Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleSeptember 2024
SmartNIC-Enabled Live Migration for Storage-Optimized VMs
- Jiechen Zhao,
- Ran Shu,
- Lei Qu,
- Ziyue Yang,
- Natalie Enright Jerger,
- Derek Chiou,
- Peng Cheng,
- Yongqiang Xiong
APSys '24: Proceedings of the 15th ACM SIGOPS Asia-Pacific Workshop on SystemsPages 45–52https://doi.org/10.1145/3678015.3680487Cloud providers offer storage-optimized VMs equipped with locally attached storage to meet the high performance requirements of cloud users. However, current cloud providers cannot enable live migration for storage-optimized VMs due to the high resource ...
- research-articleMay 2022
XANDAR: exploiting the x-by-construction paradigm in model-based development of safety-critical systems
- Leonard Masing,
- Tobias Dörr,
- Florian Schade,
- Juergen Becker,
- Georgios Keramidas,
- Christos P. Antonopoulos,
- Michail Mavropoulos,
- Efstratios Tiganourias,
- Vasilios Kelefouras,
- Konstantinos Antonopoulos,
- Nikolaos Voros,
- Umut Durak,
- Alexander Ahlbrecht,
- Wanja Zaeske,
- Christos Panagiotou,
- Dimitris Karadimas,
- Nico Adler,
- Andreas Sailer,
- Raphael Weber,
- Thomas Wilhelm,
- Geza Nemeth,
- Fahad Siddiqui,
- Rafiullah Khan,
- Vahid Garousi,
- Sakir Sezer,
- Victor Morales
DATE '22: Proceedings of the 2022 Conference & Exhibition on Design, Automation & Test in EuropePages 814–818Realizing desired properties "by construction" is a highly appealing goal in the design of safety-critical embedded systems. As verification and validation tasks in this domain are often both challenging and time-consuming, the by-construction paradigm ...
- research-articleOctober 2021
Formal Verification of a Multiprocessor Hypervisor on Arm Relaxed Memory Hardware
SOSP '21: Proceedings of the ACM SIGOPS 28th Symposium on Operating Systems PrinciplesPages 866–881https://doi.org/10.1145/3477132.3483560Concurrent systems software is widely-used, complex, and error-prone, posing a significant security risk. We introduce VRM, a new framework that makes it possible for the first time to verify concurrent systems software, such as operating systems and ...
Optimizing Nested Virtualization Performance Using Direct Virtual Hardware
ASPLOS '20: Proceedings of the Twenty-Fifth International Conference on Architectural Support for Programming Languages and Operating SystemsPages 557–574https://doi.org/10.1145/3373376.3378467Nested virtualization, running virtual machines and hypervisors on top of other virtual machines and hypervisors, is increasingly important because of the need to deploy virtual machines running software stacks on top of virtualized cloud ...
- research-articleDecember 2019
HyperBench: A Benchmark Suite for Virtualization Capabilities
ACM SIGMETRICS Performance Evaluation Review (SIGMETRICS), Volume 47, Issue 1Pages 73–74https://doi.org/10.1145/3376930.3376977Virtualization is ubiquitous in modern data centers. By deploying applications on separate virtual machines hosted in a shared physical machine, it brings benefits over traditional systems in resources utilization[5, 10], system security[2, 3], and ...
-
- extended-abstractJune 2019
HyperBench: A Benchmark Suite for Virtualization Capabilities
SIGMETRICS '19: Abstracts of the 2019 SIGMETRICS/Performance Joint International Conference on Measurement and Modeling of Computer SystemsPages 73–74https://doi.org/10.1145/3309697.3331478Virtualization is becoming increasingly common in data centers due to its various advantages. However, how to choose among different platforms, including both software and hardware, is a considerable challenge. In this context, evaluating the ...
- research-articleJune 2019
HyperBench: A Benchmark Suite for Virtualization Capabilities
Proceedings of the ACM on Measurement and Analysis of Computing Systems (POMACS), Volume 3, Issue 2Article No.: 24, Pages 1–22https://doi.org/10.1145/3341617.3326138Virtualization is becoming increasingly common in data centers due to its various advantages. However, how to choose among different platforms, including both software and hardware, is a considerable challenge. In this context, evaluating the ...
- research-articleApril 2019
Secure guest virtual machine support in apparition
VEE 2019: Proceedings of the 15th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution EnvironmentsPages 17–30https://doi.org/10.1145/3313808.3313809Recent research utilizing Secure Virtual Architecture (SVA) has demonstrated that compiler-based virtual machines can protect applications from side-channel attacks launched by compromised operating system kernels. However, SVA provides no instructions ...
- research-articleFebruary 2019
A Hypervisor-Based Privacy Agent for Mobile and IoT Systems
HotMobile '19: Proceedings of the 20th International Workshop on Mobile Computing Systems and ApplicationsPages 21–26https://doi.org/10.1145/3301293.3302356We present a design for a mobile and IoT data privacy agent that lives in software on end devices. Our privacy agent learns and enforces a user's privacy policy across all devices that he manages. Implemented as a hypervisor onboard the end device, our ...
- short-paperMarch 2018
Characterizing the Performance of Concurrent Virtualized Network Functions with OVS-DPDK, FD.IO VPP and SR-IOV
ICPE '18: Proceedings of the 2018 ACM/SPEC International Conference on Performance EngineeringPages 285–292https://doi.org/10.1145/3184407.3184437The virtualization of network functions is promising significant cost reductions for network operators. Running multiple network functions on a standard x86 server instead of dedicated appliances can increase the utilization of the underlying hardware,...
- research-articleOctober 2017
NEVE: Nested Virtualization Extensions for ARM
SOSP '17: Proceedings of the 26th Symposium on Operating Systems PrinciplesPages 201–217https://doi.org/10.1145/3132747.3132754Nested virtualization, the ability to run a virtual machine inside another virtual machine, is increasingly important because of the need to deploy virtual machines running software stacks on top of virtualized cloud infrastructure. As ARM servers make ...
- research-articleJune 2016
ARM virtualization: performance and architectural implications
ISCA '16: Proceedings of the 43rd International Symposium on Computer ArchitecturePages 304–316https://doi.org/10.1109/ISCA.2016.35ARM servers are becoming increasingly common, making server technologies such as virtualization for ARM of growing importance. We present the first study of ARM virtualization performance on server hardware, including multicore measurements of two ...
Also Published in:
ACM SIGARCH Computer Architecture News: Volume 44 Issue 3 - research-articleMay 2016
vSIP: virtual scheduler for interactive performance
CF '16: Proceedings of the ACM International Conference on Computing FrontiersPages 222–231https://doi.org/10.1145/2903150.2903178This paper presents vSIP, a new scheme of virtual desktop disk scheduling on sharing storage system for user-interactive performance. The proposed scheme enables requests to be dynamically prioritized based on the interactive feature of applications ...
- ArticleJune 2015
A Survey on the Security of Hypervisors in Cloud Computing
ICDCSW '15: Proceedings of the 2015 IEEE 35th International Conference on Distributed Computing Systems WorkshopsPages 100–104https://doi.org/10.1109/ICDCSW.2015.28This survey paper focuses on the security of hyper visors in the cloud. Topics covered in this paper include attacks that allow a malicious virtual machine (VM) to compromise the hyper visor, as well as techniques used by malicious VMs to steal more ...
- research-articleMay 2015
Fault Injection in Virtualized Systems—Challenges and Applications
IEEE Transactions on Dependable and Secure Computing (TDSC), Volume 12, Issue 3Pages 284–297https://doi.org/10.1109/TDSC.2014.2334300We analyze the interaction between system virtualization and fault injection: (i) use of virtualization to facilitate fault injection into non-virtualized systems, and (ii) use of fault injection to evaluate the dependability of virtualized systems. We ...
- ArticleDecember 2014
ADvisor: A Hypervisor for Displaying Images on a Desktop
CANDAR '14: Proceedings of the 2014 Second International Symposium on Computing and NetworkingPages 412–418https://doi.org/10.1109/CANDAR.2014.43There are various mechanisms for displaying images on desktops to attract users' attention. These include pop-up window dialogs, banner images in Web browsers, and balloon-like taskbar notifications. However, these mechanisms have some limitations. ...
- research-articleFebruary 2014
KVM/ARM: the design and implementation of the linux ARM hypervisor
ASPLOS '14: Proceedings of the 19th international conference on Architectural support for programming languages and operating systemsPages 333–348https://doi.org/10.1145/2541940.2541946As ARM CPUs become increasingly common in mobile devices and servers, there is a growing demand for providing the benefits of virtualization for ARM-based devices. We present our experiences building the Linux ARM hypervisor, KVM/ARM, the first full ...
Also Published in:
ACM SIGPLAN Notices: Volume 49 Issue 4ACM SIGARCH Computer Architecture News: Volume 42 Issue 1 - research-articleSeptember 2013
Secure RPC in embedded systems: evaluation of some GlobalPlatform implementation alternatives
WESS '13: Proceedings of the Workshop on Embedded Systems SecurityArticle No.: 4, Pages 1–7https://doi.org/10.1145/2527317.2527321In secure computing systems, isolation between different components is normally the basis for security. However, absolute isolation is seldom desired nor practical. Often for the system to function, a secure communication channel between otherwise ...
- ArticleJune 2013
Performance Overhead among Three Hypervisors: An Experimental Study Using Hadoop Benchmarks
BIGDATACONGRESS '13: Proceedings of the 2013 IEEE International Congress on Big DataPages 9–16https://doi.org/10.1109/BigData.Congress.2013.11Hyper visors are widely used in cloud environments and their impact on application performance has been a topic of significant research and practical interest. We conducted experimental measurements of several benchmarks using Hadoop MapReduce to ...
- research-articleNovember 2012
Bringing Virtualization to the x86 Architecture with the Original VMware Workstation
ACM Transactions on Computer Systems (TOCS), Volume 30, Issue 4Article No.: 12, Pages 1–51https://doi.org/10.1145/2382553.2382554This article describes the historical context, technical challenges, and main implementation techniques used by VMware Workstation to bring virtualization to the x86 architecture in 1999. Although virtual machine monitors (VMMs) had been around for ...