The IOMMU allows the OS to encapsulate I/O devices in their own virtual memory spaces, thus restricting their DMAs to specific memory pages. The OS uses the IOMMU to protect itself against buggy drivers and malicious/errant devices. But the added protection comes at a cost, degrading the throughput of I/O-intensive workloads by up to an order of magnitude. This cost has motivated system designers to trade off some safety for performance, e.g., by leaving stale information in the IOTLB for a while so as to amortize costly invalidations. We observe that high-bandwidth devices—like network and PCIe SSD controllers—interact with the OS via circular ring buffers that induce a sequential, predictable workload. We design a ring IOMMU (rIOMMU) that...
The I/O stack is probably one of the most basic and stable structures in computer systems. This clas...
One of the fundamental limits to high-performance, high-reliability applications is memory's vulnera...
Application-level checkpointing has been one of the most popular techniques to proactively deal with...
The input/output memory management unit (IOMMU) was recently introduced into mainstream computer ar-...
This article explores opportunities to mitigate the performance impact of IOMMU on high-speed networ...
IOMMUs are hardware devices that trans-late device DMA addresses to proper ma-chine physical address...
International audienceAttacks targeting computer systems become more and more complex and various. S...
International audienceI/O attacks have received increasing attention during the last decade. These a...
ORAM construction that can be parameterized for either small or large client storage. Simply by tuni...
Commodity virtual machine monitors forbid direct ac-cess to I/O devices by untrusted guest operating...
Commodity virtual machine monitors forbid direct ac-cess to I/O devices by untrusted guest operating...
In parallel I/O systems the I/O buffer can be used to improve I/O parallelism by improving I/O laten...
Currently, I/O device virtualization models in virtual machine (VM) environments require involvement...
This article presents the design, implementation, and evaluation of IO -Lite, a unified I/O bufferin...
We present a novel taxonomy that characterizes in a structured way the software and hardware tradeof...
The I/O stack is probably one of the most basic and stable structures in computer systems. This clas...
One of the fundamental limits to high-performance, high-reliability applications is memory's vulnera...
Application-level checkpointing has been one of the most popular techniques to proactively deal with...
The input/output memory management unit (IOMMU) was recently introduced into mainstream computer ar-...
This article explores opportunities to mitigate the performance impact of IOMMU on high-speed networ...
IOMMUs are hardware devices that trans-late device DMA addresses to proper ma-chine physical address...
International audienceAttacks targeting computer systems become more and more complex and various. S...
International audienceI/O attacks have received increasing attention during the last decade. These a...
ORAM construction that can be parameterized for either small or large client storage. Simply by tuni...
Commodity virtual machine monitors forbid direct ac-cess to I/O devices by untrusted guest operating...
Commodity virtual machine monitors forbid direct ac-cess to I/O devices by untrusted guest operating...
In parallel I/O systems the I/O buffer can be used to improve I/O parallelism by improving I/O laten...
Currently, I/O device virtualization models in virtual machine (VM) environments require involvement...
This article presents the design, implementation, and evaluation of IO -Lite, a unified I/O bufferin...
We present a novel taxonomy that characterizes in a structured way the software and hardware tradeof...
The I/O stack is probably one of the most basic and stable structures in computer systems. This clas...
One of the fundamental limits to high-performance, high-reliability applications is memory's vulnera...
Application-level checkpointing has been one of the most popular techniques to proactively deal with...