Courses/Computer Science/CPSC 457.W2012/PaperReviews

Jump to: navigation, search


This page will contain your individual review of the paper you were assigned in HW5. You should submit your synopsis to your individual SVN as part of HW5. In addition, if you'd like, you can post your review here if you've signed up for a UofC wiki account.

Homework 5 asks you to read an academic research paper related to the topic of Operating Systems. Your paper assignment appears here. Homework 5 asks that you read the paper and write a brief (maximum of 450 words) synopsis and review of the paper. 450 words is about the length of the last two paragraphs of "The Strange Case of Dr. Jekyll and Mr. Hyde. This task is meant to help you achieve several outcomes, including:

  • developing a notion of where current cutting edge OS research can be found
  • helping develop your ability to evaluate the work of others
  • give you experience in writing a terse evaluation of technical material
  • give you the opportunity to become acquainted with a specific OS topic in depth


These are the papers; many are recent, some are classic. They come from many areas of systems and operating systems research.


  1. Bob Graham published "Protection in an information processing utility" in Communications of the ACM, Volume 11, pp. 306-312, May 1968.
  2. Mike Schroeder and Jerry Saltzer presented "A hardware architecture for implementing protection rings" at the Third ACM Symposium on Operating System Principles in Palo Alto, CA, in October 1971.
  3. Protection in Operating Systems Michael A. Harrison and Walter L. Ruzzo University of California, Berkeley Jeffrey D. Ullman Princeton University Communications of the ACM. August 1976. Volume 19. Number 8.
  4. SecureSwitch: BIOS-Assisted Isolation and Switch between Trusted and Untrusted Commodity OSes Kun Sun, Jiang Wang, Fengwei Zhang and Angelos Stavrou. In the Proceedings of the 19th Annual Network & Distributed System Security Symposium, NDSS 2012, San Diego, California, 5-8 February 2012. Impact Factor: 2.60 (Acceptance Rate: 46/258 – 17.8%).
  5. Intrusion Recovery Using Selective Re-execution Taesoo Kim, Xi Wang, Nickolai Zeldovich, and M. Frans Kaashoek, MIT CSAIL
  6. XFI: Software Guards for System Address Spaces Úlfar Erlingsson, Microsoft Research, Silicon Valley; Martín Abadi, Microsoft Research, Silicon Valley, and University of California, Santa Cruz; Michael Vrable, University of California, San Diego; Mihai Budiu, Microsoft Research, Silicon Valley; George C. Necula, University of California, Berkeley


  1. MashupOS: Operating System Abstractions for Client Mashups Jon Howell, Microsoft Research; Collin Jackson, Stanford University; Helen J. Wang and Xiaofeng Fan, Microsoft Research
  2. Reinventing Scheduling for Multicore Systems Silas Boyd-Wickizer, Robert Morris, and M. Frans Kaashoek, Massachusetts Institute of Technology
  3. Stable Deterministic Multithreading through Schedule Memoization Heming Cui, Jingyue Wu, Chia-Che Tsai, Junfeng Yang. Proceedings of the Ninth Symposium on Operating Systems Design and Implementation (OSDI '10), October, 2010
  4. A SMART Scheduler for Multimedia Applications Jason Nieh and Monica S. Lam. ACM Transactions on Computer Systems (TOCS), 21(2), May 2003. (Parts of this work appeared in SOSP 1997.)
  5. SWAP: A Scheduler With Automatic Process Dependency Detection Haoqiang Zheng and Jason Nieh, Proceedings of the First USENIX/ACM Symposium on Networked Systems Design and Implementation (NSDI 2004), San Francisco, CA, March 2004.

Threading, Concurrent Execution, and Deadlocks

  1. Finding and Reproducing Heisenbugs in Concurrent Programs Madanlal Musuvathi, Shaz Qadeer, and Thomas Ball, Microsoft Research; Gerard Basler, ETH Zurich; Piramanayagam Arumuga Nainar, University of Wisconsin, Madison; Iulian Neamtiu, University of California, Riverside
  2. Gadara: Dynamic Deadlock Avoidance for Multithreaded Programs Yin Wang, University of Michigan and Hewlett-Packard Laboratories; Terence Kelly, Hewlett-Packard Laboratories; Manjunath Kudlur, Stéphane Lafortune, and Scott Mahlke, University of Michigan
  3. Efficient Deterministic Multithreading through Schedule Relaxation Heming Cui, Jingyue Wu, John Gallagher, Huayang Guo, Junfeng Yang Proceedings of the 23rd ACM Symposium on Operating Systems Principles (SOSP '11), October, 2011
  4. Automatic Mutual Exclusion Michael Isard and Andrew Birrell, Microsoft Research, Silicon Valley
  5. Thread Scheduling for Multi-Core Platforms Mohan Rajagopalan, Brian T. Lewis, and Todd A. Anderson, Programming Systems Lab, Intel
  6. Effective Data-Race Detection for the Kernel John Erickson, Madanlal Musuvathi, Sebastian Burckhardt, and Kirk Olynyk, Microsoft Researc
  7. Ad Hoc Synchronization Considered Harmful Weiwei Xiong, University of Illinois at Urbana-Champaign; Soyeon Park, Jiaqi Zhang, and Yuanyuan Zhou, University of California, San Diego; Zhiqiang Ma, Intel

Drivers, Extensions, Modules, and Plug-ins

  1. Microdrivers: A New Architecture for Device Drivers Vinod Ganapathy, Arini Balakrishnan, Michael M. Swift, and Somesh Jha, University of Wisconsin—Madison
  2. Dealing with Disaster: Surviving Misbehaved Kernel Extensions Margo Seltzer, Yasuhiro Endo, Christopher Small, Keith Smith. Proceedings of the 1996 Symposium on Operating System Design and Implementation (OSDI II).
  3. Device Driver Safety Through a Reference Validation Mechanism Dan Williams, Patrick Reynolds, Kevin Walsh, Emin Gün Sirer, and Fred B. Schneider, Cornell University

File Systems

  1. Stupid File Systems Are Better Lex Stein, Harvard University
  2. Hierarchical File Systems Are Dead Margo Seltzer and Nicholas Murphy, Harvard School of Engineering and Applied Sciences
  3. Speculative Execution In A Distributed File System Edmund B. Nightingale, Peter M. Chen, and Jason Flinn. Proceedings of the 20th Symposium on Operating Systems Principles (SOSP '05) Award paper., Brighton, UK, October 2005
  4. FiST: A Language for Stackable File Systems. Erez Zadok, Jason Nieh. USENIX Annual Technical Conference, General Track 2000: 55-70
  5. StegFS: A Steganographic File System for Linux Andrew D. McDonald and Markus G. Kuhn. In Information Hiding 1999.


  1. Xen and the Art of Virtualization Paul Barham, Boris Dragovic, Keir Fraser, Steven Hand, Tim Harris, Alex Ho, Rolf Neugebauer, Ian Pratt, Andrew Warfield. Puplished at SOSP 2003.
  2. Are Virtual Machine Monitors Microkernels Done Right? Steven Hand, Andrew Warfield, Keir Fraser, and Evangelos Kotsovinos, University of Cambridge Computer Laboratory; Dan Magenheimer, HP Lab
  3. When Virtual Is Harder than Real: Security Challenges in Virtual Machine Based Computing Environments Tal Garfinkel and Mendel Rosenblum, Stanford University
  4. Compatibility Is Not Transparency: VMM Detection Myths and Realities Tal Garfinkel, Stanford University; Keith Adams, VMware; Andrew Warfield, University of British Columbia/XenSource; Jason Franklin, Carnegie Mellon University
  5. Hype and Virtue Timothy Roscoe, ETH Zürich; Kevin Elphinstone and Gernot Heiser, National ICT Australia


  1. Systems Benchmarking Crimes. Gernot Heiser.
  2. Accept() scalability on Linux Steve Molloy, CITI - University of Michigan
  3. An Analysis of Linux Scalability to Many Cores Silas Boyd-Wickizer, Austin T. Clements, Yandong Mao, Aleksey Pesterev, M. Frans Kaashoek, Robert Morris, and Nickolai Zeldovich, MIT CSAIL

Checkpointing, Record and Replay, and Migration

  1. The Design and Implementation of Zap: A System for Migrating Computing Environments Steven Osman, Dinesh Subhraveti, Gong Su, and Jason Nieh, Proceedings of the Fifth Symposium on Operating Systems Design and Implementation (OSDI 2002), Boston, MA, December 2002.
  2. Live Migration of Virtual Machines Christopher Clark, Keir Fraser, Steven Hand, Jacob Gorm Hansen, Eric Jul, Christian Limpach, Ian Pratt, Andrew Warfield. Published at NSDI 2005
  3. R2: An Application-Level Kernel for Record and Replay Zhenyu Guo, Microsoft Research Asia; Xi Wang, Tsinghua University; Jian Tang and Xuezheng Liu, Microsoft Research Asia; Zhilei Xu, Tsinghua University; Ming Wu, Microsoft Research Asia; M. Frans Kaashoek, MIT CSAIL; Zheng Zhang, Microsoft Research Asia

Paper Assignments

You will be assigned to one of the papers listed above.

  • Christopher Borowski - (Security 1)
  • Helen Borromeo - (Threading 1)
  • Kevin Brauen - (Scheduling 1)
  • Ryan Bray - (Drivers 1)
  • Kenneth Buck - (File systems 1)
  • Sam Cheung - (Virtualization 1)
  • Abhin Chhabra - (Scheduling 2)
  • Michael Clark - (Threading 2)
  • Natasha Dion - (Threading 3)
  • Ali El-Dani - (Security 2)
  • Mathew George - (File systems 2)
  • Aleksandre Gorodetski - (Security 3)
  • Ashish Grover - (Virtualization 2)
  • Brett Hamm - (Performance 1)
  • Morteza Hafez - (Drivers 2)
  • Justin Kelly - (Scheduling 3)
  • Masud Khan - (Threading 4)
  • David Ko - (Security 4)
  • Lewis Kwan - (Virtualization 3)
  • Christopher Nguyen - (Performance 2)
  • Kenneth Lai - (File systems 3)
  • Stuart Laing - (Virtualization 4)
  • Adam Laycock - (Checkpointing 1)
  • Stephen Ma - (File systems 4)
  • Chad Morrison - (Scheduling 4)
  • Thomas Murray - (Virtualization 5)
  • Michael Nguyen - (Threading 5)
  • Hongyu Niu - (Checkpointing 2)
  • Louay Rafih - (Checkpointing 3)
  • Sarah Read - (Scheduling 5)
  • Syed Zain Rizvi - (Threading 6)
  • Kevin Wong - (Performance 3)
  • Steven Samoil - (Threading 7)
  • Devin Smith - (Drivers 3)
  • Ken Wilburn - (Security 5)
  • Jordan Woehr - (Security 6))
  • Waqas Razzaq - (File systems 5)