Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleDecember 2024
Confidential VMs Explained: An Empirical Analysis of AMD SEV-SNP and Intel TDX
Proceedings of the ACM on Measurement and Analysis of Computing Systems (POMACS), Volume 8, Issue 3Article No.: 36, Pages 1–42https://doi.org/10.1145/3700418Confidential computing is gaining traction in the cloud, driven by the increasing security and privacy concerns across various industries. Recent trusted hardware advancements introduce Confidential Virtual Machines (CVMs) to alleviate the ...
Gramine-TDX: A Lightweight OS Kernel for Confidential VMs
CCS '24: Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications SecurityPages 4598–4612https://doi.org/10.1145/3658644.3690323While Confidential Virtual Machines (CVMs) have emerged as a prominent way for hardware-assisted confidential computing, their primary usage is not suitable for small, specialized, security-critical workloads, i.e., legacy VMs with their conventional OS ...
- research-articleNovember 2024
uIO: Lightweight and Extensible Unikernels
SoCC '24: Proceedings of the 2024 ACM Symposium on Cloud ComputingPages 580–599https://doi.org/10.1145/3698038.3698518Unikernels specialize operating systems by tailoring the kernel for a specific application at compile time. While the specialized library OS approach provides a smaller OS image-thus improving the bootup process, performance, migration costs, and ...
Toast: A Heterogeneous Memory Management System
PACT '24: Proceedings of the 2024 International Conference on Parallel Architectures and Compilation TechniquesPages 53–65https://doi.org/10.1145/3656019.3676944Modern applications employ several heterogeneous memory types for improved performance, security, and reliability. To manage them, programmers must currently digress from the traditional load/store interface and rely on various custom libraries specific ...
- research-articleSeptember 2024
IndiLog: Bridging Scalability and Performance in Stateful Serverless Computing with Shared Logs
SYSTOR '24: Proceedings of the 17th ACM International Systems and Storage ConferencePages 1–13https://doi.org/10.1145/3688351.3689159State management has long been a challenge for serverless applications. Owing to their failure resilience and consistency guarantees, distributed shared logs have been recently proposed as a promising storage substrate enabling stateful serverless ...
-
- research-articleJuly 2024
vFPIO: a virtual I/O abstraction for FPGA-accelerated I/O devices
USENIX ATC'24: Proceedings of the 2024 USENIX Conference on Usenix Annual Technical ConferenceArticle No.: 71, Pages 1167–1184Modern cloud systems have adopted a variety of FPGA-accelerated I/O devices, such as SmartNICs and computational storage, while they face programmability and portability challenges. Existing FPGA frameworks either directly expose device-specific I/O ...
- research-articleDecember 2023
Anchor: A Library for Building Secure Persistent Memory Systems
Proceedings of the ACM on Management of Data (PACMMOD), Volume 1, Issue 4Article No.: 231, Pages 1–31https://doi.org/10.1145/3626718Cloud infrastructure is experiencing a shift towards disaggregated setups, especially with the introduction of the Compute Express Link (CXL) technology, where byte-addressable ersistent memory (PM) is becoming prominent. To fully utilize the potential ...
- research-articleOctober 2023
Capacity planning for dependable services
AbstractFault-tolerance techniques depend on replication to enhance availability, albeit at the cost of increased infrastructure costs. This results in a fundamental trade-off: Fault-tolerant services must satisfy given availability and performance ...
- research-articleAugust 2023
Trusted Heterogeneous Disaggregated Architectures
APSys '23: Proceedings of the 14th ACM SIGOPS Asia-Pacific Workshop on SystemsPages 72–79https://doi.org/10.1145/3609510.3609812The rising performance demands and increasing heterogeneity in cloud data centers lead to a paradigm shift in the cloud infrastructure, from monolithic servers to a disaggregated architecture. In a multi-tenant cloud, users should be able to leverage ...
- research-articleAugust 2023
FlexLog: A Shared Log for Stateful Serverless Computing
HPDC '23: Proceedings of the 32nd International Symposium on High-Performance Parallel and Distributed ComputingPages 195–209https://doi.org/10.1145/3588195.3592993Stateful serverless applications need to persist their state and data. The existing approach is to store the data in general purpose storage systems. However, these approaches are not designed to meet the demands of serverless applications in terms of ...
- research-articleDecember 2022
Risotto: A Dynamic Binary Translator for Weak Memory Model Architectures
- Redha Gouicem,
- Dennis Sprokholt,
- Jasper Ruehl,
- Rodrigo C. O. Rocha,
- Tom Spink,
- Soham Chakraborty,
- Pramod Bhatotia
ASPLOS 2023: Proceedings of the 28th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 1Pages 107–122https://doi.org/10.1145/3567955.3567962Dynamic Binary Translation (DBT) is a powerful approach to support cross-architecture emulation of unmodified binaries. However, DBT systems face correctness and performance challenges, when emulating concurrent binaries from strong to weak memory ...
- ArticleNovember 2022
Capacity Planning for Dependable Services
Stabilization, Safety, and Security of Distributed SystemsPages 222–238https://doi.org/10.1007/978-3-031-21017-4_15AbstractFault-tolerance techniques depend on replication to enhance availability, albeit at the cost of increased infrastructure costs. This results in a fundamental trade-off: Fault-tolerant services must satisfy given availability and performance ...
Secure and Policy-Compliant Query Processing on Heterogeneous Computational Storage Architectures
SIGMOD '22: Proceedings of the 2022 International Conference on Management of DataPages 1462–1477https://doi.org/10.1145/3514221.3517913Computation Storage Architectures (CSA) are increasingly adopted in the cloud for near data processing, where the underlying storage devices/servers are now equipped with heterogeneous cores which enable computation offloading near to the data. While CSA ...
Lasagne: a static binary translator for weak memory model architectures
- Rodrigo C. O. Rocha,
- Dennis Sprokholt,
- Martin Fink,
- Redha Gouicem,
- Tom Spink,
- Soham Chakraborty,
- Pramod Bhatotia
PLDI 2022: Proceedings of the 43rd ACM SIGPLAN International Conference on Programming Language Design and ImplementationPages 888–902https://doi.org/10.1145/3519939.3523719The emergence of new architectures create a recurring challenge to ensure that existing programs still work on them. Manually porting legacy code is often impractical. Static binary translation (SBT) is a process where a program’s binary is ...
- research-articleMay 2022
Loop rolling for code size reduction
CGO '22: Proceedings of the 20th IEEE/ACM International Symposium on Code Generation and OptimizationPages 217–229https://doi.org/10.1109/CGO53902.2022.9741256Code size is critical for resource-constrained devices, where memory and storage are limited. Compilers, therefore, should offer optimizations aimed at code reduction. One such optimization is loop rerolling, which transforms a partially unrolled loop ...
- research-articleMarch 2022
VMSH: hypervisor-agnostic guest overlays for VMs
EuroSys '22: Proceedings of the Seventeenth European Conference on Computer SystemsPages 678–696https://doi.org/10.1145/3492321.3519589Lightweight virtual machines (VMs) are prominently adopted for improved performance and dependability in cloud environments. To reduce boot up times and resource utilisation, they are usually "pre-baked" with only the minimal kernel and userland ...
- research-articleMarch 2022
SafePM: a sanitizer for persistent memory
EuroSys '22: Proceedings of the Seventeenth European Conference on Computer SystemsPages 506–524https://doi.org/10.1145/3492321.3519574Memory safety violation is a major root cause of reliability and security issues in software systems. Byte-addressable persistent memory (PM), just like its volatile counterpart, is also susceptible to memory safety violations. While there is a couple ...
Execution reconstruction: harnessing failure reoccurrences for failure reproduction
PLDI 2021: Proceedings of the 42nd ACM SIGPLAN International Conference on Programming Language Design and ImplementationPages 1155–1170https://doi.org/10.1145/3453483.3454101Reproducing production failures is crucial for software reliability. Alas, existing bug reproduction approaches are not suitable for production systems because they are not simultaneously efficient, effective, and accurate. In this work, we survey prior ...
- research-articleApril 2021
rkt-io: a direct I/O stack for shielded execution
EuroSys '21: Proceedings of the Sixteenth European Conference on Computer SystemsPages 490–506https://doi.org/10.1145/3447786.3456255The shielding of applications using trusted execution environments (TEEs) can provide strong security guarantees in untrusted cloud environments. When executing I/O operations, today's shielded execution frameworks, however, exhibit performance and ...