As our world becomes more computerized and interconnected, computer security and privacy will continue to increase in importance. Addressing security and privacy challenges requires reaching across a broad range of technologies, multiple layers of abstraction, and many aspects of computer science. In this talk, I will focus specifically on two examples of security and privacy challenges that I have addressed in my work by designing and building new systems that better match user expectations.
Strata is a commercial storage system designed around the high performance density of PCIe flash storage. We have observe a parallel between the challenges introduced by this emerging flash hardware and the problems we faced with underutilized server hardware about a decade ago. Borrowing ideas from hardware virtualization, we have developed Strata to partition functionality into an object-based address virtualization layer for high performance network-attached flash, and a hosted environment for implementing scalable protocol implementations for heterogeneous clients.
This talk is part of the WID-DOW Collaborative Presentation Series on Doing Optimization at Wisconsin. A note about the location (room 2238, WID): Anyone without WID access should contact Herman Stampfli email@example.com or call 608-316-4401.
This talk is part of the WID-DOW Collaborative Presentation Series on Doing Optimization at Wisconsin. Note about location: Anyone without WID access can use the special events elevator on WID's 1st floor (near Aldo's Café) to access room 3280.
This talk is part of the WID-DOW Collaborative Presentation Series on Doing Optimization at Wisconsin. A note on the location: Anyone without WID access can use the special events elevator on WID's 1st floor (near Aldo's Café) to access room 3280 (third floor teaching lab).
In this talk, I will describe some recent work in my research group on building a memory access accelerator. Our work is motivated by observing that many accelerators being proposed integrate or interact with a high-performance microprocessor. In such cases, the microprocessor becomes a significant power hog, while a low performance processor limits the accelerator's effectiveness.
As cloud computing becomes increasingly popular, organizations face greater security threats. Public clouds have become a central point of attack and successful compromises can cause potentially billions of dollars of damage. Physical attacks on data center machines are very concerning because an attacker can gain full control of the machines and circumvent software protections.