Filters








203 Hits in 3.6 sec

Flask coherence: A morphable hybrid coherence protocol to balance energy, performance and scalability

Lucia G. Menezo, Valentin Puente, Jose-Angel Gregorio
2015 2015 IEEE 21st International Symposium on High Performance Computer Architecture (HPCA)  
Using the same configuration, it can outperform the performance and on-chip memory hierarchy energy of a broadcast-based coherence protocol such as Token by 10% and 20% respectively.  ...  With a directory capable of tracking just 40% of the blocks kept in private caches, this coherence protocol is able to match the performance and energy of a sparse-directory capable of tracking 160% of  ...  Figure 7 : 7 Example of marshaling shared memory onto the stack to invoke an unsafe library function foo(). Figure 8 : 8 Performance with safe library functions.  ... 
doi:10.1109/hpca.2015.7056033 dblp:conf/hpca/MenezoPG15 fatcat:4lssxzd2ozdf7eonk44s3dmsge

Practical Fine-grained Privilege Separation in Multithreaded Applications [article]

Jun Wang, Xi Xiong, Peng Liu
2013 arXiv   pre-print
We ported a widely-used, in-memory database application (memcached) to ARBITER system, changing only around 100 LOC.  ...  To realize controlled sharing in a fine-grained manner, we created a novel abstraction named ARBITER Secure Memory Segment (ASMS) and corresponding OS support.  ...  Our experiments demonstrate Arbiter's ease-of-adoption as well as its satisfying application performance.  ... 
arXiv:1305.2553v1 fatcat:aqerh3nbe5dqhkdmnqavxml4zu

PMThreads: persistent memory threads harnessing versioned shadow copies

Zhenwei Wu, Kai Lu, Andrew Nisbet, Wenzhe Zhang, Mikel Luján
2020 Proceedings of the 41st ACM SIGPLAN Conference on Programming Language Design and Implementation  
Using Memcached, we also investigate the scalability of PMThreads and the effect of different time intervals for the quiescent state.  ...  Byte-addressable non-volatile memory (NVM) makes it possible to perform fast in-memory accesses to persistent data using standard load/store processor instructions.  ...  Mikel Luján is funded by an Arm/RAEng Research Chair Award and a Royal Society Wolfson Fellowship.  ... 
doi:10.1145/3385412.3386000 dblp:conf/pldi/WuLNZL20 fatcat:oehtxdzpwvadjivnauhpre6vsm

Arrakis

Simon Peter, Jialin Li, Irene Zhang, Dan R. K. Ports, Doug Woos, Arvind Krishnamurthy, Thomas Anderson, Timothy Roscoe
2015 ACM Transactions on Computer Systems  
In a traditional operating system, the kernel mediates access to device hardware by server applications, to enforce process isolation as well as network and disk security.  ...  Recent device hardware trends enable a new approach to the design of network server operating systems.  ...  On Linux, memcached processes share the kernel-level network stack.  ... 
doi:10.1145/2812806 fatcat:7ihxxfyxv5gjzokgphstozh7y4

Efficient, Dynamic Multi-tenant Edge Computation in EdgeOS [article]

Yuxin Ren, Vlad Nitu, Guyue Liu, Gabriel Parmer, Timothy Wood, Alain Tchana, Riley Kennedy
2019 arXiv   pre-print
Edge clouds promise a pervasive computational infrastructure a short network hop away from end devices, but today's operating systems are a poor fit to meet the goals of scalable isolation, dense multi-tenancy  ...  to 1000 edge-cloud memcached instances on one server.  ...  As this places data-structures into a known and safe state, it ensures the integrity of future FWP-chain instances.  ... 
arXiv:1901.01222v1 fatcat:prmmqbtovzhopmd37j7z55bgoy

WELES: Policy-driven Runtime Integrity Enforcement of Virtual Machines [article]

Wojciech Ozga and Do Le Quoc and Christof Fetzer
2021 arXiv   pre-print
It performs an implicit attestation of VMs during a secure login and binds the VM integrity state with the secure connection.  ...  We propose WELES, a protocol allowing tenants to establish and maintain trust in VM runtime integrity of software and its configuration. WELES is transparent to the VM configuration and setup.  ...  The TPM chip cannot be effectively shared with many VMs due to a limited amount of PCRs.  ... 
arXiv:2104.14862v1 fatcat:df5i2n4x25fu7oqvoxdm5ei3ae

Remote Memory-Deduplication Attacks [article]

Martin Schwarzl, Erik Kraft, Moritz Lipp, Daniel Gruss
2021 arXiv   pre-print
We demonstrate our attacks on deduplication both on Windows and Linux and attack widely used server software such as Memcached and InnoDB.  ...  We showcase our remote memory-deduplication attack in three case studies: First, we show that an attacker can disclose the presence of data in memory on a server running Memcached.  ...  Any opinions or recommendationsw expressed in this work are those of the authors and do not necessarily reflect the views of the funding parties.  ... 
arXiv:2111.08553v1 fatcat:d3wtxwkb2zfpfdttr5yb7sevem

HAFT

Dmitrii Kuvaiskii, Rasha Faqeh, Pramod Bhatotia, Pascal Felber, Christof Fetzer
2016 Proceedings of the Eleventh European Conference on Computer Systems - EuroSys '16  
We present HAFT, a fault tolerance technique using hardware extensions of commodity CPUs to protect unmodified multithreaded applications against such corruptions.  ...  Transient hardware faults during the execution of a program can cause data corruptions.  ...  This work is supported in part by the German Research Foundation (DFG) within the Cluster of Excellence "Center for Advancing Electronics Dresden" (cfaed).  ... 
doi:10.1145/2901318.2901339 dblp:conf/eurosys/KuvaiskiiFBFF16 fatcat:rvirzztinzcgpoi52iiy7dclnq

Consistent, durable, and safe memory management for byte-addressable non volatile main memory

Iulian Moraru, David G. Andersen, Michael Kaminsky, Niraj Tolia, Parthasarathy Ranganathan, Nathan Binkert
2013 Proceedings of the First ACM SIGOPS Conference on Timely Results in Operating Systems - TRIOS '13  
Taking the fullest advantage of the low latency and high bandwidths of emerging memories such as phase change memory (PCM), spin torque, and memristor necessitates a serious look at placing these persistent  ...  This paper presents three building blocks for enabling the efficient and safe design of persistent data stores for emerging non-volatile memory technologies.  ...  Figure 2 depicts the high-level organization of our approach. To protect pages, the kernel and process share a memory buffer used as a lockless producer-consumer queue [21] .  ... 
doi:10.1145/2524211.2524216 dblp:conf/sosp/MoraruAKTRB13 fatcat:zdl5jowcqjgc7pnt763d42iwyq

HICAMP

David Cheriton, Amin Firoozshahian, Alex Solomatnikov, John P. Stevenson, Omid Azizi
2012 SIGPLAN notices  
Programming language and operating system support for efficient concurrency-safe access to shared data is a key concern for the effective use of multi-core processors.  ...  Most research has focused on the software model of multiple threads accessing this data within a single shared address space.  ...  The authors are also grateful for valuable comments on earlier versions of this paper from Al Davis and Stephen Richardson, and on the final version from Carl Waldspurger.  ... 
doi:10.1145/2248487.2151007 fatcat:ifg5mgegonhitfqoqlbbhqvvzi

HICAMP

David Cheriton, Amin Firoozshahian, Alex Solomatnikov, John P. Stevenson, Omid Azizi
2012 Proceedings of the seventeenth international conference on Architectural Support for Programming Languages and Operating Systems - ASPLOS '12  
Programming language and operating system support for efficient concurrency-safe access to shared data is a key concern for the effective use of multi-core processors.  ...  Most research has focused on the software model of multiple threads accessing this data within a single shared address space.  ...  The authors are also grateful for valuable comments on earlier versions of this paper from Al Davis and Stephen Richardson, and on the final version from Carl Waldspurger.  ... 
doi:10.1145/2150976.2151007 dblp:conf/asplos/CheritonFSSA12 fatcat:mnswy2r6ljdj7ldbey6h7gvsey

HICAMP

David Cheriton, Amin Firoozshahian, Alex Solomatnikov, John P. Stevenson, Omid Azizi
2012 SIGARCH Computer Architecture News  
Programming language and operating system support for efficient concurrency-safe access to shared data is a key concern for the effective use of multi-core processors.  ...  Most research has focused on the software model of multiple threads accessing this data within a single shared address space.  ...  The authors are also grateful for valuable comments on earlier versions of this paper from Al Davis and Stephen Richardson, and on the final version from Carl Waldspurger.  ... 
doi:10.1145/2189750.2151007 fatcat:loxswyyvczgvxd2yozxp7uaoh4

The IX Operating System

Adam Belay, George Prekas, Mia Primorac, Ana Klimovic, Samuel Grossman, Christos Kozyrakis, Edouard Bugnion
2016 ACM Transactions on Computer Systems  
We present IX, a dataplane operating system that provides high I/O performance and high resource efficiency while maintaining the protection and isolation benefits of existing kernels.  ...  The IX operating system: Combining low latency, high throughput, and efficiency in a protected dataplane. ACM Trans.  ...  Porting memcached to IX primarily consisted of adapting it to use our event library.  ... 
doi:10.1145/2997641 fatcat:6nt2zson6jfjrieodatckxbfhi

Memshare: a Dynamic Multi-tenant Memory Key-value Cache [article]

Asaf Cidon, Daniel Rushton, Stephen M. Rumble, Ryan Stutsman
2016 arXiv   pre-print
We implemented Memshare and ran it on a week-long trace from a commercial memcached provider.  ...  Memshare provides a resource sharing model that guarantees private memory to different applications while dynamically allocating the remaining shared memory to optimize overall hit rate.  ...  A spin lock protects the list of full segments and the list of empty segments.  ... 
arXiv:1610.08129v1 fatcat:db6dyqa5gzgqrgvoik27pd54mm

Scalable concurrent hash tables via relativistic programming

Josh Triplett, Paul E. McKenney, Jonathan Walpole
2010 ACM SIGOPS Operating Systems Review  
Relativistic hash tables demonstrate the promise of a new concurrent programming methodology known as relativistic programming.  ...  Applying this algorithm to memcached removes a scalability limit for get requests, allowing memcached to scale linearly and service up to 46% more requests per second.  ...  Thanks to memcached developer "dormando" for providing technical help with memcached, as well as the benchmarking framework. Thanks to Salvatore Sanfilippo for the original mc-benchmark.  ... 
doi:10.1145/1842733.1842750 fatcat:qghmq7xba5brhemmkviaa2h6qa
« Previous Showing results 1 — 15 out of 203 results