Proceedings of the 16th Workshop on Hot Topics in Operating Systems 2017
DOI: 10.1145/3102980.3103000
|View full text |Cite
|
Sign up to set email alerts
|

Separating Translation from Protection in Address Spaces with Dynamic Remapping

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 10 publications
(9 citation statements)
references
References 17 publications
0
9
0
Order By: Relevance
“…• Novel architecture design: the majority of the studies involving NVM assume the use of persistent memory in two architecture models: (1) where NVM is used as storage, replacing traditional HDDs, and (2) where NVM is used as main memory, replacing partially or completely the DRAM-based main memory. In the scope of this work, it is considered that any publication that presents an architecture different from (1) and ( 2) is either proposing a new architecture or adapting an existing one and thus belongs in this category.…”
Section: Collecting and Classifying The Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…• Novel architecture design: the majority of the studies involving NVM assume the use of persistent memory in two architecture models: (1) where NVM is used as storage, replacing traditional HDDs, and (2) where NVM is used as main memory, replacing partially or completely the DRAM-based main memory. In the scope of this work, it is considered that any publication that presents an architecture different from (1) and ( 2) is either proposing a new architecture or adapting an existing one and thus belongs in this category.…”
Section: Collecting and Classifying The Resultsmentioning
confidence: 99%
“…The analyzed scalability studies seek improvements on making address and protection more cache and TLB friendly, allowing systems allocated memory to grow transparently and partitioning of the entire physical address space. Besides these points, other more complex ideas are also described in studies such as decoupling protection from translation and adopting capability-based authorization [1]. At application level, object stores are usually the preferred solution for scalable storage instead of NVM file systems, for example, this is due to their flat name space and simpler structure and metadata [24] (see Section IV-A1).…”
Section: ) Cross-cutting Complementary Insightsmentioning
confidence: 99%
See 1 more Smart Citation
“…Putting the compatibility issues aside, spawn is considered superior to fork. A recent paper [20] reflects on the pros and cons of fork and concludes that "we should acknowledge that fork's continued existence as a first-class OS primitive holds back systems research, and deprecate it.…”
Section: Spawn Instead Of Forkmentioning
confidence: 99%
“…It also configures the page tables at the memory elements with the process identifier (effectively the CR3), the virtual address, and the appropriate permissions, enabling local enforcement at the memory elements. While this mechanism is specific to proxied memory, fabric-attached memory systems have proposed a capability-based protection system to achieve similar functionality [2].…”
Section: Ddc Architecture and Resource Allocationmentioning
confidence: 99%