{"id":2761,"date":"2018-06-14T18:21:46","date_gmt":"2018-06-14T16:21:46","guid":{"rendered":"https:\/\/www.betriebssysteme.org\/?page_id=2761"},"modified":"2018-12-10T16:30:42","modified_gmt":"2018-12-10T15:30:42","slug":"programm","status":"publish","type":"page","link":"https:\/\/www.betriebssysteme.org\/aktivitaeten\/treffen\/2018-coburg\/programm\/","title":{"rendered":"Programm"},"content":{"rendered":"
\n
\n\t\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
<\/td>\n<\/td>\n\n

Donnerstag, 18. Oktober 2018<\/strong><\/h3>\n<\/td>\n<\/tr>\n

13:00-13:15<\/td>\n<\/td>\nWelcome und Begr\u00fc\u00dfung<\/td>\n<\/tr>\n
<\/td>\n<\/td>\nSession 1: Performance, Befehlssatzerweiterungen und Echtzeit<\/em><\/strong><\/td>\n<\/tr>\n
13:15-13:40<\/td>\nAbstract <\/i><\/a>
\n

\n
Folien <\/i><\/a><\/td>\n
Mathias Gottschlag and Frank Bellosa (KIT)
\nMitigating AVX-Induced Performance Variability with Core Specialization<\/td>\n<\/tr>\n
13:40-14:05<\/td>\nAbstract <\/i><\/a>
\n
\n
Folien <\/i><\/a>\n<\/td>\n
Marc Rittinghaus and Frank Bellosa (KIT)
\nFast and Accurate Functional Simulation for Dynamic Full System Analysis<\/td>\n<\/tr>\n
14:05-14:30<\/td>\nAbstract <\/i><\/a>
\n
\n
Folien <\/i><\/a>\n<\/td>\n
Manuel Nieke and R\u00fcdiger Kapitza (TU Braunschweig)
\nA Trusted Reimbursed Computing System based on WebAssembly and Intel SGX<\/td>\n<\/tr>\n
14:30-14:55<\/td>\nAbstract <\/i><\/a>
\n
\n
Folien <\/i><\/a>\n<\/td>\n
Malte Bargholz, Matthias Wolf, Gerion Entrup, Christian Dietrich and Daniel Lohmann (Uni Hannover)
\nInterSloth: Hardwaregest\u00fctzte, globale und priorit\u00e4tsgesteuerte Echtzeiteinplanung<\/td>\n<\/tr>\n
14:55-15:15<\/td>\n<\/td>\nPause<\/em><\/td>\n<\/tr>\n
<\/td>\n<\/td>\nSession 2: Deep Kernel<\/em><\/strong><\/td>\n<\/tr>\n
15:15-15:40<\/td>\nAbstract <\/i><\/a>
\n
\n
Folien <\/i><\/a>\n<\/td>\n
Martin Richter (TU Chemnitz)
\nMobilit\u00e4t und Verteiltheit in Barrelfish<\/td>\n<\/tr>\n
15:40-16:05<\/td>\nAbstract <\/i><\/a>
\n
\n
Folien <\/i><\/a>\n<\/td>\n
Christian Dietrich and Daniel Lohmann (Uni Hannover)
\nSemi-Extended Tasks: Geteilter Stack f\u00fcr selbstblockierende F\u00e4den<\/td>\n<\/tr>\n
16:05-16:30<\/td>\nAbstract <\/i><\/a>\n<\/td>\nAlexander Lochmann, Horst Schirmeier, Hendrik Borghorst and Olaf Spinczyk (TU Dortmund)
\nLockDoc: Trace-basierte Lock-Analyse im Linux-Kernel<\/td>\n<\/tr>\n
16:30-16:50<\/td>\n<\/td>\nPause<\/em><\/td>\n<\/tr>\n
<\/td>\n<\/td>\nSession 3<\/strong>
\n<\/em><\/td>\n<\/tr>\n
16:50-17:00<\/td>\n<\/td>\nVorstellung des Barkhausen-Instituts<\/a> (Dresden)<\/td>\n<\/tr>\n
17:00-17:30<\/td>\n\nFolien <\/i> <\/a>\n<\/td>\nVerleihung des Absolventenpreises und Vortrag des Preistr\u00e4gers<\/td>\n<\/tr>\n
17:30-18:00<\/td>\n<\/td>\nOrganisatorisches \/ Sitzung der Fachgruppe<\/td>\n<\/tr>\n
<\/td>\n<\/td>\nAbendprogramm<\/strong><\/em><\/td>\n<\/tr>\n
ab 19:00<\/td>\n<\/td>\nEin Abend im CREAPOLIS Makerspace<\/a> (f\u00fcr Verpflegung ist gesorgt)<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
<\/td>\n<\/td>\n\n

Freitag, 19. Oktober 2018<\/strong><\/h3>\n<\/td>\n<\/tr>\n

<\/td>\n<\/td>\nSession 4: Meltdown, Spectre & Co.<\/em><\/strong><\/td>\n<\/tr>\n
08:45-09:10<\/td>\nAbstract <\/i><\/a>\n<\/td>\nBj\u00f6rn D\u00f6bel (Amazon)<\/del>
\nTales from the Machine Room - Hypervisor Security in the World's Largest Cloud Infrastructure<\/del><\/td>\n<\/tr>\n
09:10-09:35<\/td>\nPaper <\/i><\/a>
\n
\n
Folien <\/i> <\/a>\n<\/td>\n
Jonas Depoix and Philipp Altmeyer (Hochschule Rhein-Main)
\nDetecting Spectre Attacks by identifying Cache Side-Channel Attacks using Machine Learning<\/td>\n<\/tr>\n
09:35-10:00<\/td>\nAbstract <\/i><\/a><\/td>\nHorst Schirmeier (TU Dortmund)
\nRevisiting OS Multi-Calls in the Light of Meltdown and KPTI<\/td>\n<\/tr>\n
10:00-10:25<\/td>\nAbstract <\/i><\/a>
\n
\n
Folien <\/i> <\/a>\n<\/td>\n
Benjamin Taubmann and Hans P. Reiser (Uni Passau)
\nBringing Memory Forensics and Virtual Machine Introspection to Production Environments<\/td>\n<\/tr>\n
10:25-10:40<\/td>\n<\/td>\nPause<\/em><\/td>\n<\/tr>\n
<\/td>\n<\/td>\nSession 5: Policies und Daten<\/strong><\/em><\/td>\n<\/tr>\n
10:40-11:05<\/td>\nAbstract <\/i><\/a>
\n
\n
Folien <\/i> <\/a>\n<\/td>\n
Peter Amthor (TU Ilmenau)
\nModellierung und formale Analyse von Betriebssystem-Sicherheitspolitiken<\/td>\n<\/tr>\n
11:05-11:30<\/td>\nAbstract <\/i><\/a><\/td>\nMarius Schlegel (TU Ilmenau)
\nBetriebssystemunterst\u00fctzung f\u00fcr applikationsspezifische Sicherheitspolitiken<\/td>\n<\/tr>\n
11:30-11:55<\/td>\nAbstract <\/i><\/a>
\n
\n
Folien <\/i><\/a>\n<\/td>\n
Felix Lange, Kim-Thomas Rehmann and Helge Deller (SAP)
\nEvaluation of Mandatory Access Control for Database Management Systems on the Linux Platform<\/td>\n<\/tr>\n
11:55-12:10<\/td>\nAbstract <\/i><\/a><\/td>\nAlexander Wollheim (HS Coburg) *short talk*
\nData Encryption im Mainframebereich (z\/OS) - am Beispiel von Data Set Encryption und Encryption im Db2<\/td>\n<\/tr>\n
12:10-12:25<\/td>\nAbstract <\/i><\/a>\n<\/td>\nTimo H\u00f6nig, Christopher Eibel, Adam Wagenha\u00fcser, Maximilian Wagner, Wolfgang Schr\u00f6der-Preikschat (FAU)
\nMehr ist mehr: Ausnutzung schwankender Strompreise mittels \"Albatross\", einem Laufzeitsystem f\u00fcr heterogene HPC-Cluster<\/td>\n<\/tr>\n
ab 12:25<\/td>\n<\/td>\nVerabschiedung
\nGelegenheit zum gemeinsamen Mitagessen in der Mensa<\/td>\n<\/tr>\n
<\/td>\n<\/td>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"

Donnerstag, 18. Oktober 2018 13:00-13:15 Welcome und Begr\u00fc\u00dfung Session 1: Performance, Befehlssatzerweiterungen und Echtzeit 13:15-13:40 Abstract Folien Mathias Gottschlag and Frank Bellosa (KIT) Mitigating AVX-Induced Performance Variability with Core Specialization 13:40-14:05 Abstract Folien Marc Rittinghaus and Frank Bellosa (KIT) Fast and Accurate Functional Simulation for Dynamic Full System Analysis 14:05-14:30 Abstract Folien Manuel Nieke and […]<\/p>\n","protected":false},"author":21,"featured_media":0,"parent":2747,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-2761","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.betriebssysteme.org\/wp-json\/wp\/v2\/pages\/2761","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.betriebssysteme.org\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.betriebssysteme.org\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.betriebssysteme.org\/wp-json\/wp\/v2\/users\/21"}],"replies":[{"embeddable":true,"href":"https:\/\/www.betriebssysteme.org\/wp-json\/wp\/v2\/comments?post=2761"}],"version-history":[{"count":17,"href":"https:\/\/www.betriebssysteme.org\/wp-json\/wp\/v2\/pages\/2761\/revisions"}],"predecessor-version":[{"id":3435,"href":"https:\/\/www.betriebssysteme.org\/wp-json\/wp\/v2\/pages\/2761\/revisions\/3435"}],"up":[{"embeddable":true,"href":"https:\/\/www.betriebssysteme.org\/wp-json\/wp\/v2\/pages\/2747"}],"wp:attachment":[{"href":"https:\/\/www.betriebssysteme.org\/wp-json\/wp\/v2\/media?parent=2761"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}