Share This Author
Architectural support for copy and tamper resistant software
The hardware implementation of a form of execute-only memory (XOM) that allows instructions stored in memory to be executed but not otherwise manipulated is studied, indicating that it is possible to create a normal multi-tasking machine where nearly all applications can be run in XOM mode.
Petal: distributed virtual disks
The design, implementation, and performance of Petal is described, a system that attempts to approximate this ideal in practice through a novel combination of features.
Frangipani: a scalable distributed file system
Initial measurements indicate that Frangipani has excellent single-server performance and scales well as servers are added, and can be exported to untrusted machines using ordinary network file access protocols.
Nectar: Automatic Management of Data and Computation in Datacenters
The design and implementation of Nectar are described, and the evaluation of the system is reported on using analytic studies of logs from several production clusters and an actual deployment on a 240-node cluster.
Shasta: a low overhead, software-only approach for supporting fine-grain shared memory
The primary focus of this paper is to describe the techniques used in Shasta to reduce the checking overhead for supporting fine granularity sharing in software, including careful layout of the shared address space and scheduling the checking code for efficient execution on modern processors.
Implementing global memory management in a workstation cluster
- M. Feeley, W. E. Morgan, Frédéric H. Pighin, Anna R. Karlin, H. Levy, C. Thekkath
- Computer ScienceSOSP
- 3 December 1995
The objective is to use a single, unified, but distributed memory management algorithm at the lowest level of the operating system to manage memory globally at this level so that all system- and higher-level software, including VM, file systems, transaction systems, and user applications, can benefit from available cluster memory.
Implementing an untrusted operating system on trusted hardware
This paper discusses the experience with building such a platform using a traditional time-sharing operating system executing on XOM, a processor architecture that provides copy protection and tamper-resistance functions and describes techniques for providing traditional operating systems services in this context.
Boxwood: Abstractions as the Foundation for Storage Infrastructure
- J. MacCormick, Nick Murphy, Marc Najork, C. Thekkath, Lidong Zhou
- Computer ScienceOSDI
- 6 December 2004
This paper has built a system called Boxwood to explore the feasibility and utility of providing high-level abstractions or data structures as the fundamental storage infrastructure, and has implemented an NFSv2 file service that demonstrates the promise of this approach.
Specifying and verifying hardware for tamper-resistant software
- D. Lie, John C. Mitchell, C. Thekkath, M. Horowitz
- Computer ScienceSymposium on Security and Privacy, .
- 11 May 2003
We specify a hardware architecture that supports tamper-resistant software by identifying an "idealized" model, which gives the abstracted actions available to a single user program. This idealized…
COMBINE: leveraging the power of wireless peers through collaborative downloading
- G. Ananthanarayanan, V. Padmanabhan, L. Ravindranath, C. Thekkath
- Computer ScienceMobiSys '07
- 13 June 2007
This work presents COMBINE, a system for collaborative downloading wherein devices that are within WLAN range pool together their WWAN links, significantly increasing the effective speed available to them.