default search action
Sahil Suneja
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i9]Davis Wertheimer, Joshua Rosenkranz, Thomas P. Parnell, Sahil Suneja, Pavithra Ranganathan, Raghu K. Ganti, Mudhakar Srivatsa:
Accelerating Production LLMs with Combined Token/Embedding Speculators. CoRR abs/2404.19124 (2024) - 2023
- [j3]Sahil Suneja, Yufan Zhuang, Yunhui Zheng, Jim Laredo, Alessandro Morari, Udayan Khurana:
Incorporating Signal Awareness in Source Code Modeling: An Application to Vulnerability Detection. ACM Trans. Softw. Eng. Methodol. 32(6): 145:1-145:40 (2023) - [c27]Somin Song, Sahil Suneja, Michael V. Le, Byungchul Tak:
On the Value of Sequence-Based System Call Filtering for Container Security. CLOUD 2023: 296-307 - [c26]Somin Song, Sahil Suneja, Michael V. Le, Byungchul Tak:
Sequence-based System Call Filtering for Enhanced Container Security, is it beneficial? CCGridW 2023: 278-280 - [c25]Saurabh Pujar, Luca Buratti, Xiaojie Guo, Nicolas Dupuis, Burn L. Lewis, Sahil Suneja, Atin Sood, Ganesh Nalawade, Matthew Jones, Alessandro Morari, Ruchir Puri:
Invited: Automated Code generation for Information Technology Tasks in YAML through Large Language Models. DAC 2023: 1-4 - [c24]Sahil Suneja, Yufan Zhuang, Yunhui Zheng, Jim Laredo, Alessandro Morari, Udayan Khurana:
Code Vulnerability Detection via Signal-Aware Learning. EuroS&P 2023: 506-523 - [c23]Md. Rafiqul Islam Rabin, Aftab Hussain, Sahil Suneja, Mohammad Amin Alipour:
Study of Distractors in Neural Models of Code. InteNSE@ICSE 2023: 1-7 - [i8]Md. Rafiqul Islam Rabin, Aftab Hussain, Sahil Suneja, Mohammad Amin Alipour:
Study of Distractors in Neural Models of Code. CoRR abs/2303.01739 (2023) - [i7]Saurabh Pujar, Luca Buratti, Xiaojie Guo, Nicolas Dupuis, Burn L. Lewis, Sahil Suneja, Atin Sood, Ganesh Nalawade, Matthew Jones, Alessandro Morari, Ruchir Puri:
Automated Code generation for Information Technology Tasks in YAML through Large Language Models. CoRR abs/2305.02783 (2023) - 2022
- [c22]Sunwoo Jang, Somin Song, Byungchul Tak, Sahil Suneja, Michael V. Le, Chuan Yue, Dan Williams:
SecQuant: Quantifying Container System Call Exposure. ESORICS (2) 2022: 145-166 - [c21]Yangruibo Ding, Sahil Suneja, Yunhui Zheng, Jim Laredo, Alessandro Morari, Gail E. Kaiser, Baishakhi Ray:
VELVET: a noVel Ensemble Learning approach to automatically locate VulnErable sTatements. SANER 2022: 959-970 - 2021
- [j2]Rupesh Raj Karn, Prabhakar Kudva, Hai Huang, Sahil Suneja, Ibrahim M. Elfadel:
Cryptomining Detection in Container Clouds Using System Calls and Explainable Machine Learning. IEEE Trans. Parallel Distributed Syst. 32(3): 674-691 (2021) - [c20]Sahil Suneja, Yunhui Zheng, Yufan Zhuang, Jim Alain Laredo, Alessandro Morari:
Towards Reliable AI for Source Code Understanding. SoCC 2021: 403-411 - [c19]Sahil Suneja, Yunhui Zheng, Yufan Zhuang, Jim Alain Laredo, Alessandro Morari:
Probing model signal-awareness via prediction-preserving input minimization. ESEC/SIGSOFT FSE 2021: 945-955 - [i6]Yufan Zhuang, Sahil Suneja, Veronika Thost, Giacomo Domeniconi, Alessandro Morari, Jim Laredo:
Software Vulnerability Detection via Deep Learning over Disaggregated Code Graph Representation. CoRR abs/2109.03341 (2021) - [i5]Sahil Suneja, Yufan Zhuang, Yunhui Zheng, Jim Laredo, Alessandro Morari:
Data-Driven and SE-assisted AI Model Signal-Awareness Enhancement and Introspection. CoRR abs/2111.05827 (2021) - [i4]Yangruibo Ding, Sahil Suneja, Yunhui Zheng, Jim Laredo, Alessandro Morari, Gail E. Kaiser, Baishakhi Ray:
VELVET: a noVel Ensemble Learning approach to automatically locate VulnErable sTatements. CoRR abs/2112.10893 (2021) - 2020
- [c18]Apoorve Mohan, Shripad Nadgowda, Bhautik Pipaliya, Sona Varma, Sahil Suneja, Canturk Isci, Gene Cooperman, Peter Desnoyers, Orran Krieger, Ata Turk:
Towards Non-Intrusive Software Introspection and Beyond. IC2E 2020: 173-184 - [i3]Sahil Suneja, Yunhui Zheng, Yufan Zhuang, Jim Laredo, Alessandro Morari:
Learning to map source code to software vulnerability using code-as-a-graph. CoRR abs/2006.08614 (2020) - [i2]Yunhui Zheng, Sahil Suneja, Yufan Zhuang, Alessandro Morari, Jim Laredo:
Probing Model Signal-Awareness via Prediction-Preserving Input Minimization. CoRR abs/2011.14934 (2020)
2010 – 2019
- 2019
- [c17]Tatsuhiro Chiba, Rina Nakazawa, Hiroshi Horii, Sahil Suneja, Seetharami Seelam:
ConfAdvisor: A Performance-centric Configuration Tuning Framework for Containers on Kubernetes. IC2E 2019: 168-178 - [c16]Sahil Suneja, Ali Kanso, Canturk Isci:
Can Container Fusion Be Securely Achieved? WOC@Middleware 2019: 31-36 - [i1]Sahil Suneja, Canturk Isci:
Secure Extensibility for System State Extraction via Plugin Sandboxing. CoRR abs/1905.08192 (2019) - 2018
- [c15]Shripad Nadgowda, Sahil Suneja, Canturk Isci:
RECap: Run-Escape Capsule for On-demand Managed Service Delivery in the Cloud. HotCloud 2018 - [c14]Byung-Chul Tak, Hyekyung Kim, Sahil Suneja, Canturk Isci, Prabhakar Kudva:
Security Analysis of Container Images Using Cloud Analytics Framework. ICWS 2018: 116-133 - 2017
- [c13]Shripad Nadgowda, Sahil Suneja, Canturk Isci:
Paracloud: Bringing Application Insight into Cloud Operations. HotCloud 2017 - [c12]Shripad Nadgowda, Sahil Suneja, Ali Kanso:
Comparing Scaling Methods for Linux Containers. IC2E 2017: 266-272 - [c11]Shripad Nadgowda, Sahil Suneja, Nilton Bila, Canturk Isci:
Voyager: Complete Container State Migration. ICDCS 2017: 2137-2142 - [c10]Salman Baset, Sahil Suneja, Nilton Bila, Ozan Tuncer, Canturk Isci:
Usable declarative configuration specification and validation for applications, systems, and cloud. Middleware Industry 2017: 29-35 - [c9]Fábio Oliveira, Sahil Suneja, Shripad Nadgowda, Priya Nagpurkar, Canturk Isci:
Opvis: extensible, cross-platform operational visibility and analytics for cloud. Middleware Industry 2017: 43-49 - [c8]Sahil Suneja, Ricardo Koller, Canturk Isci, Eyal de Lara, Ali B. Hashemi, Arnamoy Bhattacharyya, Cristiana Amza:
Safe Inspection of Live Virtual Machines. VEE 2017: 97-111 - 2016
- [b1]Sahil Suneja:
Non-intrusive Virtual Systems Monitoring. University of Toronto, Canada, 2016 - [j1]Sahil Suneja, Canturk Isci, Ricardo Koller, Eyal de Lara:
Touchless and always-on cloud analytics as a service. IBM J. Res. Dev. 60(2-3) (2016) - 2015
- [c7]Patrick Colp, Jiawen Zhang, James Gleeson, Sahil Suneja, Eyal de Lara, Himanshu Raj, Stefan Saroiu, Alec Wolman:
Protecting Data on Smartphones and Tablets from Memory Attacks. ASPLOS 2015: 177-189 - [c6]Ricardo Koller, Canturk Isci, Sahil Suneja, Eyal de Lara:
Unified Monitoring and Analytics in the Cloud. HotCloud 2015 - [c5]Sahil Suneja, Canturk Isci, Eyal de Lara, Vasanth Bala:
Exploring VM Introspection: Techniques and Trade-offs. VEE 2015: 133-146 - 2014
- [c4]Junji Zhi, Sahil Suneja, Eyal de Lara:
The Case for System Testing with Swift Hierarchical VM Fork. HotCloud 2014 - [c3]Sahil Suneja, Canturk Isci, Vasanth Bala, Eyal de Lara, Todd W. Mummert:
Non-intrusive, out-of-band and out-of-the-box systems monitoring in the cloud. SIGMETRICS 2014: 249-261 - 2013
- [c2]Sahil Suneja, Vishnu Navda, Ramachandran Ramjee, Eyal de Lara:
EnVi: energy efficient video player for mobiles. CellNet@MobiSys 2013: 25-30 - 2011
- [c1]Sahil Suneja, Elliott Baron, Ryan Johnson:
Accelerating the Cloud with Heterogeneous Computing. HotCloud 2011
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-19 21:00 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint