ABDEL-HAMID, T., and MADNICK, S.: Software Project Dynamics: An Integrated Approach, Hoboken, NJ: Pearson, 1991.
ACCETTA, M., BARON, R., GOLUB, D., RASHID, R., TEVANIAN, A., and YOUNG, M.: ‘‘Mach: A New Kernel Foundation for UNIX Development,’’ Proc. USENIX Summer Conf., USENIX, pp. 93–112, 1986.
ADAMS, G.B. III, AGRAWAL, D.P., and SIEGEL, H.J.: ‘‘A Survey and Comparison of FaultTolerant Multistage Interconnection Networks,’’ Computer, Vol. 20, pp. 14–27, June 1987.
ADAMS, K., and AGESEN, O.: ‘‘A Comparison of Software and Hardware Techniques for X86 Virtualization,’’ Proc. 12th Int’l Conf. on Arch. Support for Prog. Lang. and Operating Syst., ACM, pp. 2–13, 2006.
AGESEN, O., MATTSON, J., RUGINA, R., and SHELDON, J.: ‘‘Software Techniques for Avoiding Hardware Virtualization Exits,’’ Proc. USENIX Ann. Tech. Conf., USENIX, 2012.
ALAGAPPAN, R., GANESAN, A., LIU, J., ARPACI-DUSSEAU, A., and ARPACI-DUSSEAU, R.: ‘‘Fault-Tolerance, Fast and Slow: Exploiting Failure Asynchrony in Distributed Systems,’’ Proc. 13th USENIX Symp. on Operating Syst. Design and Implementation, USENIX, pp. 3901–408, 2018.
ALEX, M., VARGAFTIK, S., KUPFER, G., PISMENY, B., AMIT, N., MORRISON, A., and TSAFRIR, D.: ‘‘Characterizing, Exploiting, and Detecting DMA Code Injection vulnerabilities in the Presence of an IOMMU,’’ Proc. 16th European Conf. on Computer Syst., ACM, pp. 395–409, 2021.
ALLIEVI, A., RUSSINOVICH, M., IONESCU, A., and SOLOMON, D: Windows Internals, Part 2, Amazon, 2021.
ALVAREZ, C., HE, Z., ALONSO G., and SINGLA, A.: ‘‘Specializing the Network for Scatter-Gather Workloads,’’ Proc. ACM Symp. on Cloud Computing, ACM, pp. 267–280, 2020.
AMIT, N., WEI, M., and TSAFRIR, D.: ‘‘Dealing with (Some of) the Fallout from Meltdown,’’ Proc. Systor ’21, ACM, Art. 13, pp. 1–6, June 2021.
AMSDEN, Z., ARAI, D., HECHT, D., HOLLER, A., and SUBRAHMANYAM, P.: ‘‘VMI: An Interface for Paravirtualization,’’ Proc. 2006 Linux Symp., 2006.
ANDERSON, D.: SATA Storage Technology: Serial ATA, Mindshare, 2007.
ANDERSON, R.: Security Engineering, Hoboken, NJ: John Wiley & Sons, 2020.
ANDERSON, T.E., BERSHAD, B.N., LAZOWSKA, E.D., and LEVY, H.M.: ‘‘Scheduler Activations: Effective Kernel Support for the User-Level Management of Parallelism,’’ ACM Trans. Computer Syst., Vol. 10, pp. 53–79, Feb. 1992.
ANDERSON, T.E.: ‘‘The Performance of Spin Lock Alternatives for Shared-Memory Multiprocessors,’’ IEEE Trans. Parallel and Distr. Syst., Vol. 1, pp. 6–16, Jan. 1990.
ANDREWS, G.R., and SCHNEIDER, F.B.: ‘‘Concepts and Notations for Concurrent Programming,’’ ACM Computing Surveys, Vol. 15, pp. 3–43, March 1983.
ANDREWS, G.R.: Concurrent Programming—Principles and Practice, Redwood City, CA: Benjamin/Cummings, 1991.
ARNAUTOV, S., TRACH, B., GREGOR, F., KNAUTH, T., MARTIN, A., PRIEBE, C., LIND, J., MUTHUKUMARAN, D., O’KEEFFE, D., STILLWELL, M., GOLTZSCHE, D., EYERS, D.M., KAPITZA, R., PIETZUCH, P.R., and FETZER, C.: ‘‘SCONE: Secure Linux Containers with Intel SGX,’’ Proc. 10th USENIX Symp. on Operating Syst. Design and Implementation, USENIX, pp. 689–703, 2016.
ARON, M., and DRUSCHEL, P.: ‘‘Soft Timers: Efficient Microsecond Software Timer Support for Network Processing,’’ Proc. 17th Symp. on Operating Syst. Prin., ACM, pp. 223–246, 1999.
ARPACI-DUSSEAU, R. and ARPACI-DUSSEAU, A.: Operating Syst.: Three Easy Pieces, Madison, WI: Arpacci-Dusseau, 2013.
BAKER, F.T.: ‘‘Chief Programmer Team Management of Production Programming,’’ IBM Syst. J., Vol. 11, pp. 1, 1972.
BARHAM, P., DRAGOVIC, B., FRASER, K., HAND, S., HARRIS, T., HO, A., NEUGE-BAUER, R., PRATT, I., and WARFIELD, A.: ‘‘Xen and the Art of Virtualization,’’ Proc. 19th Symp. on Operating Syst. Prin., ACM, pp. 164–177, 2003.
BARR, J.: ‘‘Firecracker: Lightweight Virtualization for Serverless Computing,’’ Amazon Blog. https://aws.amazon.com/blogs/aws/firecracker-lightweight-virtualization-forserverless-computing/, Amazon, 2018.
BARR, K., BUNGALE, P., DEASY, S., GYURIS, V., HUNG, P., NEWELL, C., TUCH, H., and ZOPPIS, B.: ‘‘The VMware Mobile Virtualization Platform: Is That a Hypervisor in Your Pocket?’’ ACM SIGOPS Operating Syst. Rev., Vol. 44, pp. 124–135, Dec. 2010.
BASILLI, V.R., and PERRICONE, B.T.: ‘‘Software Errors and Complexity: An Empirical Study,’’ Commun. ACM, Vol. 27, pp. 42–52, Jan. 1984.
BAUMANN, A., BARHAM, P., DAGAND, P., HARRIS, T., ISAACS, R., PETER, S., ROSCOE, T., SCHUPBACH, A., and SINGHANIA, A.: ‘‘The Multikernel: A New OS Architecture for Scalable Multicore Systems,’’ Proc. 22nd Symp. on Operating Syst. Prin., ACM, pp. 29–44, 2009.
BAUMANN, A., PEINADO, M. and HUNT, G.C.: ‘‘Shielding Applications from an Untrusted Cloud with Haven,’’ Trans. Computer Syst., ACM, Vol. 33(3), pp. 8:1–8:26, 2015.
BAYS, C.: ‘‘A Comparison of Next-Fit, First-Fit, and Best-Fit,’’ Commun. ACM, Vol. 20, pp.191–192, March 1977.
BEAUMONT, O., CANON, L-C., EYRAUD-DUBOIS, L., LUCARELLI, G., MARCHAL, L., MOMMESSIN, C., SIMON, B., and TRYSTRAM, D.: ‘‘Scheduling on Two Types of Resources: A Survey,’’ ACM Computing Surveys, Vol. 53, pp 1–36, June 2020.
BELAY, A., BITTAU, A., MASHTIZADEH, A., TEREI, D., MAZIERES, D., and KOZYRAKIS, C.: ‘‘Dune: Safe User-level Access to Privileged CPU Features,’’ Proc. Ninth USENIX Symp. on Operating Syst. Design and Implementation, USENIX, pp. 335–348, 2010.
BELAY, A., PREKAS, G., PRIMORAC, M., KLIMOVIC, A., GROSSMAN, S., KOZYRAKIS, C., and BUGNION, E.: ‘‘The IX Operating System: Combining Low Latency, High Throughput, and Efficiency in a Protected Dataplane,’’ Trans. Computer Syst., ACM, Vol. 34(4), pp.11:1–11:39, 2017.
BELL, D., and LA PADULA, L.: ‘‘Secure Computer Systems: Mathematical Foundations and Model,’’ Technical Report MTR 2547 v2, Mitre Corp., Nov. 1973.
BEN-ARI, M.: Principles of Concurrent and Distributed Programming, Hoboken, NJ: Pearson, 2006.
BHAT, K., VAN DER KOUWE, E., BOS, H., and GIUFFRIDA, C.: ‘‘ProbeGuard: Mitigating Probing Attacks Through Reactive Program Transformations,’’ Proc. 24th Int. Conf. on Architectural Support for Programming Languages and Operating Syst., ACM, 2019.
BHAT, K., VAN DER KOUWE, E., BOS, H., and GIUFFRIDA, C: ‘‘FIRestarter: Practical Software Crash Recovery with Targeted Library-level Fault Injection,’’ Proc. 51st Annual IEEE/IFIP International Conf. on Dependable Syst. and Networks (DSN),, 2021.
BIBA, K.: ‘‘Integrity Considerations for Secure Computer Systems,’’ Technical Report 76–371, U.S. Air Force Electronic Systems Division, 1977.
BILLIMORIA, K.N. Linux Kernel Programming: A comprehensive guide to kernel internals, writing kernel modules, and kernel synchronization, Birmingham, U.K.: Packt Publishing, 2021.
BIRRELL, A.D., and NELSON, B.J.: ‘‘Implementing Remote Procedure Calls,’’ ACM Trans. Computer Syst., Vol. 2, pp. 39–59, Feb. 1984.
BOEHM, B.: Software Eng. Economics, Hoboken, NJ: Pearson, 1981.
BOSMAN, E., RAZAVI, K., BOS, H., and GIUFFRIDA, C.: ‘‘Dedup Est Machina: Memory Deduplication as an Advanced Exploitation Vector,’’ Proc. 37th Symp. on Security and Privacy, IEEE, 2017.
BOULGOURIS, N.V., PLATANIOTIS, K.N., and MICHELI-TZANAKOU, E.: Biometrics: Theory, Methods, and Applications, Hoboken, NJ: John Wiley & Sons, 2010.
BOVET, D.P., and CESATI, M.: Understanding the Linux Kernel, Sebastopol, CA: O’Reilly & Associates, 2005.
BOYD-WICKIZER, S., CHEN, H., CHEN, R., MAO, Y., KAASHOEK, M.F., MORRIS, R., PESTEREV, A., STEIN, L., WU, M., DAI, Y., ZHANG, Y., and ZHANG, Z.: ‘‘Corey: an Operating System for Many Cores,’’ Proc. Eighth USENIX Symp. on Operating Syst. Design and Implementation, USENIX, pp. 43–57, 2008.
BOYD-WICKIZER, S., CLEMENTS A.T., MAO, Y., PESTEREV, A., KAASHOEK, M.F., MORRIS, R., and ZELDOVICH, N.: ‘‘An Analysis of Linux Scalability to Many Cores,’’ Proc. Ninth USENIX Symp. on Operating Syst. Design and Implementation, USENIX, 2010.
BRATUS, S., LOCASTO, M.E., PATTERSON, M., SASSAMAN, L., SHUBINA, A.: ‘‘Exploit Programming: From Buffer Overflows to Weird Machines and Theory of Computation,’’ ;Login:, USENIX, pp. 11–21, December 2011.
BRATUS, S.: ‘‘What Hackers Learn That the Rest of Us Don’t: Notes on Hacker Curriculum,’’ IEEE Security and Privacy, Vol. 5, pp. 72–75, July/Aug. 2007.
BRINCH HANSEN, P.: ‘‘The Programming Language Concurrent Pascal,’’ IEEE Trans. Software Eng., Vol. SE-1, pp. 199–207, June 1975.
BROOKS, F.P., Jr.: ‘‘No Silver Bullet—Essence and Accident in Software Engineering,’’ Computer, Vol. 20, pp. 10–19, April 1987.
BROOKS, F.P., Jr.: The Mythical Man-Month: Essays on Software Engineering, 20th Anniversary Edition, Boston: Addison-Wesley, 1995.
BRUNELLA, M., BELOCCHI, G., BONOLA, M., PONTARELLI, S. SIRACUSANO, G., BIANCHI, G., CAMMARANO, A., PALUMBO, A., PETRUCCI, L., and BIFULCO, R.: ‘‘Efficient Software Packet Processing on FPGAs and NICs,’’ Proc. 14th USENIX Symp. on Operating Syst. Design and Implementation, USENIX, pp. 973-990, 2020.
BUGNION, E., DEVINE, S., GOVIL, K., and ROSENBLUM, M.: ‘‘Disco: Running Commodity Operating Systems on Scalable Multiprocessors,’’ ACM Trans. Computer Syst., Vol. 15, pp. 412–447, Nov. 1997.
BUGNION, E., DEVINE, S., ROSENBLUM, M., SUGERMAN, J., and WANG, E.: ‘‘Bringing Virtualization to the x86 Architecture with the Original VMware Workstation,’’ ACM Trans. Computer Syst., Vol. 30, number 4, pp.12:1–12:51, Nov. 2012.
BUROW, N., CAR, S.A., NASH, J., LARSEN, P., FRANZ, M., BRUNTHALER, S., and PAYER, M.: ‘‘Control-Flow Integrity: Precision, Security, and Performance,’’ ACM Computing Surveys, Vol. 50, pp. 1–33, April 2017.
CAI, J., and STRAZDINS, P.E.: ‘‘An Accurate Prefetch Technique for Dynamic Paging Behaviour for Software Distributed Shared Memory,’’ Proc. 41st Int’l Conf. on Parallel Proc., IEEE, pp. 209–218, 2012.
CAI, Y., and CHAN, W.K.: ‘‘MagicFuzzer: Scalable Deadlock Detection for Large-scale Applications,’’ Proc. 2012 Int’l Conf. on Software Eng., IEEE, pp. 606–616, 2012.
CAMPISI, P.: Security and Privacy in Biometrics, New York: Springer, 2013.
CARR, R.W., and HENNESSY, J.L.: ‘‘WSClock—A Simple and Effective Algorithm for Virtual Memory Management,’’ Proc. Eighth Symp. on Operating Syst. Prin., ACM, pp. 87–95, 1981.
CARRIERO, N., and GELERNTER, D.: ‘‘The S/Net’s Linda Kernel,’’ ACM Trans. Computer Syst., Vol. 4, pp. 110–129, May 1986.
CARRIERO, N., and GELERNTER, D.: ‘‘Linda in Context,’’ Commun. ACM, Vol. 32, pp. 444–458, April 1989.
CHAJED, T., TASSAROTTI, J., FRANS KAASHOEK, M.F., and ZELDOVICH, N.: ‘‘Verifying Concurrent, Crash-Safe Systems with Perennial,’’ Proc. 27th Symp. on Operating Syst. Prin., ACM, pp. 243–258, 2019.
CHEN, H. CHAJED, T., KONRADI, A., WANG, S., ILERI, A., CHLIPALA, A., KAASHOEK, M.F., and ZELDOVICH, N.: ‘‘Verifying a High-Performance Crash-Safe File System Using a Tree Specification,’’ Proc. 26th Symp. on Operating Syst. Prin., ACM, pp. 270–286, 2017.
CHEN, M.-S., YANG, B.-Y., and CHENG, C.-M.: ‘‘RAIDq: A Software-Friendly, MultipleParity RAID,’’ Proc. Fifth Workshop on Hot Topics in File and Storage Syst., USENIX, 2013.
CHEN, Y., LU Y, ZHU B., ARPACI-DUSSEAU, A., ARPACI-DUSSEAU, R., and SHU, J.: ‘‘Scalable Persistent Memory File System with Kernel-Userspace Collaboration,’’ Proc. 19th USENIX Conf. on File and Storage Tech., USENIX, pp. 81–95, 2021.
CHEN, Y., and XING, X.: ‘‘SLAKE: Facilitating Slab Manipulation for Exploiting Vulnerabilities in the Linux Kernel,’’ Proc. 26th ACM Conf. on Computer and Communications Security, ACM, 2019.
CHENG, H., LI, W., WANG, P., CHU, C-H., and LIANG: ‘‘Incrementally Updateable Honey Password Vaults,’’ Proc. 30th USENIX Security Symp., USENIX, pp.857–874,2021.
CHERVENAK, A., VELLANKI, V., and KURMAS, Z.: ‘‘Protecting File Systems: A Survey of Backup Techniques,’’ Proc. 15th IEEE Symp. on Mass Storage Syst., IEEE, 1998.
CHOI, J., KIM, K., LEE, D., and CHA, S.K.: ‘‘NTFUZZ: Enabling Type-Aware Kernel Fuzzing on Windows with Static Binary Analysis,’’ Proc. 42nd Symp. on Security and Privacy, IEEE, 2021.
CHOI, S., and JUNG, S.: ‘‘A Locality-Aware Home Migration for Software Distributed Shared Memory,’’ Proc. 2013 Conf. on Research in Adaptive and Convergent Syst., ACM, pp. 79–81, 2013.
CHOW, T.C.K., and ABRAHAM, J.A.: ‘‘Load Balancing in Distributed Systems,’’ IEEE Trans. Software Eng., Vol. SE-8, pp. 401–412, July 1982.
COFFMAN, E.G., ELPHICK, M.J., and SHOSHANI, A.: ‘‘System Deadlocks,’’ ACM Computing Surveys, Vol. 3, pp. 67–78, June 1971.
COOK, R.P. Operating Syst. Concepts with Linux and POSIX Threads, Amazon, 2008.
COOKE, D., URBAN, J., and HAMILTON, S.: ‘‘UNIX and Beyond: An Interview with Ken Thompson,’’ Computer, Vol. 32, pp. 58–64, May 1999.
COOPERSTEIN, J.: Writing Linux Device Drivers: A Guide with Exercises, Seattle: CreateSpace, 2009.
CORBATO, F.J.: ‘‘On Building Systems That Will Fail,’’ Commun. ACM, Vol. 34, pp. 72–81, June 1991.
CORBATO, F.J., MERWIN-DAGGETT, M., and DALEY, R.C.: ‘‘An Experimental Time-Sharing System,’’ Proc. AFIPS Fall Joint Computer Conf., AFIPS, pp. 335–344, 1962.
CORBATO, F.J., and VYSSOTSKY, V.A.: ‘‘Introduction and Overview of the MULTICS System,’’ Proc. AFIPS Fall Joint Computer Conf., AFIPS, pp. 185–196, 1965.
CORBET, J., RUBINI, A., and KROAH-HARTMAN, G.: Linux Device Drivers, Sebastopol, CA: O’Reilly & Associates, 2009.
CORNWELL, M.: ‘‘Anatomy of a Solid-State Drive,’’ ACM Queue, Vol. 10, pp. 30–37, 2012.
COURTOIS, P.J., HEYMANS, F., and PARNAS, D.L.: ‘‘Concurrent Control with Readers and Writers,’’ Commun. ACM, Vol. 10, pp. 667–668, Oct. 1971.
DAI, T., KARVE, A., KOPER, G., and ZENG, S.: ‘‘Automatically Detecting Risky Scripts in Infrastructure Code,’’ Proc. ACM Symp. on Cloud Computing, ACM, pp. 358–371, 2020.
DALEY, R.C., and DENNIS, J.B.: ‘‘Virtual Memory, Process, and Sharing in MULTICS,’’ Commun. ACM, Vol. 11, pp. 306–312, May 1968.
DALL, C., LI, S.-W., LIM, J., NIEH, J., and KOLOVENTZOS, G.: ‘‘ARM virtualization: Performance and architectural implications,’’ Proc. 43rd International Symp. on Computer Architecture (ISCA), ACM/IEEE, June 2016.
DAVIS, B., WATSON, R.N.M., RICHARDSON A., NEUMANN, P., MOORE S., BALDWIN S., CHISNALL, D., CLARKE, J., GUDKA, K., JOANNOU A., LAURIE, B., MARKETTOS, A.T., MASTE, E., NAPIERALA, E.T., NORTON, R., ROE, M., SEWELL, P., SON, S., WOODRUFF, J., and FILARDO, N.W.: ‘‘CheriABI: Enforcing Valid Pointer Provenance and Minimizing Pointer Privilege in the POSIX C Run-time Environment,’’ Proc. 24th Int. Conf. on Architectural Support for Programming Languages and Operating Syst., ACM, 2019.
DE BRUIJN, W., and BOS, H.: ‘‘Beltway Buffers: Avoiding the OS Traffic Jam,’’ Proc. 27th Int’l Conf. on Computer Commun., April 2008.
DE BRUIJN, W., BOS, H., and BAL, H.: ‘‘Application-Tailored I/O with Streamline,’’ ACM Trans. Computer Syst., Vol. 29, number 2, pp.1–33, May 2011.
DEMING, D.A.: The Essential Guide to Serial ATA and SATA Express, Milton Park, Oxfordshire, U.K.: CRC Press, 2014.
DEMING, D.A.: The Essential Guide to Serial ATA and SATA Express, Milton Park, Oxfordshire, U.K.: CRC Press, 2014.
DENNING, P.J.: ‘‘The Working Set Model for Program Behavior,’’ Commun. ACM, Vol. 11, pp. 323–333, 1968a.
DENNING, P.J.: ‘‘Thrashing: Its Causes and Prevention,’’ Proc. AFIPS National Computer Conf., AFIPS, pp. 915–922, 1968b.
DENNING, P.J.: ‘‘Virtual Memory,’’ ACM Computing Surveys, Vol. 2, pp. 153–189, Sept. 1970.
DENNING, P.J.: ‘‘Working Sets Past and Present,’’ IEEE Trans. Software Eng., Vol. SE-6, pp. 64–84, Jan. 1980.
DENNIS, J.B., and VAN HORN, E.C.: ‘‘Programming Semantics for Multiprogrammed Computations,’’ Commun. ACM, Vol. 9, pp. 143–155, March 1966.
DIFFIE, W., and HELLMAN, M.E.: ‘‘New Directions in Cryptography,’’ IEEE Trans. Inform. Theory, Vol. IT-22, pp. 644–654, Nov. 1976.
DIJKSTRA, E.W.: ‘‘Co-operating Sequential Processes,’’ in Programming Languages, Genuys, F. (Ed.), London: Academic Press, 1965.
DIJKSTRA, E.W.: ‘‘The Structure of THE Multiprogramming System,’’ Commun. ACM, Vol. 11, pp. 341–346, May 1968.
DOMINGO, D., and KANNAN, S.: ‘‘pFSCK: Accelerating File System Checking and Repair for Modern Storage,’’ Proc. 19th USENIX Conf. on File and Storage Tech., USENIX, pp. 113–126, 2021.
DRESLINSKI, R.G., FICK, D., GIRIDHAR, B., KIM, G., SEO, S., FOJTIK, M., SATPATHY, S., LEE, Y., KIM, D. LIU, N., WIECKOWSKI, M., CHEN, G., SYLVESTER, D., BLAAUW, D., and MUDGE, T.: ‘‘Centip3De: A Many-Core Prototype Exploring 3D Integration and Near-Threshold Computing,’’ Commun. ACM, Vol. 56, pp. 97–104, Nov. 2013.
DUBOIS, M., SCHEURICH, C., and BRIGGS, F.A.: ‘‘Synchronization, Coherence, and Event Ordering in Multiprocessors,’’ Computer, Vol. 21, pp. 9–21, Feb. 1988.
DUO, W., JIANG, X., KAROUI, O., GUO, X., YOU, D., WANG S., and RUAN, Y. : ‘‘A Dead-lock Prevention Policy for a Class of Multithreaded Software,’’ IEEE ACCESS, IEEE, Vol. 8, pp. 16676–16688, 2020.
DUTA, V., VAN DER KOUWE, E., BOS, H., and GIUFFRIDA, C.: ‘‘PIBE: Practical Kernel Control-flow Hardening with Profile-guided Indirect Branch Elimination,’’ Proc. 26th Int. Conf. on Architectural Support for Programming Languages and Operating Syst., ACM, 2021.
EAGER, D.L., LAZOWSKA, E.D., and ZAHORJAN, J.: ‘‘Adaptive Load Sharing in Homogeneous Distributed Systems,’’ IEEE Trans. Software Eng., Vol. SE-12, pp. 662–675, May 1986.
EL FERKOUSS, O., SNAIKI, I., MOUNAOUAR, O., DAHMOUNI, H., BEN ALI, R., LEMIEUX, Y., and OMAR, C.: ‘‘A 100Gig Network Processor Platform for Openflow,’’ Proc. Seventh Int’l Conf. on Network Services and Management, IFIP, pp. 286–289, 2011.
EL GAMAL, A.: ‘‘A Public Key Cryptosystem and Signature Scheme Based on Discrete Logarithms,’’ IEEE Trans. Inform. Theory, Vol. IT-31, pp. 469–472, July 1985.
ENGLER, D.R., CHELF, B., CHOU, A., and HALLEM, S.: ‘‘Checking System Rules Using System-Specific Programmer-Written Compiler Extensions,’’ Proc. Fourth USENIX Symp. on Operating Syst. Design and Implementation, USENIX, pp. 1–16, 2000.
ENGLER, D.R., KAASHOEK, M.F., and O’TOOLE, J. Jr.: ‘‘Exokernel: An Operating System Architecture for Application-Level Resource Management,’’ Proc. 15th Symp. on Operating Syst. Prin., ACM, pp. 251–266, 1995.
ERL, T., PUTTINI, R., and MAHMOOD, Z.: Cloud Computing: Concepts, Technology & Architecture, Hoboken, NJ: Pearson, 2013.
EVEN, S.: Graph Algorithms, Potomac, MD: Computer Science Press, 1979.
FABRY, R.S.: ‘‘Capability-Based Addressing,’’ Commun. ACM, Vol. 17, pp. 403–412, July 1974.
FARSHIN, A., BARBETTE1, T., ROOZBEH1, A., MAGUIRE JR., G. Q., and KOSTIC, D.: ‘‘PacketMill: Toward Per-Core 100-Gbps Networking,’’ Proc. 26th ACM International Conf. on Architectural Support for Programming Languages and Operating Syst., ACM, 2021.
FELTEN, E.W., and HALDERMAN, J.A.: ‘‘Digital Rights Management, Spyware, and Security,’’ IEEE Security and Privacy, Vol. 4, pp. 18–23, Jan./Feb. 2006.
FEUSTAL, E.A.: ‘‘The Rice Research Computer—A Tagged Architecture,’’ Proc. AFIPS Conf., AFIPS, 1972.
FLORENCIO, D., and HERLEY, C.: ‘‘A Large-Scale Study of Web Password Habits,’’ Proc. 16th Int’l Conf. on the World Wide Web, ACM, pp. 657–666, 2007.
FOTHERINGHAM, J.: ‘‘Dynamic Storage Allocation in the Atlas Including an Automatic Use of a Backing Store,’’ Commun. ACM, Vol. 4, pp. 435–436, Oct. 1961.
FUSCO, J.: The Linux Programmer’s Toolbox, Hoboken, NJ: Pearson, 2007.
GARFINKEL, T., PFAFF, B., CHOW, J., ROSENBLUM, M., and BONEH, D.: ‘‘Terra: A Virtual Machine-Based Platform for Trusted Computing,’’ Proc. 19th Symp. on Operating Syst. Prin., ACM, pp. 193–206, 2003.
GAROFALAKIS, J., and STERGIOU, E.: ‘‘An Analytical Model for the Performance Evaluation of Multistage Interconnection Networks with Two Class Priorities,’’ Future Gen. Computer Syst., Vol. 29, pp. 114–129, Jan. 2013.
GEIST, R., and DANIEL, S.: ‘‘A Continuum of Disk Scheduling Algorithms,’’ ACM Trans. Computer Syst., Vol. 5, pp. 77–92, Feb. 1987.
GELERNTER, D.: ‘‘Generative Communication in Linda,’’ ACM Trans. Program. Lang. and Syst., Vol. 7, pp. 80–112, Jan. 1985.
GIUFFRIDA, C., KUIJSTEN, A., and TANENBAUM, A.: ‘‘Safe and Automatic Live Update for Operating Systems,’’ Proc. 18th Int’l Conf. on Arch. Support for Prog. Lang. and Operating Syst., ACM, pp. 279–292, 2013.
GIUFFRIDA, C., KUIJSTEN, A., and TANENBAUM, A.S.: ‘‘Enhanced Operating System Security through Efficient and Fine-Grained Address Space Randomization,’’ Proc. 21st USENIX Security Symp., USENIX, 2012.
GIUFFRIDA, C., KUIJSTEN, A., and TANENBAUM, A.S.: ‘‘Safe and Automatic Live Update for Operating Systems,’’ Proc. 18th Int’l Conf. on Arch. Support for Prog. Lang. and Operating Syst., ACM, pp. 279–292, 2013.
GOLDBERG, R.P:: Architectural Prin. for Virtual Computer Syst., Ph.D. thesis, Harvard University, Cambridge, MA, 1972.
GONG, L.: Inside Java 2 Platform Security, Boston: Addison-Wesley, 1999.
GRAHAM, R.: ‘‘Use of High-Level Languages for System Programming,’’ Project MAC Report TM-13, M.I.T., Sept. 1970.
GREENBERG, A.: A New Era of Cyberwar and the Hunt for the Kremlin’s Most Dangerous Hackers, New York: Doubleday, 2019.
GREENGARD, S.: ‘‘The Future of Data Storage,’’ Commun. ACM, Vol. 62, p.12, April 2019.
GROPP, W., LUSK, E., and SKJELLUM, A.: Using MPI: Portable Parallel Programming with the Message Passing Interface, Cambridge, MA: M.I.T. Press, 1994.
HAERTIG, H., HOHMUTH, M., LIEDTKE, J., and SCHONBERG, S.: ‘‘The Performance of Kernel-Based Systems,’’ Proc. 16th Symp. on Operating Syst. Prin., ACM, pp. 66–77, 1997.
HAFNER, K., and MARKOFF, J.: Cyberpunk, New York: Simon and Schuster, 1991.
HALSEY, M. and BETTANY, A.: Windows Registry Troubleshooting, New York: Apress, 2015.
HAND, S.M., WARFIELD, A., FRASER, K., KOTTSOVINOS, E., and MAGENHEIMER, D.: ‘‘Are Virtual Machine Monitors Microkernels Done Right?,’’ Proc. 10th Workshop on Hot Topics in Operating Syst., USENIX, pp. 1–6, 2005.
HARNIK, D., HERSHCOVITCH, M., SHATSKY, Y., EPSTEIN, A., and KAT, R.: ‘‘Sketching Volume Capacities in Deduplicated Storage,’’ Proc. 19th USENIX Conf. on File and Storage Tech., USENIX, pp. 107–119, 2019.
HARRISON, M.A., RUZZO, W.L., and ULLMAN, J.D.: ‘‘Protection in Operating Systems,’’ Commun. ACM, Vol. 19, pp. 461–471, Aug. 1976.
HASSAN, H., TUGRUL, Y.C., KIM, J., and VAN DER VEEN, V.: ‘‘Uncovering In-DRAM RowHammer Protection Mechanisms: A Methodology, Custom RowHammer Patterns, and Implications,’’ Proc. 54th Int’l Symp. of Microarch., IEEE/ACM, pp. 1198–1213, 2021.
HAVENDER, J.W.: ‘‘Avoiding Deadlock in Multitasking Systems,’’ IBM Syst. J., Vol. 7, pp. 74–84, 1968.
HEISER, G., UHLIG, V., and LEVASSEUR, J.: ‘‘Are Virtual Machine Monitors Microkernels Done Right?’’ ACM SIGOPS Operating Syst. Rev., Vol. 40, pp. 95–99, 2006.
HERDER, J.N., BOS, H., GRAS, B., HOMBURG, P., and TANENBAUM, A.S.: ‘‘Construction of a Highly Dependable Operating System,’’ Proc. Sixth European Dependable Computing Conf., pp. 3–12, 2006.
HERDER, J.N., MOOLENBROEK, D. VAN, APPUSWAMY, R., WU, B., GRAS, B., and TANENBAUM, A.S.: ‘‘Dealing with Driver Failures in the Storage Stack, ’’ Proc. Fourth Latin American Symp. on Dependable Computing, pp. 119–126, 2009.
HILDEBRAND, D.: ‘‘An Architectural Overview of QNX,’’ Proc. Workshop on Microkernels and Other Kernel Arch., ACM, pp. 113–136, 1992.
HIPSON, P.: Mastering Windows XP Registry, New York: Sybex, 2002.
HOARE, C.A.R.: ‘‘Monitors, An Operating System Structuring Concept,’’ Commun. ACM, Vol. 17, pp. 549–557, Oct. 1974.
HOHMUTH, M., PETER, M., HAERTIG, H., and SHAPIRO, J.: ‘‘Reducing TCB Size by Using Untrusted Components: Small Kernels Versus Virtual-Machine Monitors,’’ Proc. 11th ACM SIGOPS European Workshop, ACM, Art. 22, 2004.
HOLT, R.C.: ‘‘Some Deadlock Properties of Computer Systems,’’ ACM Computing Surveys, Vol. 4, pp. 179–196, Sept. 1972.
HOWARD, M., and LEBLANK, D.: Writing Secure Code, Redmond, WA: Microsoft Press, 2009.
HRUBY, T., D., BOS, H., and TANENBAUM, A.S.: ‘‘When Slower Is Faster: On Heterogeneous Multicores for Reliable Systems,’’ Proc. USENIX Ann. Tech. Conf., USENIX, 2013.
HRUBY, T., VOGT, D., BOS, H., and TANENBAUM, A.S.: ‘‘Keep Net Working—On a Dependable and Fast Networking Stack,’’ Proc. 42nd Conf. on Dependable Syst. and Networks, IEEE, pp. 1–12, 2012.
HU, S., ZHU, Y., CHENG, P., GUO, C., TAN, K., PADHYE, J., and Chen, K: ‘‘Tagger: Practical PFC Deadlock Prevention in Data Center Networks,’’ Proc. 12th International Conf. on emerging Networking EXperiments and Tech., ACM, 2017.
HUTCHINSON, N.C., MANLEY, S., FEDERWISCH, M., HARRIS, G., HITZ, D., KLEIMAN, S., and O’MALLEY, S.: ‘‘Logical vs. Physical File System Backup,’’ Proc. Third USENIX Symp. on Operating Syst. Design and Implementation, USENIX, pp. 239–249, 1999.
IEEE Interface (API) IC Language IEEE, 2003.
INTEL: ‘‘PCI-SIG SR-IOV Primer: An Introduction to SR-IOV Technology,’’ Intel White Paper, 2011.
ION, F.: ‘‘From Touch Displays to the Surface: A Brief History of Touchscreen Technology,’’ ArsTechnica, History of Tech, April, 2013.
ISLOOR, S.S., and MARSLAND, T.A.: ‘‘The Deadlock Problem: An Overview,’’ Computer, Vol. 13, pp. 58–78, Sept. 1980.
JANTZ, M.R., STRICKLAND, C., KUMAR, K., DIMITROV, M., and DOSHI, K.A.: ‘‘A Framework for Application Guidance in Virtual Memory Systems,’’ Proc. Ninth Int’l Conf. on Virtual Execution Environments, ACM, pp. 155–166, 2013.
JEONG, J., KIM, H., HWANG, J., LEE, J., and MAENG, S.: ‘‘Rigorous Rental Memory Management for Embedded Systems,’’ ACM Trans. Embedded Computing Syst., Vol. 12, Art. 43, pp. 1–21, March 2013.
JI, C., CHANG, L-P., PAN, R., WU, C., GAO C., SHI, L., KUO, T-W., and XUE, C.J.: ‘‘Pattern-Guided File Compression with User-Experience Enhancement for Log-Structured File System on Mobile Devices,’’ Proc. 19th USENIX Conf. on File and Storage Tech., USENIX, pp. 127–140, 2021.
JOHNSON, E.A: ‘‘Touch Display—A Novel Input/Output Device for Computers,’’ Electronics Letters, Vol. 1, no. 8, pp. 219–220, 1965.
JOHNSON, N.F., and JAJODIA, S.: ‘‘Exploring Steganography: Seeing the Unseen,’’ Computer, Vol. 31, pp. 26–34, Feb. 1998.
JOVER, R.P.: ‘‘Security Analysis of SMS as a Second Factor of Authentication,’’ Commun. ACM, Vol. 63, pp. 46–52, Dec. 2020.
KAFFES, K., .BIRLEA, D., LIN, Y., LO, D., and KOZYRAKIS, C.: ‘‘Leveraging Application Classes to Save Power in Highly-Utilized Data Centers,’’ Proc. ACM Symp. on Cloud Computing, ACM, pp. 134–149, 2020.
KAMINSKY, D.: ‘‘Explorations in Namespace: White-Hat Hacking across the Domain Name System,’’ Commun. ACM, Vol. 49, pp. 62–69, June 2006.
KAMINSKY, M., SAVVIDES, G., MAZIERES, D., and KAASHOEK, M.F.: ‘‘Decentralized User Authentication in a Global File System,’’ Proc. 19th Symp. on Operating Syst. Prin., ACM, pp. 60–73, 2003.
KAMP, P.-H. and WATSON, R.N.M.: ‘‘Jails: Confining the Omnipotent Root,’’ Proc., SANE 2000 Conf., NLUUG, 2000.
KANETKAR, Y.P.: Writing Windows Device Drivers Course Notes, New Delhi: BPB Publications, 2008.
KASIKCI, B., CUI, W., GE, X., and NIU, B.: ‘‘Lazy Diagnosis of In-Production Concurrency Bugs,’’ Proc. 26th Symp. on Operating Syst. Prin., ACM, pp. 582–598, 2017.
KASIKCI, B., ZAMFIR, C. and CANDEA, G.: ‘‘Data Races vs. Data Race Bugs: Telling the Difference with Portend,’’ Proc. 17th Int’l Conf. on Arch. Support for Prog. Lang. and Operating Syst., ACM, pp. 185–198, 2012.
KAUFMAN, C., PERLMAN, R., SPECINER, M., and PERLNER, R.: Network Security: Private Communication in a Public World, Hoboken, NJ: Pearson, 2022.
KELEHER, P., COX, A., DWARKADAS, S., and ZWAENEPOEL, W.: ‘‘TreadMarks: Distributed Shared Memory on Standard Workstations and Operating Systems,’’ Proc. USENIX Winter Conf., USENIX, pp. 115–132, 1994.
KESAVAN, R., CURTIS-MAURY, M., DEVADAS, V., and MISHRA, K.: ‘‘Storage Gardening: Using a Virtualization Layer for Efficient Defragmentation in the WAFL File System,’’ Proc. 19th USENIX Conf. on File and Storage Tech., USENIX, pp. 65–78, 2019.
KIM, J. and LEE, K.: ‘‘Practical Cloud Workloads for Serverless FaaS,’’ Proc. ACM Symp. on Cloud Computing, ACM, pp. 477, 2019.
KIM, J.S., PATEL, M., YAGLIKCI, A.G., HASSAN, H., AZIZI, R., OROSA, L., and MUTLU, O.: ‘‘Revisiting RowHammer: An Experimental Analysis of Modern DRAM Devices and Mitigation Techniques,’’ Proc. 47th Int’l Symp. on Computer Architecture, ACM, pp. 638–651, 2020.
KIM, Y., DALY, R., KIM, J.S., FALLIN, C., LEE, J., LEE, D., WILKERSON, C., LAI, K., and MUTLU, O.: ‘‘Flipping Bits in Memory without Accessing Them: An Experimental Study of DRAM Disturbance Errors,’’ Proc. 41st Int’l. Symp. Computer Arch., ACM, pp. 361–372, 2014.
KIRSCH, C.M., SANVIDO, M.A.A., and HENZINGER, T.A.: ‘‘A Programmable Microkernel for Real-Time Systems,’’ Proc. First Int’l Conf. on Virtual Execution Environments, ACM, pp. 35–45, 2005.
KLEIMAN, S.R.: ‘‘Vnodes: An Architecture for Multiple File System Types in Sun UNIX,’’ Proc. USENIX Summer Conf., USENIX, pp. 238–247, 1986.
KLEIN, G., ELPHINSTONE, K., HEISER, G., ANDRONICK, J., COCK, D., DERRIN, P., ELKADUWE, D., ENGELHARDT, K., KOLANSKI, R., NORRISH, M., SEWELL, T., TUCH, H., and WINWOOD, S.: ‘‘seL4: Formal Verification of an OS Kernel,’’ Proc. 22nd Symp. on Operating Syst. Primciples, ACM, pp. 207–220, 2009.
KNUTH, D.E.: The Art of Computer Programming, Vol. Boston: Addison-Wesley, 1997.
KOCHAN, S., and WOOD, P.: Shell Programming in Unix, Linux, and OS X, Boston: Addison-Wesley, 2017.
KONOTH, R.K., OLIVERIO, M., TATAR, A., ANDRIESSE, D., BOS, H., GIUFFRIDA, C., and RAZAVI, K.: ‘‘ZebRAM: Comprehensive and Compatible Software Protection against Rowhammer Attacks,’’ Proc. 13th USENIX Symp. of Operating Syst. Design and Implementation, USENIX, pp. 697–710, 2018.
KRAVETS, R., and KRISHNAN, P.: ‘‘Power Management Techniques for Mobile Communication,’’ Proc. Fourth ACM/IEEE Int’l Conf. on Mobile Computing and Networking, ACM/IEEE, pp. 157–168, 1998.
KRUEGER, P., LAI, T.-H., and DIXIT-RADIYA, V.A.: ‘‘Job Scheduling Is More Important Than Processor Allocation for Hypercube Computers,’’ IEEE Trans. Parallel and Distr. Syst., Vol. 5, pp. 488–497, May 1994.
KUMAR, V.P., and REDDY, S.M.: ‘‘Augmented Shuffle-Exchange Multistage Interconnection Networks,’’ Computer, Vol. 20, pp. 30–40, June 1987.
KURTH, M., GRAS, B., ANDRIESSE, D., GIUFFRIDA, C., BOS, H., and RAZAVI, K.: ‘‘Net-CAT: Practical Cache Attacks from the Network,’’ Proc. 41st IEEE Symp. on Security and Privacy, IEEE, 2020.
LAMPORT, L.: ‘‘Password Authentication with Insecure Communication,’’ Commun. ACM, Vol. 24, pp. 770–772, Nov. 1981.
LAMPSON, B.W., and STURGIS, H.E.: ‘‘Crash Recovery in a Distributed Data Storage System,’’ Xerox Palo Alto Research Center Technical Report, June 1979.
LAMPSON, B.W.: ‘‘A Note on the Confinement Problem,’’ Commun. ACM, Vol. 10, pp. 613–615, Oct. 1973.
LAMPSON, B.W.: ‘‘Hints for Computer System Design,’’ IEEE Software, Vol. 1, pp. 11–28, Jan. 1984.
LANDWEHR, C.E.: ‘‘Formal Models of Computer Security,’’ ACM Computing Surveys, Vol. 13, pp. 247–278, Sept. 1981.
LARUS, J., and HUNT, G.: ‘‘The Singularity System,’’ Commun. ACM, Vol. 53, pp. 72–79, Aug. 2010.
LEE, S.K., MOHAN, J., KASHYAP, S., KIM, T., and CHIDAMBARAM, V.: ‘‘Recipe: Converting Concurrent DRAM Indexes to Persistent-Memory Indexes,’’ Proc. 27th Symp. on Operating Syst. Prin., ACM, 2019.
LEVIN, R., COHEN, E.S., CORWIN, W.M., POLLACK, F.J., and WULF, W.A.: ‘‘Policy/Mechanism Separation in Hydra,’’ Proc. Fifth Symp. on Operating Syst. Prin., ACM, pp. 132–140, 1975.
LEVINE, G.N.: ‘‘Defining Deadlock,’’ ACM SIGOPS Operating Syst. Rev., Vol. 37, pp. 54–64, Jan. 2003.
LEVINE, J.G., GRIZZARD, J.B., and OWEN, H.L.: ‘‘Detecting and Categorizing KernelLevel Rootkits to Aid Future Detection,’’ IEEE Security and Privacy, Vol. 4, pp. 24–32, Jan./Feb. 2006.
LEVY, A., CAMPBELL, B., GHENA, B., GIFFIN, D.B., PANNUTO, P., DUTTA, P., and LEVIS, P..: ‘‘Multiprogramming a 64kB Computer Safely and Efficiently,’’ Proc. 26th Symp. on Operating Syst. Prin., ACM, pp. 234–251, 2017.
LI, B., RUAN, Z., XIAO, W., LU, Y., XIONG, Y., PUTNAM, A., CHEN, E., and ZHANG, L.: ‘‘KV-Direct: High-Performance In-Memory Key-Value Store with Programmable NIC,’’ Proc. 26th Symp. on Operating Syst. Prin., ACM, pp. 137–152, 2017.
LI, D., JIN, H., LIAO, X., ZHANG, Y., and ZHOU, B.: ‘‘Improving Disk I/O Performance in a Virtualized System,’’ J. Computer and Syst. Sci., Vol. 79, pp. 187–200, March 2013a.
LI, G., LU, S., MUSUVATHI, M., NATH, S., and PADHYE, R.: ‘‘Efficient Scalable ThreadSafety-Violation Detection: Finding Thousands of Concurrency Bugs During Testing,’’ Proc. 27th Symp. on Operating Syst. Prin., ACM, pp. 162–180, 2019.
LI, K., and HUDAK, P.: ‘‘Memory Coherence in Shared Virtual Memory Systems,’’ ACM Trans. Computer Syst., Vol. 7, pp. 321–359, Nov. 1989.
LI, K., KUMPF, R., HORTON, P., and ANDERSON, T.: ‘‘A Quantitative Analysis of Disk Drive Power Management in Portable Computers,’’ Proc. USENIX Winter Conf., USENIX, pp. 279–291, 1994.
LI, K.: Shared Virtual Memory on Loosely Coupled Multiprocessors, Ph.D. Thesis, Yale University, 1986.
LI, S., WANG, X., ZHANG, X., KONTORINIS, V., KODAKARA, S., LO, D., and RANGANATHAN, P.: ‘‘Thunderbolt: Throughput-Optimized, Quality-of-Service-Aware Power Capping at Scale,’’ Proc. 14th USENIX Symp. on Operating Syst. Design and Implementation, USENIX, pp. 1241–1255, 2020.
LIAO, X., LU, Y., XU, E., and SHU, J.: ‘‘Max: A Multicore-Accelerated File System for Flash Storage,’’ USENIX Ann. Tech. Conf., USENIX, pp. 877–891, 2021.
LIEDTKE, J.: ‘‘Improving IPC by Kernel Design,’’ Proc. 14th Symp. on Operating Syst. Prin., ACM, pp. 175–188, 1993.
LIEDTKE, J.: ‘‘On Micro-Kernel Construction,’’ Proc. 15th Symp. on Operating Syst. Prin., ACM, pp. 237–250, 1995.
LIEDTKE, J.: ‘‘Toward Real Microkernels,’’ Commun. ACM, Vol. 39, pp. 70–77, Sept. 1996.
LIN, Z., CHEN, Y., MU, D., YU, C., WU, Y., LI, K., and XING, X.: ‘‘GREBE: Unveiling Exploitation Potential for Linux Kernel Bugs,’’ Proc. 43rd Symp. on Security and Privacy, IEEE, 2022.
LION, D., CHIU, A., and Yuan, D.: ‘‘End-to-End Memory Management in Elastic System Software Stacks,’’ Proc. 16th EuroSys Conf., ACM, 2021.
LIONS, J.: Lions’ Commentary on Unix 6th Edition, with Source Code, San Jose, CA: Peerto-Peer Communications, 1996.
LIPP, M., SCHWARZ, M., GRUSS, D., PRESCHER, T., HAAS, W., HORN, J., MANGARD, S., and KOCHER, P.: ‘‘Meltdown, Reading Kernel Memory from User Space,’’ Commun. ACM, Vol. 63, pp. 46–56, June 2020.
LO, V.M.: ‘‘Heuristic Algorithms for Task Assignment in Distributed Systems,’’ Proc. Fourth Int’l Conf. on Distributed Computing Syst., IEEE, pp. 30–39, 1984.
LOUGHLIN, K., NEAL, I., MA, J., TSAI, E., WEISSE, O., NARAYANASAMY, S. And KASIKCI, B.,: ‘‘DOLMA: Securing Speculation with the Principle of Transient NonObservability,’’ Proc. 28th USENIX Security Symp., USENIX, 2019.
LOVE, R.: Linux System Programming: Talking Directly to the Kernel and C Library, Sebastopol, CA: O’Reilly & Associates, 2013.
LU, L., ARPACI-DUSSEAU, A.C., and ARPACI-DUSSEAU, R.H.: ‘‘Fault Isolation and Quick Recovery in Isolation File Systems,’’ Proc. Fifth USENIX Workshop on Hot Topics in Storage and File Syst., USENIX, 2013.
McKUSICK, M.K.: ‘‘Disks from the Perspective of a File System,’’ Commun. ACM, Vol. 55, pp. 53–55, Nov. 2012.
McKUSICK, M.K., BOSTIC, K., KARELS, M.J., QUARTERMAN, J.S.: The Design and Implementation of the 4.4BSD Operating System, Boston: Addison-Wesley, 1996.
McKUSICK, M.K., JOY, W.N., LEFFLER, S.J., and FABRY, R.S.:R ‘‘ Fast File System for UNIX’’ ACM Trans. Computer Syst., Vol. 2, pp 181–97, Aug. 1984.
McKUSICK, M.K., NEVILLE-NEIL, G.V., and WATSON, R.N.M.: The Design and Implementation of the FreeBSD Operating System, Boston: Addison-Wesley, 2014.
MA, A., DRAGGA, C., ARPACI-DUSSEAU, A.C., and ARPACI-DUSSEAU, R.H.: ‘‘ffsck: The Fast File System Checker,’’ Proc. 11th USENIX Conf. on File and Storage Tech., USENIX, 2013.
MANCO, F., LUPU C., SCHMIDT, F., MENDES, J., KUENZER, S., SATI, S., YASUKATA K., RAICIU, C., and HUICI F.: ‘‘My VM is Lighter (and Safer) than your Container,’’ Proc. 26th Symp. on Operating Syst. Prin., ACM, pp. 218–233, 2017.
MANEAS, S., MAHDAVIANI, K., EMAMI, T., and SCHROEDER, B.: ‘‘A Study of SSD Reliability in Large Scale Enterprise Storage Deployments,’’ Proc. 18th USENIX Conf. on File and Storage Tech., USENIX, 2020.
MARINO, D., HAMMER, C., DOLBY, J., VAZIRI, M., TIP, F., and VITEK, J.: ‘‘Detecting Deadlock in Programs with Data-Centric Synchronization,’’ Proc. Int’l Conf. on Software Eng., IEEE, pp. 322–331, 2013.
MARKETTOS, A. T., ROTHWELL, C., GUTSTEIN, B. F., PEARCE, A., NEUMANN, P.G., MOORE, S. W., and WATSON, R. N. M.: ‘‘Thunderclap: Exploring Vulnerabilities in Operating System IOMMU Protection via DMA from Untrustworthy Peripherals,’’ Proc. Network and Distributed Syst. Security Symp., Internet Society, 2019.
MAXWELL, S.: Linux Core Kernel Commentary, Scottsdale, AZ: Coriolis Group Books, 2001.
MEIJER, C. and VAN GASTEL, B: ‘‘Self-Encrypting Deception: Weaknesses in the Encryption of Solid State Drives,’’ Proc. IEEE Symp. on Security and Privacy, IEEE, 2019.
MELLOR-CRUMMEY, J.M., and SCOTT, M.L.: ‘‘Algorithms for Scalable Synchronization on Shared-Memory Multiprocessors,’’ ACM Trans. Computer Syst., Vol. 9, pp. 21–65, Feb. 1991.
MICROSOFT.: Protect your Windows devices against speculative execution side-channel attacks, Microsoft Support, 2018.
MILLER, S., KAIYUAN ZHANG, K., CHEN, M., RYAN JENNINGS, R., CHEN, A., ZHUO, D., and ANDERSON, T.: ‘‘High Velocity Kernel File Systems with Bento,’’ Proc. 19th USENIX Conf. on File and Storage Tech., USENIX, 2021.
MOODY, G.: Rebel Code, Cambridge. MA: Perseus Publishing, 2001.
MORRIS, R., and THOMPSON, K.: ‘‘Password Security: A Case History,’’ Commun. ACM, Vol. 22, pp. 594–597, Nov. 1979.
MOSELEY, R.: Advanced Cybersecurity Tech., London: CRC Press, 2021.
MULLENDER, S.J., and TANENBAUM, A.S.: ‘‘Immediate Files,’’ Software Practice and Experience, Vol. 14, pp. 365–368, 1984.
NEAL, I., GEFEI ZUO, G., SHIPLE, E., AHMED KHAN, T.A., KWON, Y., PETER, S., and KASIKCI, B.: ‘‘Rethinking File Mapping for Persistent Memory,’’ Proc. 19th USENIX Conf. on File and Storage Tech., USENIX, pp. 97–111, 2021.
NEAL, I., REEVES, D., STOLER, B., QUINN, A., KWON, Y., PETER, S., and KASIKCI, B.: ‘‘AGAMOTTO: How Persistent is your Persistent Memory Application?’’ Proc. 14th USENIX Symp. on Operating Syst. Design and Implementation, USENIX, 2020.
NELSON, M., LIM, B.-H., and HUTCHINS, G.: ‘‘Fast Transparent Migration for Virtual Machines,’’ Proc. USENIX Ann. Tech. Conf., USENIX, pp. 391–394, 2005.
NEMETH, E., SNYDER, G., HEIN, T.R., and WHALEY, B.: UNIX and Linux System Administration Handbook, 4th ed., Hoboken, NJ: Pearson, 2013.
NEWTON, G.: ‘‘Deadlock Prevention, Detection, and Resolution: An Annotated Bibliography,’’ ACM SIGOPS Operating Syst. Rev., Vol. 13, pp. 33–44, April 1979.
NGOIE, I: Windows Registry for Syst. Administration, Amazon, 2021.
NIST (National Institute of Standards and Technology): FIPS Pub. 180–1, 1995.
NIST (National Institute of Standards and Technology): ‘‘The NIST Definition of Cloud Computing,’’ Special Publication 800–145, Recommendations of the National Institute of Standards and Technology, 2011.
NOWATZKI, T., GANGADHAR, V., and SANKARALINGAM, K.: ‘‘Heterogeneous Von Neu-mann/Dataflow Microprocessors,’’ Commun. ACM, Vol. 62, pp. 83–91, June 2019.
OKI, B., PFLUEGL, M., SIEGEL, A., and SKEEN, D.: ‘‘The Information Bus—An Architecture for Extensible Distributed Systems,’’ Proc. 14th Symp. on Operating Syst. Prin., ACM, pp. 58–68, 1993.
OLIVERIO, M., RAZAVI, K., BOS, H., and GIUFFRIDA, C.: ‘‘Secure Page Fusion with VUsion,’’ Proc. 26th Symp. on Operating Syst. Prin., ACM, pp. 531–545, 2017.
ORGANICK, E.I.: The Multics System, Cambridge, MA: M.I.T. Press, 1972.
ORWICK, P., and SMITH, G.: Developing Drivers with the Windows Driver Foundation, Redmond, WA: Microsoft Press, 2007.
OSTERLUND, S., KONING K., OLIVIER P., BARBALACE, A., BOS, H., and GIUFFRIDA, C.: ‘‘kMVX: Detecting Kernel Information Leaks with Multi-variant Execution,’’ Proc. 24th Int. Conf. on Architectural Support for Programming Languages and Operating Syst., ACM, 2019.
OSTRAND, T.J., and WEYUKER, E.J.: ‘‘The Distribution of Faults in a Large Industrial Software System,’’ Proc. 2002 ACM SIGSOFT Int’l Symp. on Software Testing and Analysis, ACM, pp. 55–64, 2002.
OSTROWICK, J.: Locking Down Linux—An Introduction to Linux Security, Raleigh, NC: Lulu Press, 2013.
OUSTERHOUT, J.K.: ‘‘Scheduling Techniques for Concurrent Systems,’’ Proc. Third Int’l Conf. on Distrib. Computing Syst., IEEE, pp. 22–30, 1982.
OUSTERHOUT, J.L.: ‘‘Why Threads Are a Bad Idea (for Most Purposes),’’ Presentation at Proc. USENIX Winter Conf., USENIX, 1996.
PAPAGIANNIS, A., MARAZAKIS, M., and BILAS, A.: ‘‘Memory-Mapped I/O on Steroids,’’ Proc. 16th European Conf. on Computer Syst., ACM, pp. 277–293, 2021.
PARK, J., KI, M., CHUN, M., OROSA, L., KIM, J., and MUTLU, O.: ‘‘Reducing Solid State Drive Read Latency by Optimizing Read-Retry,’’ Proc. 26th ACM International Conf. on Architectural Support for Programming Languages and Operating Syst., ACM, 2021.
PASQUINI, D., CIANFRIGLIA, M., ATENIESE, G., and BERNASCHI, M.: ‘‘Reducing Bias in Modeling Real-world Password Strength via Deep Learning and Dynamic Dictionaries,’’ Proc. 30th USENIX Security Symp., USENIX, pp. 821–838, 2021.
PATE, S.D.: UNIX Filesystems: Evolution, Design, and Implementation, Hoboken, NJ: John Wiley & Sons, 2003.
PATTERSON, D.A., GIBSON, G., and KATZ, R.: ‘‘A Case for Redundant Arrays of Inexpensive Disks (RAID),’’ Proc. ACM SIGMOD Int’l. Conf. on Management of Data, ACM, pp. 109–166, 1988.
PATTERSON, D.A., and HENNESSY, J.L.: Computer Organization and Design, 5th ed., Burlington, MA: Morgan Kaufman, 2013.
PATTERSON, D.A., and HENNESSY, J.L.: Computer Organization and Design RISC V Edition, Cambridge, MA: Morgan Kaufmann, 2018.
PETERSON, G.L.: ‘‘Myths about the Mutual Exclusion Problem,’’ Inform. Proc. Letters, Vol. 12, pp. 115–116, June 1981.
PETRUCCI, V., and LOQUES, O.: ‘‘Lucky Scheduling for Energy-Efficient Heterogeneous Multi-core Systems,’’ Proc. USENIX Workshop on Power-Aware Computing and Syst., USENIX, 2012.
PETZOLD, C.: Programming Windows, 6th ed., Redmond, WA: Microsoft Press, 2013.
PIKE, R., PRESOTTO, D., THOMPSON, K., TRICKEY, H., and WINTERBOTTOM, P.: ‘‘The Use of Name Spaces in Plan 9,’’ Proc. Fifth ACM SIGOPS European Workshop, ACM, pp. 1–5, 1992.
PINA, L., ANDRONIDIS, A., HICKS, M., and CADAR, C.: ‘‘MVEDSUA : Higher Availability Dynamic Software Updates via Multi-Version Execution,’’ Proc. 24th Int. Conf. on Architectural Support for Programming Languages and Operating Syst., ACM, 2019.
PISMENNY, B., ERAN, H., YEHEZKEL, A., LISS, L., MORRISON, A., and TSAFRIR, D.: ‘‘Autonomous NIC Offloads,’’ Proc. 26th ACM International Conf. on Architectural Support for Programming Languages and Operating Syst., ACM, 2021.
PLANA, L. A., TEMPLE, S., HEATHCOTE, J., CLARK, D., PEPPER, J., GARSIDE, J., and FURBER, S.: ‘‘Building SpiNNaker Machines,’’ SpiNNaker: a spiking neural network architecture, Now Publishers, Inc., pp. 53–78, Dec. 2020.
POPEK, G.J., and GOLDBERG, R.P.: ‘‘Formal Requirements for Virtualizable Third Generation Architectures,’’ Commun. ACM, Vol. 17, pp. 412–421, July 1974.
PORTNOY, M.: Virtualization Essentials, Hoboken, NJ: John Wiley & Sons, 2012.
PRECHELT, L.: ‘‘An Empirical Comparison of Seven Programming Languages,’’ Computer, Vol. 33, pp. 23–29, Oct. 2000.
PYLA, H., and VARADARAJAN, S.: ‘‘Transparent Runtime Deadlock Elimination,’’ Proc. 21st Int’l Conf. on Parallel Architectures and Compilation Techniques, ACM, pp. 477–478, 2012.
QIN, H., LI, Q., SPEISER, J., KRAFT, P., and OUSTERHOUT, J.: ‘‘Arachne: Core-Aware Thread Management,’’ Proc. 13th USENIX Symp. on Operating Syst. Design and Implementation, USENIX, pp. 145–160, 2018.
RAGAB, H., BARBERIS, E., BOS, H., GIUFFRIDA, C.: ‘‘Rage Against the Machine Clear: A Systematic Analysis of Machine Clears and Their Implications for Transient Execution Attacks,’’ Proc. 30th USENIX Security Symp., USENIX, 2021.
RANDAL, A.: ‘‘The Ideal Versus the Real: Revisiting the History of Virtual Machines and Containers,’’ ACM Computing Surveys, Vol. 53, pp.1–31, May 2020.
RECTOR, B.E., and NEWCOMER, J.M.: Win32 Programming, Boston: Addison-Wesley, 1997.
REEVES, R.D.: Windows 7 Device Driver, Boston: Addison-Wesley, 2010.
REGHENZANI, F., MASSARI, G., FORNACIARI, W.: ‘‘The Real-Time Linux Kernel: A Survey on PREEMPT RT,’’ ACM Computing Surveys, Vol. 52, Art. 18, pp. 1–36, Feb. 2019.
RITCHIE, D.M., and THOMPSON, K.: ‘‘The UNIX Timesharing System,’’ Commun. ACM, Vol. 17, pp. 365–375, July 1974.
RIVEST, R.L., SHAMIR, A., and ADLEMAN, L.: ‘‘On a Method for Obtaining Digital Signatures and Public Key Cryptosystems,’’ Commun. ACM, Vol. 21, pp. 120–126, Feb. 1978.
RIZZO, L.: ‘‘Netmap: A Novel Framework for Fast Packet I/O,’’ Proc. USENIX Ann. Tech. Conf., USENIX, 2012.
ROCHE, T., LOMN, V., MUTSCHLER, C., and IMBERT, L.: ‘‘A Side Journey To Titan,’’ Proc. 30th USENIX Security Symp., USENIX, pp. 231–248, 2021.
RODRIGUES, E.R., NAVAUX, P.O., PANETTA, J., and MENDES, C.L.: ‘‘A New Technique for Data Privatization in User-Level Threads and Its Use in Parallel Applications,’’ Proc. 2010 Symp. on Applied Computing, ACM, pp. 2149–2154, 2010.
ROSCOE, T., ELPHINSTONE, K., and HEISER, G.: ‘‘Hype and Virtue,’’ Proc. 11th Workshop on Hot Topics in Operating Syst., USENIX, pp. 19–24, 2007.
ROSENBLUM, M., BUGNION, E., DEVINE, S. and HERROD, S.A.: ‘‘Using the SIMOS Machine Simulator to Study Complex Computer Systems,’’ ACM Trans. Model. Comput. Simul., Vol. 7, pp. 78–103, 1997.
ROSENBLUM, M., and GARFINKEL, T.: ‘‘Virtual Machine Monitors: Current Technology and Future Trends,’’ Computer, Vol. 38, pp. 39–47, May 2005.
ROSENBLUM, M., and OUSTERHOUT, J.K.: ‘‘The Design and Implementation of a LogStructured File System,’’ Proc. 13th Symp. on Operating Syst. Prin., ACM, pp. 1–15, 1991.
ROZIER, M., ABROSSIMOV, V., ARMAND, F., BOULE, I., GIEN, M., GUILLEMONT, M., HERRMANN, F., KAISER, C., LEONARD, P., LANGLOIS, S., and NEUHAUSER, W.: ‘‘Chorus Distributed Operating Systems,’’ Computing Syst., Vol. 1, pp. 305–379, Oct. 1988.
RUAN, Z., SCHWARZKOPF, M., AGUILERA, M.K., and BELAY, A.: ‘‘AIFM: High-Performance, Application-Integrated Far Memory,’’ Proc. 14th USENIX Symp. on Operating Syst. Design and Implementation, USENIX, 2020.
RUAN, Z., SCHWARZKOPF, M., AGUILERA, M.K., and BELAY, A.: ‘‘AIFM: High-Performance, Application-Integrated Far Memory,’’ Proc. 14th USENIX Symp. on Operating Syst. Design and Implementation, USENIX, pp. 315–332, 2020.
RUSSINOVICH, M., GOVINDARAJU, N., RAGHURAMAN, M., HEPKIN, D., and KISHAN, A.: ‘‘Virtual Machine Preserving Host Updates for Zero Day Patching in Public Cloud,’’ Proc. 16th EuroSys Conf., ACM, 2021.
RUSSINOVICH, M., and SOLOMON, D.: Windows Internals, Part 1, Redmond, WA: Microsoft Press, 2012.
SACKMAN, H., ERIKSON, W.J., and GRANT, E.E.: ‘‘Exploratory Experimental Studies Comparing Online and Offline Programming Performance,’’ Commun. ACM, Vol. 11, pp. 3–11, Jan. 1968.
SALTZER, J.H.: ‘‘Protection and Control of Information Sharing in MULTICS,’’ Commun. ACM, Vol. 17, pp. 388–402, July 1974.
SALTZER, J.H., and KAASHOEK, M.F.: Principles of Computer System Design: An Introduction, Burlington, MA: Morgan Kaufmann, 2009.
SALTZER, J.H., REED, D.P., and CLARK, D.D.: ‘‘End-to-End Arguments in System Design,’’ ACM Trans. Computer Syst., Vol. 2, pp. 277–288, Nov. 1984.
SALTZER, J.H., and SCHROEDER, M.D.: ‘‘The Protection of Information in Computer Systems,’’ Proc. IEEE, Vol. 63, pp. 1278–1308, Sept. 1975.
SALUS, P.H.: ‘‘UNIX At 25,’’ Byte, Vol. 19, pp. 75–82, Oct. 1994.
SANTOS, H.M.D.: Cybersecurity: A Practical Engineering Approach, London: Chapman and Hall, 2022.
SASSE, M.A.: ‘‘Red-Eye Blink, Bendy Shuffle, and the Yuck Factor: A User Experience of Biometric Airport Systems,’’ IEEE Security and Privacy, Vol. 5, pp. 78–81, May/June 2007.
SCHEIBLE, J.P.: ‘‘A Survey of Storage Options,’’ Computer, Vol. 35, pp. 42–46, Dec. 2002.
SCHOENFIELD, S.E.: Securing Syst., London: CRC Press, 2021.
SCHWARZKOPF, M and BAILIS, P.: ‘‘Research for Practice: Cluster Scheduling for Datacenters,’’ Commun. ACM, Vol. 6, pp. 50–53, May 2018.
SCOTT, M., LeBLANC, T., and MARSH, B.: ‘‘Multi-Model Parallel Programming in Psyche,’’ Proc. Second ACM Symp. on Principles and Practice of Parallel Programming, ACM, pp. 70–78, 1990.
SEAWRIGHT, L.H., and MACKINNON, R.A.: ‘‘VM/370—A Study of Multiplicity and Usefulness,’’ IBM Syst. J., Vol. 18, pp. 4–17, 1979.
SEREBRYANY, K., BRUENING, D., POTAPENKO, A., and VYUKOV, D.: ‘‘AddressSanitizer: A Fast Address Sanity Checker,’’ Proc. USENIX Ann. Tech. Conf., USENIX, pp. 28–28, 2013.
SETTY, S., ANGEL, S., GUPTA, T., and LEE, J.: ‘‘Proving the Correct Execution of Concurrent Services in Zero-Knowledge,’’ Proc. 13th USENIX Symp. on Operating Syst. Design and Implementation, USENIX, 2018.
SHAHRAD, M., FONSECA, R., GOIRI, I., CHAUDHRY, G., BATUM, P., COOKE, J., LAUREANO, E., TRESNESS, C., RUSSINOVICH, M., and .BIANCHINI, R.: ‘‘Serverless in the Wild: Characterizing and Optimizing the Serverless Workload at a Large Cloud Provider,’’ Proc. Annual Technical Conf., USENIX, pp. 205–218, 2020.
SHAN, Y., HUNAG, Y., CHEN, Y., and ZHANG, Y.: ‘‘LegoOS: A Disseminated, Distributed OS for Hardware Resource Disaggregation,’’ Proc. 13th USENIX Symp. on Operating Syst. Design and Implementation, USENIX, pp. 69–87, 2018.
SHEN, K., SHRIRAMAN, A., DWARKADAS, S., ZHANG, X., and CHEN, Z.: ‘‘Power Containers: An OS Facility for Fine-Grained Power and Energy Management on Multicore Servers,’’ Proc. 18th Int’l Conf. on Arch. Support for Prog. Lang. and Operating Syst., ACM, pp. 65–76, 2013.
SHOTTS, W.: The Linux Command Line 2nd ed., Amazon, 2019.
SHUB, C.M: ‘‘A Unified Treatment of Deadlock,’’ J. Computing Sciences in Colleges, Vol. 19, pp. 194–204, Oct. 2003.
SILBERSCHATZ, A., GALVIN, P.B., and GAGNE, G: Operating Syst. 10th Hoboken, NJ: Wiley, 2018.
SIMON, R.J.: Windows NT Win32 API SuperBible, Corte Madera, CA: Sams Publishing, 1997.
SINGH, A., ONG, J., AGARWAL, A., ANDERSON, G., ARMISTEAD, A., BANNON, R., BOVING, S., DESAI, G., FELDERMAN, B., GERMANO, P., KANAGALA, A., LIU, H., PROVOST, J., SIMMONS, J., TANDA, E., WANDERER, J., HOLZLE, U., STUART, S., and VAHDAT, A.:s10 ‘‘Jupiter Rising: A Decade of Clos Topologies and Centralized Control in Google’s Datacenter Network,’’ Commun. ACM, Vol. 59, pp. 88–97, Sep. 2016.
SMITH, D,K., and ALEXANDER, R.C.: Fumbling the Future: How Xerox Invented, Then Ignored, the First Personal Computer, New York: William Morrow, 1988.
SNIR, M., OTTO, S.W., HUSS-LEDERMAN, S., WALKER, D.W., and DONGARRA, J.: MPI: The Complete Reference Manual, Cambridge, MA: M.I.T. Press, 1996. IEEE, pp. 574–588, 2013.
SNOW, K., MONROSE, F., DAVI, L., DMITRIENKO, A., LIEBCHEN, C., and SADEGHI, A.-R.: ‘‘Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization,’’ Proc. IEEE Symp. on Security and Privacy, IEEE, pp. 574–588, 2013.
SOBELL, M.: A Practical Guide to Fedora and Red Hat Enterprise Linux, 7th ed., Hoboken, NJ: Pearson, 2014.
SPAFFORD, E., HEAPHY, K., and FERBRACHE, D.: Computer Viruses, Arlington, VA: ADAPSO, 1989.
SRIRAMAN, A., and WENISCH, T.F.: ‘‘Tune: Auto-Tuned Threading for OLDI Microservices,’’ Proc. 13th USENIX Symp. on Operating Syst. Design and Implementation, USENIX, 2018.
STALLINGS, W.: Operating Syst., 9th ed., Hoboken, NJ: Pearson, 2017.
STAN, M.R., and SKADRON, K: ‘‘Power-Aware Computing,’’ Computer, Vol. 36, pp. 35–38, Dec. 2003.
STEVENS, R.W., and RAGO, S.A.: Advanced Programming in the UNIX Environment, Boston: Addison-Wesley, 2013.
STONE, H.S., and BOKHARI, S.H.: ‘‘Control of Distributed Processes,’’ Computer, Vol. 11, pp. 97–106, July 1978.
STRATTON, J.A., RODRIGUES, C., SUNG, I.-J., CHANG, L.-W., ANSSARI, N., LIU, G., HWU, W.-M., and OBEID, N.: ‘‘Algorithm and Data Optimization Techniques for Scaling to Massively Threaded Systems,’’ Computer, Vol. 45, pp. 26–32, Aug. 2012.
SUGERMAN, J., VENKITACHALAM, G., and LIM, B.-H: ‘‘Virtualizing I/O Devices on VMware Workstation’s Hosted Virtual Machine Monitor,’’ Proc. USENIX Ann. Tech. Conf., USENIX, pp. 1–14, 2001.
SWANSON, S., and CAULFIELD, A.M.: ‘‘Refactor, Reduce, Recycle: Restructuring the I/O Stack for the Future of Storage,’’ Computer, Vol. 46, pp. 52–59, Aug. 2013.
TACK LIM, J., DALL, C., LI, S.-W., NIEH, J. and ZYNGIER, M.: ‘‘NEVE: Nested Virtualization Extensions for ARM,’’ Proc. 26th Symp. on Operating Syst. Prin., ACM, pp. 201–217, 2017.
TAIABUL HAQUE, S.M., WRIGHT, M., and SCIELZO, S.: ‘‘A Study of User Password Strategy for Multiple Accounts,’’ Proc. Third Conf. on Data and Appl. Security and Privacy, ACM, pp. 173–176, 2013.
TALLURI, M., HILL, M.D., and KHALIDI, Y.A.: ‘‘A New Page Table for 64-Bit Address Spaces,’’ Proc. 15th Symp. on Operating Syst. Prin., ACM, pp. 184–200, 1995.
TANENBAUM, A.S.: ‘‘Lessons Learned from 30 Years of MINIX,’’ Commun. ACM, ACM, Vol. 59 No. 3, pp.70–78, March 2016".
TANENBAUM, A.S., and AUSTIN, T.: Structured Computer Organization, 6th ed., Hoboken, NJ: Pearson, 2012.
TANENBAUM, A.S., FEAMSTER, N., and WETHERALL, D.: Computer Networks, 6th ed., Hoboken, NJ: Pearson, 2020.
TANENBAUM, A.S., VAN RENESSE, R., VAN STAVEREN, H., SHARP, G.J., MULLENDER, S.J., JANSEN, J., and VAN ROSSUM, G.: ‘‘Experiences with the Amoeba Distributed Operating System,’’ Commun. ACM, Vol. 33, pp. 46–63, Dec. 1990.
TANENBAUM, A.S., and WOODHULL, A.S.: Operating Syst.: Design and Implementation, 3rd ed., Hoboken, NJ: Pearson, 2006.
TARANOV, K., BRUNO, R., ALONSO G., and HOEFLER, T.: ‘‘Naos: Serialization-free RDMA Networking in Java,’’ Proc. USENIX Ann. Tech. Conf., USENIX, pp. 1–14, 2021.
TARASOV, V., HILDEBRAND, D., KUENNING, G., and ZADOK, E.: ‘‘Virtual Machine Workloads: The Case for New NAS Benchmarks,’’ Proc. 11th USENIX Conf. on File and Storage Tech., USENIX, 2013.
TEORY, T.J.: ‘‘Properties of Disk Scheduling Policies in Multiprogrammed Computer Systems,’’ Proc. AFIPS Fall Joint Computer Conf., AFIPS, pp. 1–11, 1972.
TIMMER, J.: ‘‘Inching Closer to a DNA-Based File System,’’ Ars Technica, Feb. 2021.
THALHEIM, J., UNNIBHAVI, H., PRIEBE, C., BHATOTIA, P., and PIETZUCH, P.: ‘‘rkt-io: A Direct I/O Stack for Shielded Execution,’’ Proc. 16th European Conf. on Computer Syst., ACM, 2021.
THOMPSON, K.: ‘‘Reflections on Trusting Trust,’’ Commun. ACM, Vol. 27, pp. 761–763, Aug. 1984.
TRACH, B., FAQEH, R., OLEKSENKO, O., OZGA, W., BHATOTIA, P., and FETZER, C.: ‘‘T-Lease: a Trusted Lease Primitive for Distributed Systems,’’ Proc. ACM Symp. on Cloud Computing, ACM, pp. 387–400, 2020.
TUCKER, A., and GUPTA, A.: ‘‘Process Control and Scheduling Issues for Multiprogrammed Shared-Memory Multiprocessors,’’ Proc. 12th Symp. on Operating Syst. Prin., ACM, pp. 159–166, 1989.
UHLIG, R. NEIGER, G., RODGERS, D., SANTONI, A.L., MARTINS, F.C.M., ANDERSON, A.V., BENNET, S.M., KAGI, A., LEU NG, F.H., and SMITH, L.: ‘‘Intel Virtualization Technology,’’ Computer, vol. 38, pp. 48–56, 2005.
VAGHANI, S.B.: ‘‘Virtual Machine File System,’’ ACM SIGOPS Operating Syst. Rev., Vol. 44, pp. 57–70, 2010.
VAHALIA, U.: UNIX Internals—The New Frontiers, Hoboken, NJ: Pearson, 2007.
VAHLDIEK-OBERWAGNER, A., ELNIKETY, E., DUARTE, N.O., SAMMLER, M., DRUSCHEL, P., and GARG, D.: ‘‘ERIM: Secure, Efficient In-process Isolation with Protection Keys (MPK),’’ Proc. 28th USENIX Security Symp., USENIX, pp. 1221–1238, 2019.
VAN DER VEEN, V., DDUTT-SHARMA, N., CAVALLARO, L., and BOS, H.: ‘‘Memory Errors: The Past, the Present, and the Future,’’ Proc. 15th Int’l Conf. on Research in Attacks, Intrusions, and Defenses, Berlin: Springer-Verlag, pp. 86–106, 2012.
VAN OORSCHOT, P.C.: Computer Security and the Internet, Berlin: Springer, 2020.
VAN STEEN, and TANENBAUM, A.S.: Distributed Syst., 3rd ed., Amazon, 2017.
VIENNOT, N., NAIR, S., and NIEH, J.: ‘‘Transparent Mutable Replay for Multicore Debugging and Patch Validation,’’ Proc. 18th Int’l Conf. on Arch. Support for Prog. Lang. and Operating Syst., ACM, 2013.
VINOSKI, S.: ‘‘CORBA: Integrating Diverse Applications within Distributed Heterogeneous Environments,’’ IEEE Commun. Magazine, Vol. 35, pp. 46–56, Feb. 1997.
VISCAROLA, P.G, MASON, T., CARIDDI, M., RYAN, B., and NOONE, S.: Introduction to the Windows Driver Foundation Kernel-Mode Framework, Amherst, NH: OSR Press, 2007.
VMWARE, Inc.: ‘‘Achieving a Million I/O Operations Per Second from a Single VMware vSphere 5.0 Host,’’ http:/
VOLOS, S. VASWANI, K, and BRUNO, R.: ‘‘Graviton: Trusted Execution Environments on GPUs,’’ Proc. 13th USENIX Symp. on Operating Syst. Design and Implementation, USENIX, 2018.
VON BEHREN, R., CONDIT, J., and BREWER, E.: ‘‘Why Events Are A Bad Idea (for HighConcurrency Servers),’’ Proc. Ninth Workshop on Hot Topics in Operating Syst., USENIX, pp. 19–24, 2003.
VON EICKEN, T., CULLER, D., GOLDSTEIN, S.C., and SCHAUSER, K.E.: ‘‘Active Messages: A Mechanism for Integrated Communication and Computation,’’ Proc. 19th Int’l Symp. on Computer Arch., ACM, pp. 256–266, 1992.
VOSTOKOV, D.: Windows Device Drivers: Practical Foundations, Opentask, 2009.
WADDINGTON, D., and HARRIS, J.: ‘‘Software Challenges for the Changing Storage Landscape,’’ Commun. ACM, Vol. 61, pp. 136–145, Nov. 2018.
WAHBE, R., LUCCO, S., ANDERSON, T., and GRAHAM, S.: ‘‘Efficient Software-Based Fault Isolation,’’ Proc. 14th Symp. on Operating Syst. Prin., ACM, pp. 203–216, 1993.
WALDSPURGER, C.A.: ‘‘Memory Resource Management in VMware ESX Server,’’ ACM SIGOPS Operating Syst. Rev., Vol. 36, pp. 181–194, Jan. 2002.
WALDSPURGER, C.A., and ROSENBLUM, M.: ‘‘I/O Virtualization,’’ Commun. ACM, Vol. 55, pp. 66–73, 2012.
WALDSPURGER, C.A., and WEIHL, W.E.: ‘‘Lottery Scheduling: Flexible ProportionalShare Resource Management,’’ Proc. First USENIX Symp. on Operating Syst. Design and Implementation, USENIX, pp. 1–12, 1994.
WALKER, W., and CRAGON, H.G.: ‘‘Interrupt Processing in Concurrent Processors,’’ Computer, Vol. 28, pp. 36–46, June 1995.
WANG, Q., LU, Y., XU, E., LI, J., CHEN, Y., and SHU, Y.: ‘‘Concordia: Distributed Shared Memory with In-Network Cache Coherence,’’ Proc. 19th USENIX Conf. on File and Storage Tech., USENIX, pp. 277–292, 2021.
WANG, Z., WU, C., ZHANG, Y., TANG, B., YEW, P-C., XIE, M., LAI, Y., KANG, Y., CHENG, Y., and SHI, Z.: ‘‘SafeHidden: An Efficient and Secure Information Hiding Technique Using Re-randomization,’’ Proc. 28th USENIX Security Symp., USENIX, 2019.
WEI, X., DONG, Z., CHEN, R., and CHEN, H.: ‘‘Deconstructing RDMA-Enabled Distributed Transactions: Hybrid is Better!,’’ Proc. 13th USENIX Symp. on Operating Syst. Design and Implementation, USENIX, pp. 233–251, 2018.
WHITAKER, A., COX, R.S., SHAW, M, and GRIBBLE, S.D.: ‘‘Rethinking the Design of Virtual Machine Monitors,’’ Computer, Vol. 38, pp. 57–62, May 2005.
WHITAKER, A., SHAW, M, and GRIBBLE, S.D.: ‘‘Scale and Performance in the Denali Isolation Kernel,’’ ACM SIGOPS Operating Syst. Rev., Vol. 36, pp. 195–209, Jan. 2002.
WIRTH, N.: ‘‘A Plea for Lean Software,’’ Computer, Vol. 28, pp. 64–68, Feb. 1995.
WOODRUFF, J., WATSON, R.N.M., CHISNALL, D., MOORE, S.W., ANDERSON, J., DAVIS, B., and LAURIE, B.: ‘‘The CHERI Capability Model: Revisiting RISC in an Age of Risk,’’ Proc. ISCA, ACM, pp. 457–468, 2014.
WULF, W.A., COHEN, E.S., CORWIN, W.M., JONES, A.K., LEVIN, R., PIERSON, C., and POLLACK, F.J.: ‘‘HYDRA: The Kernel of a Multiprocessor Operating System,’’ Commun. ACM, Vol. 17, pp. 337–345, June 1974.
XIAO, W., BHARDWAJ, R., RAMJEE, R., SIVATHANU, M., KWATRA, N., HAN, Z., PATEL, P., PENG, X., ZHAO, H., ZHANG, Q., YANG, F. and ZHOU1, L.: ‘‘Gandiva: Introspective Cluster Scheduling for Deep Learning,’’ Proc. 13th USENIX Symp. on Operating Syst. Design and Implementation, USENIX, 2018.
XIONG, W., and SZEFER, J.: ‘‘Survey of Transient Execution Attacks and Their Mitigations,’’ ACM Computing Surveys, Vol. 54, no. 3, Article 54, June 2021.
YANG, S., LIU, J., ARPACI-DUSSEAU, A.C., and ARPACI-DUSSEAU, R.H.: ‘‘Principled Schedulability Analysis for Distributed Storage Systems Using Thread Architecture Models,’’ Proc. 13th USENIX Symp. on Operating Syst. Design and Implementation, USENIX, 2018.
YOSIFOVICH, P., SOLOMON, D., IONESCU, A., and RUSSINOVICH, M: Windows Internals, Part 1, Amazon, 2017.
YOSIFOVICH, P.: Windows Kernel Programming, Victoria, B.C.: Leanpub, 2019.
YOSIFOVICH, P.: Windows 10 System Programming, Amazon, 2020.
YOUNG, E.G., ZHU, P., CARAZA-HARTER, T., ARPACI-DUSSEAU, A.C., and ARPACI-DUSSEAU, R.H.: ‘‘The True Cost of Containing: A gVisor Case Study,’’ 11th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud), USENIX, 2019.
YOUNG, M., TEVANIAN, A., Jr., RASHID, R., GOLUB, D., EPPINGER, J., CHEW, J., BOLOSKY, W., BLACK, D., and BARON, R.: ‘‘The Duality of Memory and Communication in the Implementation of a Multiprocessor Operating System,’’ Proc. 11th Symp. on Operating Syst. Prin., ACM, pp. 63–76, 1987.
YU, M., GLIGOR, V., and JIA, L.: ‘‘An I/O Separation Model for Formal Verification of Kernel Implementations,’’ Proc. 42nd Symp. on Security and Privacy, IEEE, 2021.
ZACHARY, G.P.: Showstopper, New York: Maxwell Macmillan, 1994.
ZAHORJAN, J., LAZOWSKA, E.D., and EAGER, D.L.: ‘‘The Effect of Scheduling Discipline on Spin Overhead in Shared Memory Parallel Systems,’’ IEEE Trans. Parallel and Distr. Syst., Vol. 2, pp. 180–198, April 1991.
ZHANG, C., WEI, T., CHEN, Z., DUAN, L., SZEKERES, L., MCCAMANT, S., SONG, D., and ZOU, W.: ‘‘Practical Control Flow Integrity and Randomization for Binary Executables,’’ Proc. IEEE Symp. on Security and Privacy, IEEE, pp. 559–573, 2013b.
ZHANG, W., SHENKER, S., and ZHANG, I.: ‘‘Persistent State Machines for Recoverable Inmemory Storage Systems with NVRam,’’ Proc. 14th USENIX Symp. on Operating Syst. Design and Implementation, USENIX, 2020.
ZHANG, Y., SOUNDARARAJAN, G., STORER, M.W., BAIRAVASUNDARAM, L., SUBBIAH, S., ARPACI-DUSSEAU, A.C., and ARPACI-DUSSEAU, R.H.: ‘‘Warming Up Storage-Level Caches with Bonfire,’’ Proc. 11th USENIX Conf. on File and Storage Tech., USENIX, 2013a.
ZHAO, K., S. GONG, S., and FONSECA, P.: ‘‘On-Demand-Fork: A Microsecond Fork for Memory-Intensive and Latency-Sensitive Applications,’’ Proc. 16th EuroSys Conf., ACM, 2021.
ZHAO, Z., SADOK, H., ATRE, N., HOE, J. C., SEKAR, V., and SHERRY, J.: ‘‘Achieving 100Gbps Intrusion Prevention on a Single Server,’’ Proc. 14th USENIX Symp. on Operating Syst. Design and Implementation, USENIX, pp. 1083–1100, 2020.
ZHURAVLEV, S., SAEZ, J.C., BLAGODUROV, S., FEDOROVA, A., and PRIETO, M.: ‘‘Survey of Scheduling Techniques for Addressing Shared Resources in Multicore Processors,’’ ACM Computing Surveys, ACM, Vol. 45, Number 1, Art. 4, 2012.
ZOU, M., DING, H., DU, D., FU, M., GU, R., and CHEN, H.: ‘‘Using Concurrent Relational Logic with Helpers for Verifying the AtomFS File System,’’ Proc. 27th Symp. on Operating Syst. Prin., ACM, pp. 259–274, 2019.
ZOU, X., YUAN, J., SHILANE, P., XIA, W., ZHANG, H., and WANG, X.: ‘‘The Dilemma between Deduplication and Locality: Can Both be Achieved?,’’ Proc. 19th USENIX Conf. on File and Storage Tech., USENIX, pp. 171–185, 2021.
ZUBERI, K.M., PILLAI, P., and SHIN, K.G.: ‘‘EMERALDS: A Small-Memory Real-Time Microkernel,’’ Proc. 17th Symp. on Operating Syst. Prin., ACM, pp. 277–299, 1999.
ZWICKY, E.D.: ‘‘Torture-Testing Backup and Archive Programs: Things You Ought to Know But Probably Would Rather Not,’’ Proc. Fifth Conf. on Large Installation Syst. Admin., USENIX, pp. 181–190, 1991.