[PDF][PDF] The turtles project: Design and implementation of nested virtualization

M Ben-Yehuda, MD Day, Z Dubitzky, M Factor… - … USENIX Symposium on …, 2010 - usenix.org
In classical machine virtualization, a hypervisor runs multiple operating systems
simultaneously, each on its own virtual machine. In nested virtualization, a hypervisor can …

{BMC}: Accelerating memcached using safe in-kernel caching and pre-stack processing

Y Ghigoff, J Sopena, K Lazri, A Blin… - 18th USENIX Symposium …, 2021 - usenix.org
In-memory key-value stores are critical components that help scale large internet services by
providing low-latency access to popular data. Memcached, one of the most popular key …

Improving Xen security through disaggregation

DG Murray, G Milos, S Hand - Proceedings of the fourth ACM SIGPLAN …, 2008 - dl.acm.org
Virtual machine monitors (VMMs) have been hailed as the basis for an increasing number of
reliable or trusted computing systems. The Xen VMM is a relatively small piece of software …

Shared-memory optimizations for inter-virtual-machine communication

Y Ren, L Liu, Q Zhang, Q Wu, J Guan, J Kong… - ACM Computing …, 2016 - dl.acm.org
Virtual machines (VMs) and virtualization are one of the core computing technologies today.
Inter-VM communication is not only prevalent but also one of the leading costs for data …

Bridging the Gap between Software and Hardware Techniques for {I/O} Virtualization

JR Santos, Y Turner, GJ Janakiraman… - 2008 USENIX Annual …, 2008 - usenix.org
The paravirtualized I/O driver domain model, used in Xen, provides several advantages
including device driver isolation in a safe execution environment, support for guest VM …

[PDF][PDF] An empirical study into the security exposure to hosts of hostile virtualized environments

T Ormandy - 2007 - Citeseer
As virtual machines become increasingly commonplace as a method of separating hostile or
hazardous code from commodity systems, the potential security exposure from …

[PDF][PDF] Tolerating malicious device drivers in Linux

S Boyd-Wickizer, N Zeldovich - 2010 USENIX Annual Technical …, 2010 - usenix.org
This paper presents SUD, a system for running existing Linux device drivers as untrusted
user-space processes. Even if the device driver is controlled by a malicious adversary, it …

Secure virtual machine execution under an untrusted management OS

C Li, A Raghunathan, NK Jha - 2010 IEEE 3rd International …, 2010 - ieeexplore.ieee.org
Virtualization is a rapidly evolving technology that can be used to provide a range of benefits
to computing systems, including improved resource utilization, software portability, and …

{DMAAUTH}: A Lightweight Pointer Integrity-based Secure Architecture to Defeat {DMA} Attacks

X Wang, W Shen, Y Bu, J Zhou, Y Zhou - 33rd USENIX Security …, 2024 - usenix.org
IOMMU has been introduced to thwart DMA attacks. However, the performance degradation
prevents it from being enabled on most systems. Even worse, recent studies show that …

Counting with tinytable: Every bit counts!

G Einziger, R Friedman - … of the 17th International Conference on …, 2016 - dl.acm.org
Counting Bloom filters (CBF) and their variants are data structures that support membership
or multiplicity queries with a low probabilistic error. Yet, they incur a significant memory …