Electrode: Accelerating Distributed Protocols with {eBPF}

Y Zhou, Z Wang, S Dharanipragada, M Yu - 20th USENIX Symposium …, 2023 - usenix.org
Implementing distributed protocols under a standard Linux kernel networking stack enjoys
the benefits of load-aware CPU scaling, high compatibility, and robust security and isolation …

Cross container attacks: The bewildered {eBPF} on clouds

Y He, R Guo, Y **ng, X Che, K Sun, Z Liu… - 32nd USENIX Security …, 2023 - usenix.org
The extended Berkeley Packet Filter (eBPF) provides powerful and flexible kernel interfaces
to extend the kernel functions for user space programs via running bytecode directly in the …

{λ-IO}: A unified {IO} stack for computational storage

Z Yang, Y Lu, X Liao, Y Chen, J Li, S He… - 21st USENIX Conference …, 2023 - usenix.org
The emerging computational storage device offers an opportunity for in-storage computing. It
alleviates the overhead of data movement between the host and the device, and thus …

Reducing datacenter compute carbon footprint by harnessing the power of specialization: Principles, metrics, challenges and opportunities

T Eilam, P Bose, LP Carloni, A Cidon… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
Computing is an indispensable tool in addressing climate change, but it also contributes to a
significant and steadily increasing carbon footprint, partly due to the exponential growth in …

Kernel extension verification is untenable

J Jia, R Sahu, A Oswald, D Williams, MV Le… - Proceedings of the 19th …, 2023 - dl.acm.org
The emergence of verified eBPF bytecode is ushering in a new era of safe kernel
extensions. In this paper, we argue that eBPF's verifier---the source of its safety guarantees …

Dilos: Do not trade compatibility for performance in memory disaggregation

W Yoon, J Ok, J Oh, S Moon, Y Kwon - Proceedings of the Eighteenth …, 2023 - dl.acm.org
Memory disaggregation has replaced the landscape of dat-acenters by physically
separating compute and memory nodes, achieving improved utilization. As early efforts …

{BeeBox}: Hardening {BPF} against Transient Execution Attacks

D **, AJ Gaidis, VP Kemerlis - 33rd USENIX Security Symposium …, 2024 - usenix.org
The Berkeley Packet Filter (BPF) has emerged as the de-facto standard for carrying out safe
and performant, user-specified computation (s) in kernel space. However, BPF also …

Programmable system call security with ebpf

J Jia, YF Zhu, D Williams, A Arcangeli… - arxiv preprint arxiv …, 2023 - arxiv.org
System call filtering is a widely used security mechanism for protecting a shared OS kernel
against untrusted user applications. However, existing system call filtering techniques either …

{DINT}: Fast {In-Kernel} Distributed Transactions with {eBPF}

Y Zhou, X **ang, M Kiley, S Dharanipragada… - … USENIX Symposium on …, 2024 - usenix.org
Serializable distributed in-memory transactions are important building blocks for data center
applications. To achieve high throughput and low latency, existing distributed transaction …

Validating the {eBPF} verifier via state embedding

H Sun, Z Su - 18th USENIX Symposium on Operating Systems …, 2024 - usenix.org
This paper introduces state embedding, a novel and highly effective technique for validating
the correctness of the eBPF verifier, a critical component for Linux kernel security. To check …