No abstract available.
Proceeding Downloads
Swift Birth and Quick Death: Enabling Fast Parallel Guest Boot and Destruction in the Xen Hypervisor
- Vlad Nitu,
- Pierre Olivier,
- Alain Tchana,
- Daniel Chiba,
- Antonio Barbalace,
- Daniel Hagimont,
- Binoy Ravindran
The ability to quickly set up and tear down a virtual machine is critical for today's cloud elasticity, as well as in numerous other scenarios: guest migration/consolidation, event-driven invocation of micro-services, dynamically adaptive unikernel-...
Unikernels Everywhere: The Case for Elastic CDNs
- Simon Kuenzer,
- Anton Ivanov,
- Filipe Manco,
- Jose Mendes,
- Yuri Volchkov,
- Florian Schmidt,
- Kenichi Yasukata,
- Michio Honda,
- Felipe Huici
Video streaming dominates the Internet's overall traffic mix, with reports stating that it will constitute 90% of all consumer traffic by 2019. Most of this video is delivered by Content Delivery Networks (CDNs), and, while they optimize QoE metrics ...
MigVisor: Accurate Prediction of VM Live Migration Behavior using a Working-Set Pattern Model
Live migration of a virtual machine (VM) is a powerful technique with benefits of server maintenance, resource management, dynamic workload re-balance, etc. Modern research has effectively reduced the VM live migration (VMLM) time to dozens of ...
Catalyst: GPU-assisted rapid memory deduplication in virtualization environments
Content based page sharing techniques improve memory efficiency in virtualized systems by identifying and merging identical pages. Kernel Same-page Merging (KSM), a Linux kernel utility for page sharing, sequentially scans memory pages of virtual ...
Just-In-Time GPU Compilation for Interpreted Languages with Partial Evaluation
Computer systems are increasingly featuring powerful parallel devices with the advent of many-core CPUs and GPUs. This offers the opportunity to solve computationally-intensive problems at a fraction of the time traditional CPUs need. However, ...
Heterogeneous Managed Runtime Systems: A Computer Vision Case Study
Real-time 3D space understanding is becoming prevalent across a wide range of applications and hardware platforms. To meet the desired Quality of Service (QoS), computer vision applications tend to be heavily parallelized and exploit any available ...
Dancing with Wolves: Towards Practical Event-driven VMM Monitoring
This paper presents a novel framework that enables practical event-driven monitoring for untrusted virtual machine monitors (VMMs) in cloud computing. Unlike previous approaches for VMM monitoring, our framework neither relies on a higher privilege ...
Safe Inspection of Live Virtual Machines
- Sahil Suneja,
- Ricardo Koller,
- Canturk Isci,
- Eyal de Lara,
- Ali Hashemi,
- Arnamoy Bhattacharyya,
- Cristiana Amza
With DevOps automation and an everything-as-code approach to lifecycle management for cloud-native applications, challenges emerge from an operational visibility and control perspective. Once a VM is deployed in production it typically becomes a hands-...
Improving Virtualized Storage Performance with Sky
We introduce Sky, an extension to the VMM that gathers insights and information by intercepting system calls made by guest applications. We show how Sky gains three specific insights -- guest file-size information, metadata-data distinction, and file-...
Security Analysis of Encrypted Virtual Machines
Cloud computing has become indispensable in today's computer landscape. The flexibility it offers for customers as well as for providers has become a crucial factor for large parts of the computer industry. Virtualization is the key technology that ...
ReRanz: A Light-Weight Virtual Machine to Mitigate Memory Disclosure Attacks
Recent code reuse attacks are able to circumvent various address space layout randomization (ASLR) techniques by exploiting memory disclosure vulnerabilities. To mitigate sophisticated code reuse attacks, we proposed a light-weight virtual machine, ...
Using OS Design Patterns to Provide Reliability and Security as-a-Service for VM-based Clouds
- Zachary J. Estrada,
- Read Sprabery,
- Lok Yan,
- Zhongzhi Yu,
- Roy Campbell,
- Zbigniew Kalbarczyk,
- Ravishankar K. Iyer
This paper extends the concepts behind cloud services to offer hypervisor-based reliability and security monitors for cloud virtual machines. Cloud VMs can be heterogeneous and as such guest OS parameters needed for monitoring can vary across different ...
One Process to Reap Them All: Garbage Collection as-a-Service
Ubiquitous mobile platforms such as Android rely on managed language run-time environments, also known as language virtual machines (VMs), to run a diverse range of user applications (apps). Each app runs in its own private VM instance, and each VM ...
Designing Locality and NUMA Aware MPI Runtime for Nested Virtualization based HPC Cloud with SR-IOV Enabled InfiniBand
Hypervisor-based virtualization solutions reveal good security and isolation, while container-based solutions make applications and workloads more portable and distributed in an effective, standardized and repeatable way. Therefore, nested ...
Flexible Page-level Memory Access Monitoring Based on Virtualization Hardware
Page protection is often used to achieve memory access monitoring in many applications, dealing with program-analysis, checkpoint-based failure recovery, and garbage collection in managed runtime systems. Typically, low overhead access monitoring is ...
Content Look-Aside Buffer for Redundancy-Free Virtual Disk I/O and Caching
Storage consolidation in a virtualized environment introduces numerous duplications in virtual disks and imposes considerable pressure on disk I/O and caching. In this paper, we present a content look-aside buffer (CLB) approach for simultaneously ...
HyperMAMBO-X64: Using Virtualization to Support High-Performance Transparent Binary Translation
Current computer architectures --- ARM, MIPS, PowerPC, SPARC, x86 --- have evolved from a 32-bit architecture to a 64-bit one. Computer architects often consider whether it could be possible to eliminate hardware support for a subset of the instruction ...
HA-VMSI: A Lightweight Virtual Machine Isolation Approach with Commodity Hardware for ARM
Once compromising the hypervisor, remote or local adversaries can easily access other customers' sensitive data in the memory and context of guest virtual machines (VMs). VM isolation is an efficient mechanism for protecting the memory of guest VMs from ...
Index Terms
- Proceedings of the 13th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments