skip to main content
10.1145/3050748acmconferencesBook PagePublication PagesveeConference Proceedingsconference-collections
VEE '17: Proceedings of the 13th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments
ACM2017 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
VEE '17: 13th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments Xi'an China April 8 - 9, 2017
ISBN:
978-1-4503-4948-2
Published:
08 April 2017
Sponsors:

Bibliometrics
Abstract

No abstract available.

Skip Table Of Content Section
SESSION: Ephemeral
research-article
Swift Birth and Quick Death: Enabling Fast Parallel Guest Boot and Destruction in the Xen Hypervisor

The ability to quickly set up and tear down a virtual machine is critical for today's cloud elasticity, as well as in numerous other scenarios: guest migration/consolidation, event-driven invocation of micro-services, dynamically adaptive unikernel-...

research-article
Open Access
Unikernels Everywhere: The Case for Elastic CDNs

Video streaming dominates the Internet's overall traffic mix, with reports stating that it will constitute 90% of all consumer traffic by 2019. Most of this video is delivered by Content Delivery Networks (CDNs), and, while they optimize QoE metrics ...

research-article
MigVisor: Accurate Prediction of VM Live Migration Behavior using a Working-Set Pattern Model

Live migration of a virtual machine (VM) is a powerful technique with benefits of server maintenance, resource management, dynamic workload re-balance, etc. Modern research has effectively reduced the VM live migration (VMLM) time to dozens of ...

SESSION: GPUs, FPGAs, etc
research-article
Catalyst: GPU-assisted rapid memory deduplication in virtualization environments

Content based page sharing techniques improve memory efficiency in virtualized systems by identifying and merging identical pages. Kernel Same-page Merging (KSM), a Linux kernel utility for page sharing, sequentially scans memory pages of virtual ...

research-article
Just-In-Time GPU Compilation for Interpreted Languages with Partial Evaluation

Computer systems are increasingly featuring powerful parallel devices with the advent of many-core CPUs and GPUs. This offers the opportunity to solve computationally-intensive problems at a fraction of the time traditional CPUs need. However, ...

short-paper
Heterogeneous Managed Runtime Systems: A Computer Vision Case Study

Real-time 3D space understanding is becoming prevalent across a wide range of applications and hardware platforms. To meet the desired Quality of Service (QoS), computer vision applications tend to be heavily parallelized and exploit any available ...

SESSION: Introspection
research-article
Dancing with Wolves: Towards Practical Event-driven VMM Monitoring

This paper presents a novel framework that enables practical event-driven monitoring for untrusted virtual machine monitors (VMMs) in cloud computing. Unlike previous approaches for VMM monitoring, our framework neither relies on a higher privilege ...

research-article
Safe Inspection of Live Virtual Machines

With DevOps automation and an everything-as-code approach to lifecycle management for cloud-native applications, challenges emerge from an operational visibility and control perspective. Once a VM is deployed in production it typically becomes a hands-...

research-article
Improving Virtualized Storage Performance with Sky

We introduce Sky, an extension to the VMM that gathers insights and information by intercepting system calls made by guest applications. We show how Sky gains three specific insights -- guest file-size information, metadata-data distinction, and file-...

SESSION: Security
research-article
Security Analysis of Encrypted Virtual Machines

Cloud computing has become indispensable in today's computer landscape. The flexibility it offers for customers as well as for providers has become a crucial factor for large parts of the computer industry. Virtualization is the key technology that ...

research-article
ReRanz: A Light-Weight Virtual Machine to Mitigate Memory Disclosure Attacks

Recent code reuse attacks are able to circumvent various address space layout randomization (ASLR) techniques by exploiting memory disclosure vulnerabilities. To mitigate sophisticated code reuse attacks, we proposed a light-weight virtual machine, ...

research-article
Using OS Design Patterns to Provide Reliability and Security as-a-Service for VM-based Clouds

This paper extends the concepts behind cloud services to offer hypervisor-based reliability and security monitors for cloud virtual machines. Cloud VMs can be heterogeneous and as such guest OS parameters needed for monitoring can vary across different ...

SESSION: Memory
research-article
Public Access
One Process to Reap Them All: Garbage Collection as-a-Service

Ubiquitous mobile platforms such as Android rely on managed language run-time environments, also known as language virtual machines (VMs), to run a diverse range of user applications (apps). Each app runs in its own private VM instance, and each VM ...

research-article
Designing Locality and NUMA Aware MPI Runtime for Nested Virtualization based HPC Cloud with SR-IOV Enabled InfiniBand

Hypervisor-based virtualization solutions reveal good security and isolation, while container-based solutions make applications and workloads more portable and distributed in an effective, standardized and repeatable way. Therefore, nested ...

research-article
Flexible Page-level Memory Access Monitoring Based on Virtualization Hardware

Page protection is often used to achieve memory access monitoring in many applications, dealing with program-analysis, checkpoint-based failure recovery, and garbage collection in managed runtime systems. Typically, low overhead access monitoring is ...

SESSION: Performance
research-article
Content Look-Aside Buffer for Redundancy-Free Virtual Disk I/O and Caching

Storage consolidation in a virtualized environment introduces numerous duplications in virtual disks and imposes considerable pressure on disk I/O and caching. In this paper, we present a content look-aside buffer (CLB) approach for simultaneously ...

research-article
HyperMAMBO-X64: Using Virtualization to Support High-Performance Transparent Binary Translation

Current computer architectures --- ARM, MIPS, PowerPC, SPARC, x86 --- have evolved from a 32-bit architecture to a 64-bit one. Computer architects often consider whether it could be possible to eliminate hardware support for a subset of the instruction ...

research-article
HA-VMSI: A Lightweight Virtual Machine Isolation Approach with Commodity Hardware for ARM

Once compromising the hypervisor, remote or local adversaries can easily access other customers' sensitive data in the memory and context of guest virtual machines (VMs). VM isolation is an efficient mechanism for protecting the memory of guest VMs from ...

Index terms have been assigned to the content through auto-classification.

Recommendations

Acceptance Rates

VEE '17 Paper Acceptance Rate18of43submissions,42%Overall Acceptance Rate80of235submissions,34%
YearSubmittedAcceptedRate
VEE '17431842%
VEE '16291034%
VEE '15501632%
VEE '14561832%
VEE '08571832%
Overall2358034%