SYSTOR '15 Proceedings of the 8th ACM International Systems and Storage Conference
Full Citation in the ACM Digital Library

Day 1: Tuesday May 26, 2015

09:00 Registration

09:30 Opening remarks and best paper announcement

09:45 Keynote #1: The less brave world of new trusted hardware,
Andrew Baumann (Microsoft Research)   [Abstract], [Speaker Bio]

Abstract:

Aside from some limited applications, trusted computing hardware has largely failed to inspire trust or achieve widespread adoption. Rather, security for many applications rests on a messy combination of cryptography, reputation, law, and blind faith. As more computation moves to the cloud, this is a serious concern: cloud users rely on both the provider's staff and its globally-distributed software/hardware platform not to expose any of their private data. However, newly emerging hardware promises to change this, both in the cloud setting and more generally in many decentralised systems.

In this talk, I'll first introduce the notion of shielded execution, which protects the confidentiality and integrity of a program and its data from the platform on which it runs (i.e., the cloud operator's OS, VM and firmware). I'll present our work on Haven, the first system to achieve shielded execution of unmodified legacy applications, including SQL Server and Apache, on a commodity OS (Windows) and commodity hardware (Intel SGX). I'll close with some thoughts on applying SGX-like hardware protection more generally, and discuss the opportunities and challenges it creates for systems research.

Bio:

Andrew Baumann is a researcher in the OS group at Microsoft Research, Redmond. His research interests include operating systems, distributed systems, systems support for new hardware, and systems aspects of security. Past institutions include The University of New South Wales (BE/PhD), IBM T.J. Watson (extended internship), and ETH Zurich (postdoc). Past and current projects include the L4 microkernel, Mungi single-address-space OS, K42 multiprocessor OS, Barrelfish multikernel OS, Drawbridge LibOS, and Ironclad verified system.

10:45 Coffee Break

11:10 Session 1: Virtualization

Puma: Pooling Unused Memory in Virtual Machines for I/O intensive applications
Authors: Maxime Lorrillere, Julien Sopena, Sébastien Monnet, and Pierre Sens (LIP6 (UPMC/CNRS) - Inria)

Selfie: Co-locating Metadata and Data to Enable Fast Virtual Block Devices
Authors: Xingbo Wu (Wayne State University), Zili Shao (The Hong Kong Polytechnic University), and Song Jiang (Wayne State University)

Efficient Replication for Distributed Fault Tolerant Memory (SHORT)
Authors: Deepavali Bhagwat, Chethan Kumar, and Satyam Vaghani (PernixData, Inc.)

Highlight Papers (1)

Exploring Heterogeneity within a Core for Improved Power Efficiency (Highlight paper, IEEE TPDS 2015)
Authors: Israel Koren, Sudarshan Srinivasan, Nithesh Kurella, Sandip Kundu (University of Massachusetts, Amherst)

Write Once, Get 50% Free: Saving SSD Erase Costs Using WOM Codes (Highlight paper, FAST 2015)
Authors: Gala Yadgar, Eitan Yaakobi, and Assaf Schuster (Technion – Israel Institute of Technology)

SDGen: Mimicking Datasets for Content Generation in Storage Benchmarks (Highlight paper, FAST 2015)
Authors: Raúl Gracia-Tinedo (Universitat Rovira i Virgili), Danny Harnik, Dalit Naor, and Dmitry Sotnikov (IBM Research Haifa), and Sivan Toledo and Aviad Zuck (Tel-Aviv University)

13:30 Lunch

14:30 Session 2a: Storage - SSD

Algebraic Modeling of Write Amplification in Hotness-aware SSD
Authors: Yue Yang and Jianwen Zhu (University of Toronto)

Read Leveling for Flash Storage Systems
Authors: Chun-Yi Liu (Institute of Information Science, Academia Sinica, Taipei, Taiwan, R.O.C.), Yu-Ming Chang (Macronix International Co., Ltd., Emerging System Lab., Hsinchu, Taiwan, R.O.C.), and Yuan-Hao Chang (Institute of Information Science, Academia Sinica, Taipei, Taiwan, R.O.C.)

Performance Analysis of NVMe SSDs and their Implication on Real World Databases
Authors: Qiumin Xu (University of Southern Califorrnia), Huzefa Siyamwala (San Jose State University), and Mrinmoy Ghosh, Tameesh Suri, Manu Awasthi, Zvika Guz, Anahita Shayesteh, and Vijay Balakrishnan (Samsung Semiconductor Inc)

15:45 Coffee Break

16:05 Session 2b: Storage - SSD

An Embedded Storage Framework Abstracting Each Raw Flash Device as An MTD
Authors: Wei Wang, Deng Zhou, and Tao Xie (San Diego State University)

Optimizing File Systems for Fast Storage Devices (SHORT)
Authors: Yongseok Son (Seoul National University), Hyuck Han (Dongduk Women's University), and Heon Young Yeom (Seoul National University)

Space and Write Overhead are Inversely Proportional in Flash Memory (SHORT)
Authors: Philipp Brandes and Roger Wattenhofer (ETH Zurich)

17:00 - 19:00 Poster Session followed by reception with dinner and music


Day 2: Wednesday May 27, 2015

09:30 Keynote #2: Opportunities in Middlebox Virtualization,
Anat Bremler-Barr (IDC- Interdisciplinary Center, Herzliya)   [Abstract], [Speaker Bio]

Abstract:

Contemporary networks contain many different kinds of middleboxes that perform a variety of advanced network functions such as intrusion detection, load balancing, policy and access control, traffic shaping, and monitoring. Currently, a special box is tailored to provide each of these functions, and therefore, traffic is routed through a sequence of these boxes on its way to its final destination. Moreover, these special boxes are usually proprietary and have limited network operator control (as defined by the vendor of the box).

In this talk, we will cover new trends and architectures in middlebox design that promise to make middlebox faster, scalable and flexible, while promoting innovation. These opportunities are facilitated by current revolutionary architectures of Network Function Virtualization (NFV) and Software Defined Networks (SDN), that enables more flexible and light-weight middlebox design.

Bio:

Anat Bremler-Barr is an associate Professor at the School of Computer Science, Interdisciplinary Center, Herzliya, Israel. Prof. Bremler-Barr holds a Ph.D. (with distinction) in computer science from Tel Aviv University. In 2001, she co-founded and was the chief scientist of Riverhead Networks Inc., which provided systems to protect from Denial of Service attacks. The company was acquired by Cisco Systems in 2004. Prof. Bremler-Barr then joined the Interdisciplinary Center, Herzliya in 2004, where she co-founded with Prof. David Hay the DEEPNESS lab (funded by an ERC starting grant) that focuses on designing deep packet inspection for next generation network devices. Prof. Bremler-Barr serves currently as an associate editor in ACM/IEEE Transactions of Networking and numerous technical program committee of leading conferences in networking. Her research interests are in computer networks and network security.

10:30 Coffee Break

11:00 Session 3: Networks and Cloud

Merging Semantics for Conflict Updates in Geo-Distributed File Systems
Authors: Vinh Thanh Tao (Scality and INRIA-LIP6), Marc Shapiro (INRIA-LIP6), and Vianney Rancurel (Scality)

CDP: A Coded Datagram transport Protocol bridging UDP and TCP (SHORT)
Authors: Morteza Hashemi and Ari Trachtenberg (Boston University)

Feedback-Driven Combinatorial Test Design and Execution (SHORT)
Authors: Itai Segall (Bell-Labs Israel) and Rachel Tzoref-Brill (IBM, Haifa Research Lab)

Impact of GC design on power and performance for Android
Authors: Ahmed Hussein, Mathias Payer, and Antony L. Hosking (Purdue University) and Chris Vick (Qualcomm)

Highlight Papers (2)

NSEC5: Provably Preventing DNSSEC Zone Enumeration (Highlight paper, NDSS 2015)
Authors: Sharon Goldberg (Boston University), Moni Naor (Weizmann Institute of Science), Dimitrios Papadopoulos, Leonid Reyzin, and Sachin Vasant (Boston University), and Asaf Ziv (Weizmann Institute of Science)

GPUnet: Networking Abstractions for GPU Programs (Highlight paper, OSDI 2014)
Authors: Sangman Kim, Seonggu Huh, Yige Hu, Xinya Zhang, and Emmett Witchel, (The University of Texas at Austin) and Amir Wated and Mark Silberstein (Technion – Israel Institute of Technology)

Automatic Scalable Atomicity via Semantic Locking (Highlight paper, PPoPP 2015)
Authors: Guy Golan-Gueta (Yahoo Labs, Israel), Ganesan Ramalingam (Microsoft Research, India), Mooly Sagiv (Tel Aviv University), and Eran Yahav (Technion – Israel Institute of Technology)

13:10 Lunch and Social Event


Day 3: Thursday  May 28, 2015

09:30 Keynote #3: Controlling Unwanted Photo Capture,
Peter Druschel (Max Planck Institute)   [Abstract], [Speaker Bio]

Abstract:

The ubiquity of mobile devices equipped with built-in cameras has transformed how and when digital images are captured, shared, and archived. Photographs and videos from social gatherings, public events, and even crime scenes are commonplace online. While the spontaneity afforded by these devices have led to new personal and creative outlets, privacy concerns of bystanders and unwilling subjects have not been addressed.

We are designing a trusted software platform that integrates digital capture with user-defined privacy. In this system, users choose a level of privacy (e.g., image capture allowed or not) based upon social context (e.g., out in public vs. with friends vs. at workplace). The privacy choices of users are advertised via short-range radio, and compliant capture platforms generate media edited to conform to the privacy choices of the image subjects.

The system uses secure multiparty computation to ensure that users' visual features and privacy choices are not revealed publicly, regardless of whether they are the subjects of an image capture. Just as importantly, our approach preserves the ease-of-use and spontaneous nature of capture and sharing among trusted users. An experimental evaluation shows that a practical, energy-efficient image capture system that respects the privacy choices of users within a scene can be built and deployed using current hardware.

Bio:

Peter Druschel is the founding director of the Max Planck Institute for Software Systems (MPI-SWS) in Germany. Previously, he was a Professor of Computer Science and Electrical and Computer Engineering at Rice University in Houston, Texas. He received the Dipl-Ing. (FH) in Data Systems Engineering from Fachhochschule Munich, Germany in 1986 and the M.S. and Ph.D. degrees in Computer Science from the University of Arizona in 1990 and 1994, respectively. His research interests include distributed systems, security and privacy. He is the recipient of an NSF CAREER Award, Alfred P. Sloan Fellowship and the ACM SIGOPS Mark Weiser Award, and a member of Academia Europaea and the German Academy of Sciences Leopoldina.

10:30 Coffee Break

10:55 Session 4: Security

Disruptive Prefetching: Impacts on Side-Channel Attacks and Cache Designs
Authors: Adi Fuchs and Ruby B. Lee (Princeton University)

Thunderstrike: EFI firmware bootkits for Apple Macbooks
Authors: Trammell Hudson and Larry Rudolph (Two Sigma Investments)

Don't Trust the Cloud, Verify: Integrity and Consistency for Cloud Object Stores
Authors: Marcus Brandenburger, Christian Cachin, and Nikola Knezevic (IBM Research - Zurich)

12:10 Coffee Break

12:30 Session 5: Storage

Reducing fragmentation impact with forward knowledge in backup systems with deduplication
Authors: Michal Kaczmarczyk and Cezary Dubnicki (9LivesData LLC)

SMRDB: Key-Value Data Store for Shingled Magnetic Recording Disks (Best Paper)
Rekha Pitchumani (UC Santa Cruz), James Hughes (Seagate Technology), and Ethan L. Miller (UC Santa Cruz)

Closing remarks

13:30 Lunch

 

POSTER SESSION: Posters (extended abstracts)

 

 

 



ACM SIGOPS USENIX TCE IBM i-core redhat Facebook EMC Bell Labs Technion Google Sap Intel STRATOSCALE Mellanox Kaminario Riverbed HP ACM SIGOPS USENIX TCE IBM Research - Haifa