{"628434":{"#nid":"628434","#data":{"type":"news","title":"Taesoo Kim\u2019s Systems Group Has Strong Showing at SOSP","body":[{"value":"\u003Cp\u003ESchool of Computer Science researchers have five papers accepted at one of the main systems conferences. Associate Professor \u003Ca href=\u0022https:\/\/taesoo.kim\/\u0022 target=\u0022_blank\u0022\u003E\u003Cstrong\u003ETaesoo Kim\u0026rsquo;s\u003C\/strong\u003E\u003C\/a\u003E \u0026nbsp;\u003Ca href=\u0022https:\/\/gts3.org\/\u0022 target=\u0022_blank\u0022\u003ESystems Software \u0026amp; Security Lab\u003C\/a\u003E group contributed four of them, showing their strength in the field.\u003C\/p\u003E\r\n\r\n\u003Cp\u003EThe \u003Ca href=\u0022https:\/\/sosp19.rcs.uwaterloo.ca\/program.html\u0022 target=\u0022_blank\u0022\u003EACM Symposium on Operating Systems Principles (SOSP) \u003C\/a\u003Eis the premier conference for operating systems researchers. Now in its 27\u003Csup\u003Eth\u003C\/sup\u003E year, the conference was held in Huntsville, Ontario, Canada, this year from October 27 to 30.\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026ldquo;With five accepted papers in a single year, this puts Georgia Tech as one of \u003Ca href=\u0022http:\/\/from-a-to-remzi.blogspot.com\/2013\/05\/the-systems-top-50.html\u0022 target=\u0022_blank\u0022\u003Ethe best, active research group in systems\u003C\/a\u003E,\u0026rdquo; Kim said.\u003C\/p\u003E\r\n\r\n\u003Cp\u003EGeorgia Tech papers contributed to work on file systems, including:\u003C\/p\u003E\r\n\r\n\u003Cul\u003E\r\n\t\u003Cli\u003E\u003Cem\u003E\u003Ca href=\u0022https:\/\/taesoo.kim\/pubs\/2019\/kim:hydra.pdf\u0022 target=\u0022_blank\u0022\u003EFinding Semantic Bugs in File Systems with an Extensible Fuzzing Framework\u003C\/a\u003E\u003C\/em\u003E \u003Cstrong\u003ESeulbae Kim\u003C\/strong\u003E,\u003Cstrong\u003E Meng Xu\u003C\/strong\u003E,\u003Cstrong\u003E Sanidhya Kashyap\u003C\/strong\u003E,\u003Cstrong\u003E Jungyeon Yoon\u003C\/strong\u003E,\u003Cstrong\u003E Wen Xu\u003C\/strong\u003E, and \u003Cstrong\u003ETaesoo Kim \u003C\/strong\u003E(Georgia Tech)\u003Cbr \/\u003E\r\n\t\u003Cbr \/\u003E\r\n\tSemantic bugs are some of the most notorious in file systems. Researchers present a new extensible fuzzing framework called Hydra that can find multiple bugs and ease work for the developer.\u003C\/li\u003E\r\n\u003C\/ul\u003E\r\n\r\n\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\r\n\r\n\u003Cul\u003E\r\n\t\u003Cli\u003E\u003Ca href=\u0022https:\/\/dl.acm.org\/authorize?N695042\u0022 target=\u0022_blank\u0022\u003E\u003Cem\u003EScalable and Practical Locking with Shuffling \u003C\/em\u003E\u003C\/a\u003E\u003Cbr \/\u003E\r\n\t\u003Cstrong\u003ESanidhya Kashyap\u003C\/strong\u003E(Georgia Tech), \u003Cstrong\u003EIrina Calciu \u003C\/strong\u003E(VMware Research Group), \u003Cstrong\u003EXiaohe Cheng \u003C\/strong\u003E(Hong Kong University of Science and Technology),\u003Cstrong\u003E Changwoo Min \u003C\/strong\u003E(Virginia Tech),\u003Cstrong\u003E Taesoo Kim \u003C\/strong\u003E(Georgia Tech)\u003Cbr \/\u003E\r\n\t\u003Cbr \/\u003E\r\n\tHigh-performance multicore system software is built on lock algorithms. This research identifies four performance factors in locks and offers a new technique to manage all these factors without slowing down the lock.\u003Cbr \/\u003E\r\n\t\u0026nbsp;\u003C\/li\u003E\r\n\t\u003Cli\u003E\u003Ca href=\u0022https:\/\/dl.acm.org\/authorize?N695034\u0022 target=\u0022_blank\u0022\u003E\u003Cem\u003ERecipe: Converting Concurrent DRAM Indexes to Persistent-Memory Indexes\u003C\/em\u003E\u003C\/a\u003E\u003Cbr \/\u003E\r\n\t\u003Cstrong\u003ESe Kwon Lee \u003C\/strong\u003Eand\u003Cstrong\u003E Jayashree Mohan\u003C\/strong\u003E (University of Texas at Austin), \u003Cstrong\u003ESanidhya Kashyap \u003C\/strong\u003Eand, \u003Cstrong\u003ETaesoo Kim\u003C\/strong\u003E (Georgia Tech), \u003Cstrong\u003EVijay Chidambaram\u003C\/strong\u003E (University of Texas at Austin and VMware Research)\u003Cbr \/\u003E\r\n\t\u003Cbr \/\u003E\r\n\tRecipe is an approach to convert concurrent DRAM indexes into indexes that work in crashes for persistent memory.\u003C\/li\u003E\r\n\u003C\/ul\u003E\r\n\r\n\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\r\n\r\n\u003Cul\u003E\r\n\t\u003Cli\u003E\u003Ca href=\u0022https:\/\/dl.acm.org\/authorize?N695046\u0022 target=\u0022_blank\u0022\u003E\u003Cem\u003ESplitFS: Reducing Software Overhead in File Systems for Persistent Memory\u003C\/em\u003E\u003C\/a\u003E\u003Cbr \/\u003E\r\n\t\u003Cstrong\u003ERohan Kadekodi\u003C\/strong\u003E and \u003Cstrong\u003ESe Kwon Lee\u003C\/strong\u003E (University of Texas at Austin), \u003Cstrong\u003ESanidhya Kashyap\u003C\/strong\u003E and\u0026nbsp; \u003Cstrong\u003ETaesoo Kim\u003C\/strong\u003E (Georgia Tech),\u003Cstrong\u003E Aasheesh Kolli\u003C\/strong\u003E (Penn State University and VMware Research), \u003Cstrong\u003EVijay Chidambaram\u003C\/strong\u003E (University of Texas at Austin and VMware Research)\u003Cbr \/\u003E\r\n\t\u003Cbr \/\u003E\r\n\tThis file system for persistent memory reduces software overhead by presenting a novel split between user-space library file systems and existing kernel persistent memory file systems.\u003C\/li\u003E\r\n\u003C\/ul\u003E\r\n\r\n\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\r\n\r\n\u003Cul\u003E\r\n\t\u003Cli\u003E\u003Ca href=\u0022https:\/\/dl.acm.org\/authorize?N695036\u0022 target=\u0022_blank\u0022\u003E\u003Cem\u003ELineage Stash: Fault Tolerance Off the Critical Path \u003C\/em\u003E\u003C\/a\u003E\u003Cbr \/\u003E\r\n\t\u003Cstrong\u003EStephanie Wang\u003C\/strong\u003E (UC Berkeley), \u003Cstrong\u003EJohn Liagouris\u003C\/strong\u003E (ETH Zurich), \u003Cstrong\u003ERobert Nishihara\u003C\/strong\u003E (UC Berkeley), \u003Cstrong\u003EPhilipp Moritz\u003C\/strong\u003E (UC Berkeley), \u003Cstrong\u003EUjval Misra\u003C\/strong\u003E (UC Berkeley), \u003Cstrong\u003EAlexey Tumanov\u003C\/strong\u003E (Georgia Tech), \u003Cstrong\u003EIon Stoica\u003C\/strong\u003E (UC Berkeley)\u003Cbr \/\u003E\r\n\t\u003Cbr \/\u003E\r\n\tLineage stash is a decentralized casual logging technique that helps cluster computing tolerate failures.\u003C\/li\u003E\r\n\u003C\/ul\u003E\r\n","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":[{"value":" Associate Professor Taesoo Kim\u2019s  Systems Software \u0026 Security Lab group contributed four of them, showing their strength in the field."}],"uid":"34541","created_gmt":"2019-10-31 17:58:38","changed_gmt":"2019-10-31 17:58:38","author":"Tess Malone","boilerplate_text":"","field_publication":"","field_article_url":"","dateline":{"date":"2019-10-31T00:00:00-04:00","iso_date":"2019-10-31T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"hg_media":{"628433":{"id":"628433","type":"image","title":"SOSP location","body":null,"created":"1572543469","gmt_created":"2019-10-31 17:37:49","changed":"1572543469","gmt_changed":"2019-10-31 17:37:49","alt":"Huntsville, Ontario","file":{"fid":"239335","name":"800px-Huntsville_Ontario_(31085395361).jpg","image_path":"\/sites\/default\/files\/images\/800px-Huntsville_Ontario_%2831085395361%29.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/800px-Huntsville_Ontario_%2831085395361%29.jpg","mime":"image\/jpeg","size":171974,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/800px-Huntsville_Ontario_%2831085395361%29.jpg?itok=Zb6P7wsm"}}},"media_ids":["628433"],"groups":[{"id":"50875","name":"School of Computer Science"}],"categories":[],"keywords":[],"core_research_areas":[{"id":"39541","name":"Systems"}],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cp\u003ETess Malone, Communications Officer\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Ca href=\u0022mailto:tess.malone@cc.gatech.edu\u0022\u003Etess.malone@cc.gatech.edu\u003C\/a\u003E\u003C\/p\u003E\r\n","format":"limited_html"}],"email":["tess.malone@cc.gatech.edu"],"slides":[],"orientation":[],"userdata":""}}}