor, Christopher W. Fletcher, Abhishek Basak, Alaa R. Alameldeen: Speculative Interference Attacks: Breaking Invisible Speculation Schemes.CoRRabs/2007.11818 (2020)]]>https://dblp.org/rec/journals/corr/abs-2007-11818Wed, 01 Jan 2020 00:00:00 +0100Proving Highly-Concurrent Traversals Correct.https://arxiv.org/abs/2010.00911Yotam M. Y. Feldman, Artem Khyzha, Constantin Enea, Adam Morrison, Aleksandar Nanevski, Noam Rinetzky, Sharon Shoham: Proving Highly-Concurrent Traversals Correct.CoRRabs/2010.00911 (2020)]]>https://dblp.org/rec/journals/corr/abs-2010-00911Wed, 01 Jan 2020 00:00:00 +0100Recoverable, Abortable, and Adaptive Mutual Exclusion with Sublogarithmic RMR Complexity.https://arxiv.org/abs/2011.07622Daniel Katzan, Adam Morrison: Recoverable, Abortable, and Adaptive Mutual Exclusion with Sublogarithmic RMR Complexity.CoRRabs/2011.07622 (2020)]]>https://dblp.org/rec/journals/corr/abs-2011-07622Wed, 01 Jan 2020 00:00:00 +0100Speculative Taint Tracking (STT): A Comprehensive Protection for Speculatively Accessed Data.https://doi.org/10.1145/3352460.3358274Jiyong Yu, Mengjia Yan, Artem Khyzha, Adam Morrison, Josep Torrellas, Christopher W. Fletcher: Speculative Taint Tracking (STT): A Comprehensive Protection for Speculatively Accessed Data.MICRO2019: 954-968]]>https://dblp.org/rec/conf/micro/YuYK0TF19Tue, 01 Jan 2019 00:00:00 +0100InvisiSpec: Making Speculative Execution Invisible in the Cache Hierarchy (Corrigendum).https://doi.org/10.1145/3352460.3361129Mengjia Yan, Jiho Choi, Dimitrios Skarlatos, Adam Morrison, Christopher W. Fletcher, Josep Torrellas: InvisiSpec: Making Speculative Execution Invisible in the Cache Hierarchy (Corrigendum).MICRO2019: 1076]]>https://dblp.org/rec/conf/micro/YanCS0FT19Tue, 01 Jan 2019 00:00:00 +0100Understanding priority-based scheduling of graph algorithms on a shared-memory platform.https://doi.org/10.1145/3295500.3356160Serif Yesil, Azin Heidarshenas, Adam Morrison, Josep Torrellas: Understanding priority-based scheduling of graph algorithms on a shared-memory platform.SC2019: 46:1-46:14]]>https://dblp.org/rec/conf/sc/YesilH0T19Tue, 01 Jan 2019 00:00:00 +0100Proceedings of the 12th ACM International Conference on Systems and Storage, SYSTOR 2019, Haifa, Israel, June 3-5, 2019.https://doi.org/10.1145/3319647Moshik Hershcovitch, Ashvin Goel, Adam Morrison: Proceedings of the 12th ACM International Conference on Systems and Storage, SYSTOR 2019, Haifa, Israel, June 3-5, 2019.ACM2019, ISBN 978-1-4503-6749-3[contents]]]>https://dblp.org/rec/conf/systor/2019Tue, 01 Jan 2019 00:00:00 +0100DAMN: Overhead-Free IOMMU Protection for Networking.https://doi.org/10.1145/3173162.3173175Alex Markuze, Igor Smolyar, Adam Morrison, Dan Tsafrir: DAMN: Overhead-Free IOMMU Protection for Networking.ASPLOS2018: 301-315]]>https://dblp.org/rec/conf/asplos/MarkuzeSMT18Mon, 01 Jan 2018 00:00:00 +0100InvisiSpec: Making Speculative Execution Invisible in the Cache Hierarchy.https://doi.org/10.1109/MICRO.2018.00042Mengjia Yan, Jiho Choi, Dimitrios Skarlatos, Adam Morrison, Christopher W. Fletcher, Josep Torrellas: InvisiSpec: Making Speculative Execution Invisible in the Cache Hierarchy.MICRO2018: 428-441]]>https://dblp.org/rec/conf/micro/YanCS0FT18Mon, 01 Jan 2018 00:00:00 +0100Deterministic Abortable Mutual Exclusion with Sublogarithmic Adaptive RMR Complexity.https://doi.org/10.1145/3212734.3212759Adam Alon, Adam Morrison: Deterministic Abortable Mutual Exclusion with Sublogarithmic Adaptive RMR Complexity.PODC2018: 27-36]]>https://dblp.org/rec/conf/podc/AlonM18Mon, 01 Jan 2018 00:00:00 +0100Getting to the Root of Concurrent Binary Search Tree Performance.https://www.usenix.org/conference/atc18/presentation/arbel-ravivMaya Arbel-Raviv, Trevor Brown, Adam Morrison: Getting to the Root of Concurrent Binary Search Tree Performance.USENIX ATC2018: 295-306]]>https://dblp.org/rec/conf/usenix/Arbel-Raviv0018Mon, 01 Jan 2018 00:00:00 +0100Order out of Chaos: Proving Linearizability Using Local Views.https://doi.org/10.4230/LIPIcs.DISC.2018.23Yotam M. Y. Feldman, Constantin Enea, Adam Morrison, Noam Rinetzky, Sharon Shoham: Order out of Chaos: Proving Linearizability Using Local Views.DISC2018: 23:1-23:21]]>https://dblp.org/rec/conf/wdag/FeldmanE0RS18Mon, 01 Jan 2018 00:00:00 +0100Order out of Chaos: Proving Linearizability Using Local Views.http://arxiv.org/abs/1805.03992Yotam M. Y. Feldman, Constantin Enea, Adam Morrison, Noam Rinetzky, Sharon Shoham: Order out of Chaos: Proving Linearizability Using Local Views.CoRRabs/1805.03992 (2018)]]>https://dblp.org/rec/journals/corr/abs-1805-03992Mon, 01 Jan 2018 00:00:00 +0100Limitations of Highly-Available Eventually-Consistent Data Stores.https://doi.org/10.1109/TPDS.2016.2556669Hagit Attiya, Faith Ellen, Adam Morrison: Limitations of Highly-Available Eventually-Consistent Data Stores.IEEE Trans. Parallel Distributed Syst.28(1): 141-155 (2017)]]>https://dblp.org/rec/journals/tpds/AttiyaEM17Sun, 01 Jan 2017 00:00:00 +0100Scaling synchronization in multicore programs.https://doi.org/10.1145/2980987Adam Morrison: Scaling synchronization in multicore programs.Commun. ACM59(11): 44-51 (2016)]]>https://dblp.org/rec/journals/cacm/Morrison16Fri, 01 Jan 2016 00:00:00 +0100Scaling Synchronization in Multicore Programs.https://doi.org/10.1145/2984629.2991130Adam Morrison: Scaling Synchronization in Multicore Programs.ACM Queue14(4): 20 (2016)]]>https://dblp.org/rec/journals/queue/Morrison16Fri, 01 Jan 2016 00:00:00 +0100True IOMMU Protection from DMA Attacks: When Copy is Faster than Zero Copy.https://doi.org/10.1145/2872362.2872379Alex Markuze, Adam Morrison, Dan Tsafrir: True IOMMU Protection from DMA Attacks: When Copy is Faster than Zero Copy.ASPLOS2016: 249-262]]>https://dblp.org/rec/conf/asplos/MarkuzeMT16Fri, 01 Jan 2016 00:00:00 +0100CASPAR: Breaking Serialization in Lock-Free Multicore Synchronization.https://doi.org/10.1145/2872362.2872400Tanmay Gangwani, Adam Morrison, Josep Torrellas: CASPAR: Breaking Serialization in Lock-Free Multicore Synchronization.ASPLOS2016: 789-804]]>https://dblp.org/rec/conf/asplos/GangwaniMT16Fri, 01 Jan 2016 00:00:00 +0100Specification and Complexity of Collaborative Text Editing.https://doi.org/10.1145/2933057.2933090Hagit Attiya, Sebastian Burckhardt, Alexey Gotsman, Adam Morrison, Hongseok Yang, Marek Zawirski: Specification and Complexity of Collaborative Text Editing.PODC2016: 259-268]]>https://dblp.org/rec/conf/podc/AttiyaBGMYZ16Fri, 01 Jan 2016 00:00:00 +0100Temporally Bounding TSO for Fence-Free Asymmetric Synchronization.https://doi.org/10.1145/2694344.2694374Adam Morrison, Yehuda Afek: Temporally Bounding TSO for Fence-Free Asymmetric Synchronization.ASPLOS2015: 45-58]]>https://dblp.org/rec/conf/asplos/MorrisonA15Thu, 01 Jan 2015 00:00:00 +0100A Heap-Based Concurrent Priority Queue with Mutable Priorities for Faster Parallel Algorithms.https://doi.org/10.4230/LIPIcs.OPODIS.2015.15Orr Tamir, Adam Morrison, Noam Rinetzky: A Heap-Based Concurrent Priority Queue with Mutable Priorities for Faster Parallel Algorithms.OPODIS2015: 15:1-15:16]]>https://dblp.org/rec/conf/opodis/TamirMR15Thu, 01 Jan 2015 00:00:00 +0100Limitations of Highly-Available Eventually-Consistent Data Stores.https://doi.org/10.1145/2767386.2767419Hagit Attiya, Faith Ellen, Adam Morrison: Limitations of Highly-Available Eventually-Consistent Data Stores.PODC2015: 385-394]]>https://dblp.org/rec/conf/podc/AttiyaEM15Thu, 01 Jan 2015 00:00:00 +0100Predicate RCU: an RCU for scalable concurrent updates.https://doi.org/10.1145/2688500.2688518Maya Arbel, Adam Morrison: Predicate RCU: an RCU for scalable concurrent updates.PPoPP2015: 21-30]]>https://dblp.org/rec/conf/ppopp/ArbelM15Thu, 01 Jan 2015 00:00:00 +0100Utilizing the IOMMU Scalably.https://www.usenix.org/conference/atc15/technical-session/presentation/pelegOmer Peleg, Adam Morrison, Benjamin Serebrin, Dan Tsafrir: Utilizing the IOMMU Scalably.USENIX ATC2015: 549-562]]>https://dblp.org/rec/conf/usenix/PelegMST15Thu, 01 Jan 2015 00:00:00 +0100The CB tree: a practical concurrent self-adjusting search tree.https://doi.org/10.1007/s00446-014-0229-0Yehuda Afek, Haim Kaplan, Boris Korenfeld, Adam Morrison, Robert Endre Tarjan: The CB tree: a practical concurrent self-adjusting search tree.Distributed Comput.27(6): 393-417 (2014)]]>https://dblp.org/rec/journals/dc/AfekKKMT14Wed, 01 Jan 2014 00:00:00 +0100Fence-free work stealing on bounded TSO processors.https://doi.org/10.1145/2541940.2541987Adam Morrison, Yehuda Afek: Fence-free work stealing on bounded TSO processors.ASPLOS2014: 413-426]]>https://dblp.org/rec/conf/asplos/MorrisonA14Wed, 01 Jan 2014 00:00:00 +0100Software-improved hardware lock elision.https://doi.org/10.1145/2611462.2611482Yehuda Afek, Amir Levy, Adam Morrison: Software-improved hardware lock elision.PODC2014: 212-221]]>https://dblp.org/rec/conf/podc/AfekLM14Wed, 01 Jan 2014 00:00:00 +0100FAst and Scalable Software Execution on Multicores/ Adam, Morrison.https://tau.primo.exlibrisgroup.com/permalink/972TAU_INST/bai57q/alma990028360940204146Adam Morrison: FAst and Scalable Software Execution on Multicores/ Adam, Morrison. Tel Aviv University, Israel, 2013]]>https://dblp.org/rec/phd/il/Morrison13Tue, 01 Jan 2013 00:00:00 +0100Fast and scalable rendezvousing.https://doi.org/10.1007/s00446-013-0185-0Yehuda Afek, Michael Hakimi, Adam Morrison: Fast and scalable rendezvousing.Distributed Comput.26(4): 243-269 (2013)]]>https://dblp.org/rec/journals/dc/AfekHM13Tue, 01 Jan 2013 00:00:00 +0100Fast concurrent queues for x86 processors.https://doi.org/10.1145/2442516.2442527Adam Morrison, Yehuda Afek: Fast concurrent queues for x86 processors.PPoPP2013: 103-112]]>https://dblp.org/rec/conf/ppopp/MorrisonA13Tue, 01 Jan 2013 00:00:00 +0100Programming with hardware lock elision.https://doi.org/10.1145/2442516.2442552Yehuda Afek, Amir Levy, Adam Morrison: Programming with hardware lock elision.PPoPP2013: 295-296]]>https://dblp.org/rec/conf/ppopp/AfekLM13Tue, 01 Jan 2013 00:00:00 +0100CBTree: A Practical Concurrent Self-Adjusting Search Tree.https://doi.org/10.1007/978-3-642-33651-5_1Yehuda Afek, Haim Kaplan, Boris Korenfeld, Adam Morrison, Robert Endre Tarjan: CBTree: A Practical Concurrent Self-Adjusting Search Tree.DISC2012: 1-15]]>https://dblp.org/rec/conf/wdag/AfekKKMT12Sun, 01 Jan 2012 00:00:00 +0100A review of DISC 2011.https://doi.org/10.1145/2078162.2078181Michael Hakimi, Adam Morrison: A review of DISC 2011.SIGACT News42(4): 87-91 (2011)]]>https://dblp.org/rec/journals/sigact/HakimiM11Sat, 01 Jan 2011 00:00:00 +0100Cache index-aware memory allocation.https://doi.org/10.1145/1993478.1993486Yehuda Afek, David Dice, Adam Morrison: Cache index-aware memory allocation.ISMM2011: 55-64]]>https://dblp.org/rec/conf/iwmm/AfekDM11Sat, 01 Jan 2011 00:00:00 +0100From bounded to unbounded concurrency objects and back.https://doi.org/10.1145/1993806.1993823Yehuda Afek, Adam Morrison, Guy Wertheim: From bounded to unbounded concurrency objects and back.PODC2011: 119-128]]>https://dblp.org/rec/conf/podc/AfekMW11Sat, 01 Jan 2011 00:00:00 +0100Coping with context switches in lock-based software transactional memory.https://doi.org/10.1145/1987816.1987831Yehuda Afek, Yoav Cohen, Adam Morrison: Coping with context switches in lock-based software transactional memory.SYSTOR2011: 11]]>https://dblp.org/rec/conf/systor/AfekCM11Sat, 01 Jan 2011 00:00:00 +0100Fast and Scalable Rendezvousing.https://doi.org/10.1007/978-3-642-24100-0_2Yehuda Afek, Michael Hakimi, Adam Morrison: Fast and Scalable Rendezvousing.DISC2011: 16-31]]>https://dblp.org/rec/conf/wdag/AfekHM11Sat, 01 Jan 2011 00:00:00 +0100Brief announcement: view transactions: transactional model with relaxed consistency checks.https://doi.org/10.1145/1835698.1835711Yehuda Afek, Adam Morrison, Moran Tzafrir: Brief announcement: view transactions: transactional model with relaxed consistency checks.PODC2010: 65-66]]>https://dblp.org/rec/conf/podc/AfekMT10Fri, 01 Jan 2010 00:00:00 +0100Common2 extended to stacks and unbounded concurrency.https://doi.org/10.1007/s00446-007-0023-3Yehuda Afek, Eli Gafni, Adam Morrison: Common2 extended to stacks and unbounded concurrency.Distributed Comput.20(4): 239-252 (2007)]]>https://dblp.org/rec/journals/dc/AfekGM07Mon, 01 Jan 2007 00:00:00 +0100Common2 extended to stacks and unbounded concurrency.https://doi.org/10.1145/1146381.1146415Yehuda Afek, Eli Gafni, Adam Morrison: Common2 extended to stacks and unbounded concurrency.PODC2006: 218-227]]>https://dblp.org/rec/conf/podc/AfekGM06Sun, 01 Jan 2006 00:00:00 +0100