skip to main content
10.1145/3609510acmconferencesBook PagePublication PagesapsysConference Proceedingsconference-collections
APSys '23: Proceedings of the 14th ACM SIGOPS Asia-Pacific Workshop on Systems
ACM2023 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
APSys '23: 14th ACM SIGOPS Asia-Pacific Workshop on Systems Seoul Republic of Korea August 24 - 25, 2023
ISBN:
979-8-4007-0305-8
Published:
24 August 2023
Sponsors:

Bibliometrics
Abstract

No abstract available.

Skip Table Of Content Section
SESSION: Operating Systems
research-article
xOS: The End Of The Process-Thread Duo Reign

Process and Thread are first-order abstractions of the operating system (OS), whose implementation is wired into the OS core. Several research works have shown the inadequacy of these two main abstractions for modern isolation needs, leading to the ...

research-article
First steps in verifying the seL4 Core Platform

We report on our initial effort to formally verify the seL4 Core Platform, an OS framework for the verified seL4 microkernel. This includes a formal specification of the seL4 Core Platform library, an automated proof of its functional correctness, and a ...

SESSION: Compute, Storage, and Networking
research-article
Open Access
Towards OS Heterogeneity Aware Cluster Management for HPC

To achieve extremely high performance in HPC, many researchers have proposed customized operating systems that are tailored to HPC workload characteristics and emerging hardware. Hence, we argue that the HPC cluster will move away from the single OS ...

research-article
ZapRAID: Toward High-Performance RAID for ZNS SSDs via Zone Append

Zoned Namespace (ZNS) provides the Zone Append primitive to boost the write performance of ZNS SSDs via intrazone parallelism. However, making Zone Append effective for a RAID array of multiple ZNS SSDs is non-trivial, since Zone Append offloads address ...

research-article
Open Access
Capybara: μSecond-Scale Live TCP Migration

Latency-critical μs-scale data center applications are susceptible to server load spikes. The issue is particularly challenging for services using long-lived TCP connections. This paper introduces Capybara, a highly efficient and versatile live TCP ...

SESSION: Systems for ML
research-article
Improving Throughput-oriented Generative Inference with CPUs

Despite recent attempts to reduce the number of parameters of large language models (LLMs), their parameter data is still too large to fit into a single GPU. With the emergence of throughput-oriented tasks, high-throughput generative inference ...

research-article
Cost-Efficient Serverless Inference Serving with Joint Batching and Multi-Processing

With the emerging of machine learning, many commercial companies increasingly utilize machine learning inference systems as backend services to improve their products. Serverless computing is a modern paradigm that provides auto-scaling, event-driven ...

research-article
Liquid: Mix-and-Match Multiple Image Formats to Balance DNN Training Pipeline

Today's deep neural network (DNN) training pipeline utilizes hardware resources holistically, including host CPUs and storage devices for preprocessing the input data and accelerators like GPUs for computing gradients. As the performance of the ...

SESSION: Security I
research-article
Reducing Attack Surface with Container Transplantation for Lightweight Sandboxing

Containers, which have evolved in Linux primarily, have become a significant trend in the cloud due to their lightweight virtualization and growing convenient ecosystem. However, the laxer isolation of containerization also introduces attack surfaces on ...

research-article
Family Classification based on Tree Representations for Malware

Malware classification is helpful for malware detection and analysis. Family classification of malware is a multi-classification task. Many studies have exploited API call sequences as malware features. However, API call sequences do not explicitly ...

research-article
Trusted Heterogeneous Disaggregated Architectures

The rising performance demands and increasing heterogeneity in cloud data centers lead to a paradigm shift in the cloud infrastructure, from monolithic servers to a disaggregated architecture. In a multi-tenant cloud, users should be able to leverage ...

SESSION: Security II
research-article
Open Access
Quantifying the Security Profile of Linux Applications

There is an increasing interest to quantify and improve the isolation provided by containers to competing applications on multitenant hosts. As a first step to address this need, we introduce several metrics that quantify the exposure of the ...

research-article
Open Access
Understanding the Security of Linux eBPF Subsystem

Linux eBPF allows a userspace application to execute code inside the Linux kernel without modifying the kernel code or inserting a kernel module. An in-kernel eBPF verifier pre-verifies any untrusted eBPF bytecode before running it in kernel context. ...

Recommendations

Acceptance Rates

APSys '23 Paper Acceptance Rate13of32submissions,41%Overall Acceptance Rate149of386submissions,39%
YearSubmittedAcceptedRate
APSys '23321341%
APSys '21431944%
APSys '19361542%
APSys '18481838%
APSys '17512753%
APSys '15682029%
APSys '14351440%
APSys '13732332%
Overall38614939%