skip to main content
10.1145/2151024acmconferencesBook PagePublication PagesveeConference Proceedingsconference-collections
VEE '12: Proceedings of the 8th ACM SIGPLAN/SIGOPS conference on Virtual Execution Environments
ACM2012 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
VEE '12: ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments London England, UK March 3 - 4, 2012
ISBN:
978-1-4503-1176-2
Published:
03 March 2012
Sponsors:
Recommend ACM DL
ALREADY A SUBSCRIBER?SIGN IN

Reflects downloads up to 14 Feb 2025Bibliometrics
Skip Abstract Section
Abstract

It is our great pleasure to welcome you to the 8th ACM SIGPLAN/SIGOPS Conference on Virtual Execution Environments (VEE'12). We are delighted to present the community with a strong program covering a wide range of virtualization topics.

This year we received 53 complete submissions. The program committee comprised 18 leading researchers active in virtualization-related aspects of programming languages and operating systems. All papers received at least 3 reviews, and the PC held an (appropriately) virtual meeting to make the final selection. In the end, 20 papers were selected for presentation at the conference. In addition, the program includes a keynote presentation by Jason Nieh, and an invited talk by Evangelos Kotsovinos. We hope that these proceedings will serve as a valuable reference for researchers and practitioners in the area of virtualization.

VEE'12 is once again co-located with the International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS'12). Both conferences are being held at the buildings of The Royal Society, London -- a learned society which includes Isaac Newton as a past president.

On behalf of the organizers, we are delighted to welcome you to London, and wish you all an enjoyable, educational and generally edifying stay!

Skip Table Of Content Section
SESSION: Invited talk
invited-talk
Challenges in building a real, large private cloud

Virtualization and internal cloud are often touted as the solution to many challenging problems, from resource underutilization to data-center optimization and carbon emission reduction. However, the hidden costs of cloud-scale virtualization, largely ...

SESSION: Modeling
research-article
Modeling virtualized applications using machine learning techniques

With the growing adoption of virtualized datacenters and cloud hosting services, the allocation and sizing of resources such as CPU, memory, and I/O bandwidth for virtual machines (VMs) is becoming increasingly important. Accurate performance modeling ...

SESSION: Multicore and scale
research-article
Virtualization challenges: a view from server consolidation perspective

Server consolidation, by running multiple virtual machines on top of a single platform with virtualization, provides an efficient solu-tion to parallelism and utilization of modern multi-core processors system. However, the performance and scalability ...

research-article
REEact: a customizable virtual execution manager for multicore platforms

With the shift to many-core chip multiprocessors (CMPs), a critical issue is how to effectively coordinate and manage the execution of applications and hardware resources to overcome performance, power consumption, and reliability challenges stemming ...

research-article
DVM: towards a datacenter-scale virtual machine

As cloud-based computation becomes increasingly important, providing a general computational interface to support datacenter-scale programming has become an imperative research agenda. Many cloud systems use existing virtual machine monitor (VMM) ...

SESSION: Embedded systems and light-weight VMs
research-article
SimTester: a controllable and observable testing framework for embedded systems

In software for embedded systems, the frequent use of interrupts for timing, sensing, and I/O processing can cause concurrency faults to occur due to interactions between applications, device drivers, and interrupt handlers. This type of fault is ...

research-article
Swift: a register-based JIT compiler for embedded JVMs

Code quality and compilation speed are two challenges to JIT compilers, while selective compilation is commonly used to trade-off these two issues. Meanwhile, with more and more Java applications running in mobile devices, selective compilation meets ...

research-article
Facilitating inter-application interactions for OS-level virtualization

OS-level virtualization generates a minimal start-up and run-time overhead on the host OS and thus suits applications that require both good isolation and high efficiency. However, multiple-member applications required for forming a system may need to ...

SESSION: Enabling high availability
research-article
Enhancing TCP throughput of highly available virtual machines via speculative communication

Checkpoint-recovery based virtual machine (VM) replication is an attractive technique for accommodating VM installations with high-availability. It provides seamless failover for the entire software stack executed in the VM regardless the application or ...

research-article
SecondSite: disaster tolerance as a service

This paper describes the design and implementation of SecondSite, a cloud-based service for disaster tolerance. SecondSite extends the Remus virtualization-based high availability system by allowing groups of virtual machines to be replicated across ...

research-article
CompSC: live migration with pass-through devices

Live migration is one of the most important features of virtualization technology. With regard to recent virtualization techniques, performance of network I/O is critical. Current network I/O virtualization (e.g. Para-virtualized I/O, VMDq) has a ...

SESSION: Instrumentation
research-article
libdft: practical dynamic data flow tracking for commodity systems

Dynamic data flow tracking (DFT) deals with tagging and tracking data of interest as they propagate during program execution. DFT has been repeatedly implemented by a variety of tools for numerous purposes, including protection from zero-day and cross-...

research-article
Transparent dynamic instrumentation

Process virtualization provides a virtual execution environment within which an unmodified application can be monitored and controlled while it executes. The provided layer of control can be used for purposes ranging from sandboxing to compatibility to ...

research-article
Execution mining

Operating systems represent large pieces of complex software that are carefully tested and broadly deployed. Despite this, developers frequently have little more than their source code to understand how they behave. This static representation of a ...

SESSION: Dynamic analysis and runtime
research-article
DDGacc: boosting dynamic DDG-based binary optimizations through specialized hardware support

Dynamic Binary Translators (DBT) and Dynamic Binary Optimization (DBO) by software are used widely for several reasons including performance, design simplification and virtualization. However, the software layer in such systems introduces non-negligible ...

research-article
Adding dynamically-typed language support to a statically-typed language compiler: performance evaluation, analysis, and tradeoffs

Applications written in dynamically typed scripting languages are increasingly popular for Web software development. Even on the server side, programmers are using dynamically typed scripting languages such as Ruby and Python to build complex ...

research-article
Unpicking the knot: teasing apart VM/application interdependencies

Flexible and efficient runtime design requires an understanding of the dependencies among the components internal to the runtime and those between the application and the runtime. These dependencies are frequently unclear. This problem exists in all ...

SESSION: Security
research-article
Block storage virtualization with commodity secure digital cards

Smartphones, tablets and other mobile platforms typically accommodate bulk data storage with low-cost, FAT-formatted Secure Digital cards. When one uses a mobile device to run a full-system virtual machine (VM), there can be a mismatch between 1) the VM'...

research-article
Replacement attacks against VM-protected applications

Process-level virtualization is increasingly being used to enhance the security of software applications from reverse engineering and unauthorized modification (called software protection). Process-level virtual machines (PVMs) can safeguard the ...

research-article
Protecting applications against TOCTTOU races by user-space caching of file metadata

Time Of Check To Time Of Use (TOCTTOU) race conditions for file accesses in user-space applications are a common problem in Unix-like systems. The mapping between filename and inode and device is volatile and can provide the necessary preconditions for ...

research-article
V2E: combining hardware virtualization and softwareemulation for transparent and extensible malware analysis

A transparent and extensible malware analysis platform is essential for defeating malware. This platform should be transparent so malware cannot easily detect and bypass it. It should also be extensible to provide strong support for heavyweight ...

Contributors
  • Google LLC
  • IBM Thomas J. Watson Research Center

Recommendations

Acceptance Rates

Overall Acceptance Rate 80 of 235 submissions, 34%
YearSubmittedAcceptedRate
VEE '17431842%
VEE '16291034%
VEE '15501632%
VEE '14561832%
VEE '08571832%
Overall2358034%