[PDF][PDF] The turtles project: Design and implementation of nested virtualization
In classical machine virtualization, a hypervisor runs multiple operating systems
simultaneously, each on its own virtual machine. In nested virtualization, a hypervisor can …
simultaneously, each on its own virtual machine. In nested virtualization, a hypervisor can …
{BMC}: Accelerating memcached using safe in-kernel caching and pre-stack processing
In-memory key-value stores are critical components that help scale large internet services by
providing low-latency access to popular data. Memcached, one of the most popular key …
providing low-latency access to popular data. Memcached, one of the most popular key …
Improving Xen security through disaggregation
Virtual machine monitors (VMMs) have been hailed as the basis for an increasing number of
reliable or trusted computing systems. The Xen VMM is a relatively small piece of software …
reliable or trusted computing systems. The Xen VMM is a relatively small piece of software …
Shared-memory optimizations for inter-virtual-machine communication
Virtual machines (VMs) and virtualization are one of the core computing technologies today.
Inter-VM communication is not only prevalent but also one of the leading costs for data …
Inter-VM communication is not only prevalent but also one of the leading costs for data …
Bridging the Gap between Software and Hardware Techniques for {I/O} Virtualization
JR Santos, Y Turner, GJ Janakiraman… - 2008 USENIX Annual …, 2008 - usenix.org
The paravirtualized I/O driver domain model, used in Xen, provides several advantages
including device driver isolation in a safe execution environment, support for guest VM …
including device driver isolation in a safe execution environment, support for guest VM …
[PDF][PDF] An empirical study into the security exposure to hosts of hostile virtualized environments
T Ormandy - 2007 - Citeseer
As virtual machines become increasingly commonplace as a method of separating hostile or
hazardous code from commodity systems, the potential security exposure from …
hazardous code from commodity systems, the potential security exposure from …
[PDF][PDF] Tolerating malicious device drivers in Linux
S Boyd-Wickizer, N Zeldovich - 2010 USENIX Annual Technical …, 2010 - usenix.org
This paper presents SUD, a system for running existing Linux device drivers as untrusted
user-space processes. Even if the device driver is controlled by a malicious adversary, it …
user-space processes. Even if the device driver is controlled by a malicious adversary, it …
Secure virtual machine execution under an untrusted management OS
Virtualization is a rapidly evolving technology that can be used to provide a range of benefits
to computing systems, including improved resource utilization, software portability, and …
to computing systems, including improved resource utilization, software portability, and …
{DMAAUTH}: A Lightweight Pointer Integrity-based Secure Architecture to Defeat {DMA} Attacks
IOMMU has been introduced to thwart DMA attacks. However, the performance degradation
prevents it from being enabled on most systems. Even worse, recent studies show that …
prevents it from being enabled on most systems. Even worse, recent studies show that …
Counting with tinytable: Every bit counts!
Counting Bloom filters (CBF) and their variants are data structures that support membership
or multiplicity queries with a low probabilistic error. Yet, they incur a significant memory …
or multiplicity queries with a low probabilistic error. Yet, they incur a significant memory …