Skip to main content

Showing 1–5 of 5 results for author: Lim, S Y

Searching in archive cs. Search in all archives.
.
  1. arXiv:2404.08716  [pdf, other

    cs.CR cs.OS

    Securing Monolithic Kernels using Compartmentalization

    Authors: Soo Yee Lim, Sidhartha Agrawal, Xueyuan Han, David Eyers, Dan O'Keeffe, Thomas Pasquier

    Abstract: Monolithic operating systems, where all kernel functionality resides in a single, shared address space, are the foundation of most mainstream computer systems. However, a single flaw, even in a non-essential part of the kernel (e.g., device drivers), can cause the entire operating system to fall under an attacker's control. Kernel hardening techniques might prevent certain types of vulnerabilities… ▽ More

    Submitted 12 April, 2024; originally announced April 2024.

    Comments: 24 pages, 7 figures

  2. arXiv:2310.20204  [pdf, other

    cs.LG cs.CL

    General-Purpose Retrieval-Enhanced Medical Prediction Model Using Near-Infinite History

    Authors: Junu Kim, Chaeeun Shim, Bosco Seong Kyu Yang, Chami Im, Sung Yoon Lim, Han-Gil Jeong, Edward Choi

    Abstract: Develo** clinical prediction models (e.g., mortality prediction) based on electronic health records (EHRs) typically relies on expert opinion for feature selection and adjusting observation window size. This burdens experts and creates a bottleneck in the development process. We propose Retrieval-Enhanced Medical prediction model (REMed) to address such challenges. REMed can essentially evaluate… ▽ More

    Submitted 20 March, 2024; v1 submitted 31 October, 2023; originally announced October 2023.

    Comments: The source codes corresponding to this paper are available at: https://github.com/starmpcc/REMed

  3. arXiv:2308.01983  [pdf, other

    cs.OS cs.CR

    Unleashing Unprivileged eBPF Potential with Dynamic Sandboxing

    Authors: Soo Yee Lim, Xueyuan Han, Thomas Pasquier

    Abstract: For safety reasons, unprivileged users today have only limited ways to customize the kernel through the extended Berkeley Packet Filter (eBPF). This is unfortunate, especially since the eBPF framework itself has seen an increase in scope over the years. We propose SandBPF, a software-based kernel isolation technique that dynamically sandboxes eBPF programs to allow unprivileged users to safely ext… ▽ More

    Submitted 15 August, 2023; v1 submitted 3 August, 2023; originally announced August 2023.

    Comments: 8 pages, 5 figures, to appear in the 1st SIGCOMM Workshop on eBPF and Kernel Extensions

  4. arXiv:2111.02481  [pdf, other

    cs.CR

    Secure Namespaced Kernel Audit for Containers

    Authors: Soo Yee Lim, Bogdan Stelea, Xueyuan Han, Thomas Pasquier

    Abstract: Despite the wide usage of container-based cloud computing, container auditing for security analysis relies mostly on built-in host audit systems, which often lack the ability to capture high-fidelity container logs. State-of-the-art reference-monitor-based audit techniques greatly improve the quality of audit logs, but their system-wide architecture is too costly to be adapted for individual conta… ▽ More

    Submitted 3 November, 2021; originally announced November 2021.

    Comments: 15 pages, 7 figures

  5. arXiv:cs/0306127  [pdf

    cs.MS

    Development of a Java Package for Matrix Programming

    Authors: Ngee-Peng Lim, Maurice HT Ling, Shawn YC Lim, Ji-Hee Choi, Henry BK Teo

    Abstract: We had assembled a Java package, known as MatrixPak, of four classes for the purpose of numerical matrix computation. The classes are matrix, matrix_operations, StrToMatrix, and MatrixToStr; all of which are inherited from java.lang.Object class. Class matrix defines a matrix as a two-dimensional array of float types, and contains the following mathematical methods: transpose, adjoint, determina… ▽ More

    Submitted 24 June, 2003; originally announced June 2003.

    Comments: Secondary school (high school) student project report. Foundation for JMaths project

    ACM Class: K.3.0; G.m