Dilma M. da Silva IBM TJ Watson Research Center, NY What is going on in Operating Systems Research: The OSDI & SOSP Perspective.

Slides:



Advertisements
Similar presentations
Remus: High Availability via Asynchronous Virtual Machine Replication
Advertisements

Unmodified Device Driver Reuse and Improved System Dependability via Virtual Machines J. LeVasseur V. Uhlig J. Stoess S. G¨otz University of Karlsruhe,
Virtual Switching Without a Hypervisor for a More Secure Cloud Xin Jin Princeton University Joint work with Eric Keller(UPenn) and Jennifer Rexford(Princeton)
2  Industry trends and challenges  Windows Server 2012: Beyond virtualization  Complete virtualization platform  Improved scalability and performance.
Ensuring Operating System Kernel Integrity with OSck By Owen S. Hofmann Alan M. Dunn Sangman Kim Indrajit Roy Emmett Witchel Kent State University College.
EXTENSIBILITY, SAFETY AND PERFORMANCE IN THE SPIN OPERATING SYSTEM B. Bershad, S. Savage, P. Pardyak, E. G. Sirer, D. Becker, M. Fiuczynski, C. Chambers,
Title of Selected Paper: Design and Implementation of Secure Embedded Systems Based on Trustzone Authors: Yan-ling Xu, Wei Pan, Xin-guo Zhang Presented.
Copyright 2009 FUJITSU TECHNOLOGY SOLUTIONS PRIMERGY Servers and Windows Server® 2008 R2 Benefit from an efficient, high performance and flexible platform.
An Integrated Framework for Dependable Revivable Architectures Using Multi-core Processors Weiding Shi, Hsien-Hsin S. Lee, Laura Falk, and Mrinmoy Ghosh.
Network Implementation for Xen and KVM Class project for E : Network System Design and Implantation 12 Apr 2010 Kangkook Jee (kj2181)
The ghost of intrusions past Ashlesha Joshi Peter M. Chen University of Michigan 7 December 2004.
U NIVERSITY OF M ASSACHUSETTS, A MHERST Department of Computer Science Virtualization in Data Centers Prashant Shenoy
Common System Components
Cloud Computing and Virtualization Sorav Bansal CloudCamp 2010 IIT Delhi.
An Out-of-the-Box Approach to High Assurance Computer System Monitoring and Integrity Protection Cyber Defense Conference, Rome, NY, May 12-14, 2008 Assistant.
DatacenterMicrosoft Azure Consistency Connectivity Code.
Operating Systems.
© 2006 EMC Corporation. All rights reserved. Managing the Data Center Section 5.2.
Implementing Failover Clustering with Hyper-V
5205 – IT Service Delivery and Support
E Virtual Machines Lecture 4 Device Virtualization
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
Making the Virtualization Decision. Agenda The Virtualization Umbrella Server Virtualization Architectures The Players Getting Started.
Secure Virtual Architecture John Criswell, Arushi Aggarwal, Andrew Lenharth, Dinakar Dhurjati, and Vikram Adve University of Illinois at Urbana-Champaign.
Microkernels, virtualization, exokernels Tutorial 1 – CSC469.
ICT Day Term 4,  Virtualisation is growing in usage.  Current CPU’s are designed to support Virtualisation.  Businesses are looking at virtualisation.
HyperSpector: Virtual Distributed Monitoring Environments for Secure Intrusion Detection Kenichi Kourai Shigeru Chiba Tokyo Institute of Technology.
SAIGONTECH COPPERATIVE EDUCATION NETWORKING Spring 2010 Seminar #1 VIRTUALIZATION EVERYWHERE.
SAIGONTECH COPPERATIVE EDUCATION NETWORKING Spring 2009 Seminar #1 VIRTUALIZATION EVERYWHERE.
Auditing Cloud Administrators Using Information Flow Tracking Afshar David ACM Scalable Trusted Computing.
Hot Topics in OS Research Andy Wang COP 5611 Advanced Operating Systems.
Remus: VM Replication Jeff Chase Duke University.
Map Reduce for data-intensive computing (Some of the content is adapted from the original authors’ talk at OSDI 04)
Michael Ernst, page 1 Collaborative Learning for Security and Repair in Application Communities Performers: MIT and Determina Michael Ernst MIT Computer.
Copyright © 2011 EMC Corporation. All Rights Reserved. MODULE – 6 VIRTUALIZED DATA CENTER – DESKTOP AND APPLICATION 1.
Secure & flexible monitoring of virtual machine University of Mazandran Science & Tecnology By : Esmaill Khanlarpour January.
HARDWARE SUPPORT FOR ENFORCING INFORMATION FLOW CONTROL ON MANYCORE SYSTEMS Sarah Bird David McGrogan.
Guide to Linux Installation and Administration, 2e1 Chapter 2 Planning Your System.
COMS E Cloud Computing and Data Center Networking Sambit Sahu
Swapping to Remote Memory over InfiniBand: An Approach using a High Performance Network Block Device Shuang LiangRanjit NoronhaDhabaleswar K. Panda IEEE.
Introduction. Readings r Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 m Note: All figures from this book.
Can We Make Operating Systems Reliable and Secure? Andrew S. Tanenbaum, Jorrit N. Herder, and Herbert Bos Vrije Universiteit, Amsterdam May 2006 Group.
Copyright © cs-tutorial.com. Overview Introduction Architecture Implementation Evaluation.
“Trusted Passages”: Meeting Trust Needs of Distributed Applications Mustaque Ahamad, Greg Eisenhauer, Jiantao Kong, Wenke Lee, Bryan Payne and Karsten.
The xCloud and Design Alternatives Presented by Lavone Rodolph.
Satisfy Your Technical Curiosity Specialists Enterprise Desktop -
VMware vSphere Configuration and Management v6
Introduction Why are virtual machines interesting?
Operating-System Structures
Protection of Processes Security and privacy of data is challenging currently. Protecting information – Not limited to hardware. – Depends on innovation.
Cloud Computing Lecture 5-6 Muhammad Ahmad Jan.
CSE 451: Operating Systems Winter 2015 Module 25 Virtual Machine Monitors Mark Zbikowski Allen Center 476 © 2013 Gribble, Lazowska,
Improving the Reliability of Commodity Operating Systems Michael M. Swift, Brian N. Bershad, Henry M. Levy Presented by Ya-Yun Lo EECS 582 – W161.
Detecting past and present intrusions through vulnerability- specific predicates Ashlesha Joshi, Sam King, George Dunlap, and Peter Chen.
Security-Enhanced Linux Stephanie Stelling Center for Information Security Department of Computer Science University of Tulsa, Tulsa, OK
E Virtual Machines Lecture 1 What is Virtualization? Scott Devine VMware, Inc.
1 Chapter 2: Operating-System Structures Services Interface provided to users & programmers –System calls (programmer access) –User level access to system.
 This work confers an application which makes possible to use a Bluetooth enabled mobile phone to remote control home appliances such electric fan, LEDs.
Module 3: Operating-System Structures
Troubleshooting Tools
Chapter 2: System Structures
1. 2 VIRTUAL MACHINES By: Satya Prasanna Mallick Reg.No
Download dumps - Microsoft Real Exam Questions Dumps4download
Introduction to Operating Systems
Chapter 3: Operating-System Structures
Hadoop Technopoints.
Proposal for Term Project Operating Systems, Fall 2018
Basic Concepts Protection: Security:
CSE 451: Operating Systems Autumn Module 24 Virtual Machine Monitors
CSE 451: Operating Systems Autumn Module 24 Virtual Machine Monitors
Presentation transcript:

Dilma M. da Silva IBM TJ Watson Research Center, NY What is going on in Operating Systems Research: The OSDI & SOSP Perspective

WSO’ July 2006 Slide 2 Main OS conferences OSDI – Operating Systems Design and Implementation – sponsored by USENIX  SOSP – Symposium on Operating Systems Principles – sponsored by ACM  Usenix Annual Technical Conference, HotOS  FAST, NSDI  Ottawa Linux Symposium  Eurosys

WSO’ July 2006 Slide 3 OSDI’04: 6 th Symposium on Operating Systems Design and Implementation  San Francisco, CA, Dec 6-8, 2004  ~ 500 attendees  193 submissions; PC read 45 papers; 27 papers accepted  Paper summaries available at 04/openpdfs/osdi04.pdf 04/openpdfs/osdi04.pdf  Papers available at usenix.org

WSO’ July 2006 Slide 4 “Kernel” Paper Highlights  (Best Paper Award) “Recovering Device Drivers” (Univ of Wash) –Goal: enable apps to run when device drivers fail –Builds on Nooks work –Basic idea: Shadow drivers – monitor, learn, replay –Tested on ; 98% examined errors were recoverable  “Unmodified Device Driver Reuse and Improved System Dependability via Virtual Machines” (Univ of Karlsruhe, Germany) –Run unmodified device driver (DD), with its original OS, in a virtual machine; export access to the device to other hosted virtual machines –Client VMs run a stub driver to communicate with the driver VM –Describes solutions for issues on achieving DD/OS isolation via VM  (Best Paper Award) “Using Model Checking to Find Serious File System Errors” (Stanford, Microsoft)

WSO’ July 2006 Slide 5 “Kernel” Paper Highlights (cont)  “CP-Miner: A tool for Finding Copy-past and Related Bugs in Operating Systems Code” (UIUC-Urbana-Champaign)  “Boxwood: Abstractions as the Foundation for Storage Infrastructure” (Microsoft)  “Energy-Efficiency and Storage Flexibility in the Blue File System” (Univ of Michigan)  “Life or Death at Block-Level” (Univ of Wisconsin, Madison)  “Program-Counter-Based Pattern Classification in Buffer Caching” (Purdue University)

WSO’ July 2006 Slide 6 “Non-Kernel” Paper Highlights  “MapReduce: Simplified Data Processing in Large Clusters” (Google)  “Automatic Misconfiguration Troubleshooting with PeerPressure” (Microsoft)  “Enhancing Server Availability and Security Through Failure-Oblivious Computing” (MIT)  “ksniffer: Determining the Remote Client Perceived Response Time from Live Packet Streams” (IBM Research,Columbia Univ)

WSO’ July 2006 Slide 7 SOSP’06: 20 th Symposium on Operating Systems Principles  Brighton, England, Oct 23-26, 2005  ~ 500 attendees  155 submissions; 6 PC members read each paper (3 reviews written) and make cut of 75 papers; those got 3 more reviews. Many PC members read all submissions  20 papers are accepted  Blind review

WSO’ July 2006 Slide 8 Problems in Security and Isolation  Enforcing untampered execution of code on legacy systems  Allowing a single process to serve many clients, with no leaking of information between clients  Enforce isolation between kernel modules (helps detect bugs, limit their damage)

WSO’ July 2006 Slide 9  Enforcing untampered execution of code Pioneer: Verifying Code Integrity and Enforcing Untampered Code Execution on Legacy Systems (CMU, IBM Research)  Allowing a single process to serve many clients, with no leaking of information between clients Labels and Event Processes in the Asbestos Operating System (UCLA, MIT, NYU)  Enforce isolation between kernel modules (helps detect bugs, limit their damage) Mondrix: Memory Isolation for Linux using Modriaan Memory Protection (UT-Austin, MIT, Purdue)

WSO’ July 2006 Slide 10 Problems in Learning from the Past  We may have been attacked! Have we? Detecting Past and present Intrusions through Vulnerability- Specific Predicates (Univ Michigan) –Virtual machine introspection and virtual machine replay  Have I seen this problem before? Capturing, Indexing, clustering, and Retrieving System History (Stanford, HP) –Statistical methods  Where is my data? Connections: Using Context to Enhance File Search (CMU)

WSO’ July 2006 Slide 11 Problem: Bugs  RaceTrack: Efficient Detection of Data Race Conditions via Adaptive Tracking (Microsoft Research, Berkeley)  (Best paper) Rx: Treating Bugs as Allergies – A Safe Method to Survive Software Failures (UIUC)

WSO’ July 2006 Slide 12 Opportunity: spare cycles, can I use it? (But be aware of eletricity bills!)  Speculative Execution in a Distributed System (Univ of Michigan)  FS2: Dynamic Data Replication in Free Disk Space for Improving Disk Performance and Energy Consumption (Univ of Michigan)  Hibernator: Helping Disk Arrays Sleep through the Winter (UIUC, HP)