Skip to main content

Showing 1–3 of 3 results for author: Deaconescu, R

Searching in archive cs. Search in all archives.
.
  1. Unikraft: Fast, Specialized Unikernels the Easy Way

    Authors: Simon Kuenzer, Vlad-Andrei Bădoiu, Hugo Lefeuvre, Sharan Santhanam, Alexander Jung, Gaulthier Gain, Cyril Soldani, Costin Lupu, Ştefan Teodorescu, Costi Răducanu, Cristian Banu, Laurent Mathy, Răzvan Deaconescu, Costin Raiciu, Felipe Huici

    Abstract: Unikernels are famous for providing excellent performance in terms of boot times, throughput and memory consumption, to name a few metrics. However, they are infamous for making it hard and extremely time consuming to extract such performance, and for needing significant engineering effort in order to port applications to them. We introduce Unikraft, a novel micro-library OS that (1) fully modular… ▽ More

    Submitted 26 April, 2021; originally announced April 2021.

    Comments: 19 pages, 22 figures, 7 tables, conference proceedings

  2. arXiv:1608.04303  [pdf, other

    cs.CR cs.OS

    SandBlaster: Reversing the Apple Sandbox

    Authors: Răzvan Deaconescu, Luke Deshotels, Mihai Bucicoiu, William Enck, Lucas Davi, Ahmad-Reza Sadeghi

    Abstract: In order to limit the damage of malware on Mac OS X and iOS, Apple uses sandboxing, a kernel-level security layer that provides tight constraints for system calls. Particularly used for Apple iOS, sandboxing prevents apps from executing potentially dangerous actions, by defining rules in a sandbox profile. Investigating Apple's built-in sandbox profiles is difficult as they are compiled and stored… ▽ More

    Submitted 15 August, 2016; originally announced August 2016.

    Comments: 25 pages, 9 figures, 14 listings This report is an auxiliary document to the paper "SandScout: Automatic Detection of Flaws in iOS Sandbox Profiles", to be presented at the ACM Conference on Computer and Communications Security (CCS) 2016

    ACM Class: D.4.6

  3. arXiv:1101.4412  [pdf, other

    cs.NI

    BitTorrent Swarm Analysis through Automation and Enhanced Logging

    Authors: Răzvan Deaconescu, Marius Sandu-Popa, Adriana Drăghici, Nicolae Tăpus

    Abstract: Peer-to-Peer protocols currently form the most heavily used protocol class in the Internet, with BitTorrent, the most popular protocol for content distribution, as its flagship. A high number of studies and investigations have been undertaken to measure, analyse and improve the inner workings of the BitTorrent protocol. Approaches such as tracker message analysis, network probing and packet snif… ▽ More

    Submitted 23 January, 2011; originally announced January 2011.

    Comments: ISSN - [Online: 0974 - 9322; Print : 0975- 2293], pages 52-65

    ACM Class: C.2.3; C.4

    Journal ref: International Journal of Computer Networks & Communications (IJCNC), Volume 3, Number 1, 2011