Daredevil: Rescue Your Flash Storage from Inflexible Kernel Storage Stack
Published in In the Proceedings of the Twentieth European Conference on Computer Systems (EuroSys 25), 2025
Published in In the Proceedings of the Twentieth European Conference on Computer Systems (EuroSys 25), 2025
Published in In the proceedings of The 32nd Network and Distributed System Security Symposium (NDSS 25), 2025
Published in In the proceedings of 33rd USENIX Security Symposium (SEC 24), 2024
Published in In the proceedings of The 31st Network and Distributed System Security Symposium (NDSS 24), 2024
Published in In the proceedings of 2024 IEEE Symposium on Security and Privacy (SP 24), 2024
Published in In the proceedings of Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 23), 2023
Published in In the proceedings of Proceedings of the 38th Annual Computer Security Applications Conference (ACSAC 22), 2022
Published in In the proceedings of Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security (CCS 20), 2020
Published in In the proceedings of Proceedings of the 28th USENIX Conference on Security Symposium (SEC 19), 2019
Published in In the proceedings of Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (CCS 18), 2018
Published in In the proceedings of 2018 IEEE Symposium on Security and Privacy (SP 18), 2018
Published in In the proceedings of 27th USENIX Security Symposium (SEC 18), 2018
Published in In the proceedings of 2017 IEEE Symposium on Security and Privacy (SP 17), 2017
Published in In the proceedings of 26th USENIX Security Symposium (SEC 17), 2017
Published in In the proceedings of 2016 IEEE 23rd International Conference on Software Analysis, Evolution, and Reengineering (SANER), 2016
Published in In the proceedings of 2015 IEEE 23rd International Symposium on Quality of Service (IWQoS), 2015
Published in In the proceedings of Proceedings of the 30th Annual Computer Security Applications Conference (ACSAC 14), 2014
Published in In the proceedings of 2014 IEEE 22nd International Conference on Network Protocols, 2014
Published in In the proceedings of 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 14), 2014
Published in IEEE Transactions on Software Engineering (TOSE 24), 2024
Published in IEEE Transactions on Information Forensics and Security (TIFS 19), 2019
Published in IEEE Transactions on Software Engineering (TOSE 18), 2018
Published in ACM Comput. Surv., 2016
Published in IEEE Micro, 2015
Published in Computer, 2014