Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleMarch 2024
Verifiable Sustainability in Data Centers
- Syed Rafiul Hussain,
- Patrick McDaniel,
- Anshul Gandhi,
- Kanad Ghose,
- Kartik Gopalan,
- Dongyoon Lee,
- Yu David Liu,
- Zhenhua Liu,
- Shuai Mu,
- Erez Zadok
IEEE Security and Privacy (IEEE-SEC-PRIVACY), Volume 22, Issue 6Pages 62–74https://doi.org/10.1109/MSEC.2024.3372488The current techniques and tools for collecting, aggregating, and reporting verifiable sustainability data are vulnerable to cyberattacks and misuse, requiring new security and privacy-preserving solutions. This article outlines security challenges and ...
- research-articleAugust 2024
Template-Aware Live Migration of Virtual Machines
SEC '23: Proceedings of the Eighth ACM/IEEE Symposium on Edge ComputingPages 336–340https://doi.org/10.1145/3583740.3626812One of the key challenges of edge computing is working with a limited amount of resources available at the edge, especially memory and bandwidth. Virtual Machine (VM) Templating is a technique to start multiple VM instances quickly from a shared pre-...
- research-articleOctober 2023
Metrics for Sustainability in Data Centers
- Anshul Gandhi,
- Dongyoon Lee,
- Zhenhua Liu,
- Shuai Mu,
- Erez Zadok,
- Kanad Ghose,
- Kartik Gopalan,
- Yu David Liu,
- Syed Rafiul Hussain,
- Patrick Mcdaniel
ACM SIGEnergy Energy Informatics Review (SIGENERGY-EIR), Volume 3, Issue 3Pages 40–46https://doi.org/10.1145/3630614.3630622Despite several calls from the community for improving the sustainability of computing, sufficient progress is yet to be made on one of the key prerequisites of sustainable computing---the ability to define and measure computing sustainability ...
- research-articleMarch 2020
Directvisor: virtualization for bare-metal cloud
VEE '20: Proceedings of the 16th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution EnvironmentsPages 45–58https://doi.org/10.1145/3381052.3381317Bare-metal cloud platforms allow customers to rent remote physical servers and install their preferred operating systems and software to make the best of servers' raw hardware capabilities. However, this quest for bare-metal performance compromises ...
- doctoral_thesisJanuary 2020
High-Performance Parallel Discrete Event Simulation on Knights Landing Processors
AbstractIn this dissertation, we investigate the performance of Parallel Discrete Event Simulation (PDES) systems on Intel Knights Landing (KNL) processors and their clusters. The dissertation makes several contributions. First, we present a comprehensive ...
-
- doctoral_thesisJanuary 2020
Emulation-Based Security Assessment of 4G/LTE Mobile Communication Systems
AbstractThe proliferation of 4G/LTE (Long Term Evolution) technique for cellular network calls for new methods and tools for assessing its resilience and vulnerabilities effectively and efficiently. Existing methods focus their works on ad-hoc attacks and ...
- research-articleApril 2019
Live Migration Ate My VM: Recovering a Virtual Machine after Failure of Post-Copy Live Migration
IEEE INFOCOM 2019 - IEEE Conference on Computer CommunicationsPages 343–351https://doi.org/10.1109/INFOCOM.2019.8737452Post-copy is one of the two key techniques (besides pre-copy) for live migration of virtual machines in data centers. Post-copy provides deterministic total migration time and low downtime for write-intensive VMs. However, if post-copy migration fails for ...
- research-articleApril 2019
Fast and live hypervisor replacement
VEE 2019: Proceedings of the 15th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution EnvironmentsPages 45–58https://doi.org/10.1145/3313808.3313821Hypervisors are increasingly complex and must be often updated for applying security patches, bug fixes, and feature upgrades. However, in a virtualized cloud infrastructure, updates to an operational hypervisor can be highly disruptive. Before being ...
- doctoral_thesisJanuary 2019
Smart Public Safety as an Edge Service: A Lightweight Video Processing and Online Decision Making Approach
AbstractThis document presents a unique approach to automation of human surveillance systems using light weight and decentralized methods. The solution may be used as a whole for future expansion or as parts (services) for development purposes. ...
- research-articleSeptember 2017
HyperFresh: Live Refresh of Hypervisors Using Nested Virtualization
APSys '17: Proceedings of the 8th Asia-Pacific Workshop on SystemsArticle No.: 18, Pages 1–8https://doi.org/10.1145/3124680.3124734Bugs in hypervisors are becoming common as hypervisors grow in size and complexity. Latent bugs, such as memory leaks, can lead to hypervisor failures resulting in complete loss of all its virtual machines (or guests). However, reliable operation of ...
- ArticleJuly 2017
Multi-hypervisor virtual machines: enabling an ecosystem of hypervisor-level services
USENIX ATC '17: Proceedings of the 2017 USENIX Conference on Usenix Annual Technical ConferencePages 235–249Public cloud software marketplaces already offer users a wealth of choice in operating systems, database management systems, financial software, and virtual networking, all deployable and configurable at the click of a button. Unfortunately, this level ...
- research-articleDecember 2016
Quick eviction of virtual machines through proactive live snapshots
UCC '16: Proceedings of the 9th International Conference on Utility and Cloud ComputingPages 99–107https://doi.org/10.1145/2996890.2996891Cloud computing platforms routinely use virtualization to improve service availability, resiliency, and flexibility. Live migration of Virtual Machines (VM) is a key technique to quickly migrate workloads in response to events such as impending failure ...
- research-articleMarch 2016
Enabling Efficient Hypervisor-as-a-Service Clouds with Ephemeral Virtualization
VEE '16: Proceedings of the12th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution EnvironmentsPages 79–92https://doi.org/10.1145/2892242.2892254When considering a hypervisor, cloud providers must balance conflicting requirements for simple, secure code bases with more complex, feature-filled offerings. This paper introduces Dichotomy, a new two-layer cloud architecture in which the roles of the ...
Also Published in:
ACM SIGPLAN Notices: Volume 51 Issue 7 - research-articleDecember 2015
Privacy-preserving Virtual Machine
ACSAC '15: Proceedings of the 31st Annual Computer Security Applications ConferencePages 231–240https://doi.org/10.1145/2818000.2818044Cloud computing systems routinely process users' confidential data, but the underlying virtualization software in use today is not constructed to minimize the exposure of such data. For instance, virtual machine (VM) checkpointing can drastically ...
- ArticleJune 2015
Performance Analysis of Encryption in Securing the Live Migration of Virtual Machines
- Yaohui Hu,
- Sanket Panhale,
- Tianlin Li,
- Emine Kaynar,
- Danny Chan,
- Umesh Deshpande,
- Ping Yang,
- Kartik Gopalan
CLOUD '15: Proceedings of the 2015 IEEE 8th International Conference on Cloud ComputingPages 613–620https://doi.org/10.1109/CLOUD.2015.87Virtual machine (VM) migration is a technique for transferring the execution state of a VM from one physical host to another. While VM migration is critical for load balancing, consolidation, and server maintenance in virtualized data centers, it can ...
- ArticleJune 2014
Fast Server Deprovisioning through Scatter-Gather Live Migration of Virtual Machines
CLOUD '14: Proceedings of the 2014 IEEE International Conference on Cloud ComputingPages 376–383https://doi.org/10.1109/CLOUD.2014.58Traditional metrics for live migration of virtual machines (VM) include total migration time, downtime, network overhead, and application degradation. In this paper, we introduce a new metric, "eviction time", defined as the time to evict the entire ...
- ArticleJune 2013
An Application-Level Approach for Privacy-Preserving Virtual Machine Checkpointing
CLOUD '13: Proceedings of the 2013 IEEE Sixth International Conference on Cloud ComputingPages 59–66https://doi.org/10.1109/CLOUD.2013.28Virtualization has been widely adopted in recent years in the cloud computing platform to improve server consolidation and reduce operating cost. Virtual Machine (VM) checkpointing refers to the act of saving a persistent snapshot (or checkpoint) of a ...
- research-articleMay 2013
Gang migration of virtual machines using cluster-wide deduplication
CCGRID '13: Proceedings of the 13th IEEE/ACM International Symposium on Cluster, Cloud, and Grid ComputingPages 394–401https://doi.org/10.1109/CCGrid.2013.39Gang migration refers to the simultaneous live migration of multiple Virtual Machines (VMs) from one set of physical machines to another in response to events such as load spikes and imminent failures. Gang migration generates a large volume of network ...
- doctoral_thesisJanuary 2013
Transparent testing and evaluation of network protocols
Network protocol developers typically go through a tedious and error-prone process of testing and debugging their protocol implementation for various settings. They perform a number of tasks manually such as configuration of numerous network settings, ...
- research-articleJune 2012
Inter-rack live migration of multiple virtual machines
VTDC '12: Proceedings of the 6th international workshop on Virtualization Technologies in Distributed Computing DatePages 19–26https://doi.org/10.1145/2287056.2287062Within datacenters, often multiple virtual machines (VMs) need to be live migrated simultaneously for various reasons such as maintenance, power savings, and load balancing. Such mass simultaneous live migration of multiple VMs can trigger large data ...