Alan Shieh
Cornell University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Alan Shieh.
symposium on operating systems principles | 2011
Emin Gün Sirer; Willem de Bruijn; Patrick Reynolds; Alan Shieh; Kevin Walsh; Dan Williams; Fred B. Schneider
This paper describes the design and implementation of a new operating system authorization architecture to support trustworthy computing. Called logical attestation, this architecture provides a sound framework for reasoning about run time behavior of applications. Logical attestation is based on attributable, unforgeable statements about program properties, expressed in a logic. These statements are suitable for mechanical processing, proof construction, and verification; they can serve as credentials, support authorization based on expressive authorization policies, and enable remote principals to trust software components without restricting the local users choice of binary implementations. We have implemented logical attestation in a new operating system called the Nexus. The Nexus executes natively on x86 platforms equipped with secure coprocessors. It supports both native Linux applications and uses logical attestation to support new trustworthy-computing applications. When deployed on a trustworthy cloud-computing stack, logical attestation is efficient, achieves high-performance, and can run applications that provide qualitative guarantees not possible with existing modes of attestation.
symposium on operating systems principles | 2005
Alan Shieh; Dan Williams; Emin Gün Sirer; Fred B. Schneider
Tamper-proof coprocessors for secure computing are poised to become a standard hardware feature on future computers. Such hardware provides the primitives necessary to support trustworthy computing applications, that is, applications that can provide strong guarantees about their run time behavior.
acm special interest group on data communication | 2010
Alan Shieh; Srikanth Kandula; Emin Gün Sirer
This paper examines an extreme point in the design space of programmable switches and network policy enforcement. Rather than relying on extensive changes to switches to provide more programmability, SideCar distributes custom processing code between shims running on every end host and general purpose sidecar processors, such as server blades, connected to each switch via commonly available redirection mechanisms. This provides applications with pervasive network instrumentation and programmability on the forwarding plane. While not a perfect replacement for programmable switches, this solves several pressing problems while requiring little or no change to existing switches. In particular, in the context of public cloud data centers with 1000s of tenants, we present novel solutions for multicast, controllable network bandwidth allocation (e.g., use-what-you-pay-for), and reachability isolation (e.g., a tenants VM only sees other VMs of the tenant and shared services).
ACM Transactions on Computer Systems | 2008
Alan Shieh; Andrew C. Myers; Emin Gün Sirer
Traditional operating system interfaces and network protocol implementations force some system state to be kept on both sides of a connection. This state ties the connection to its endpoints, impedes transparent failover, permits denial-of-service attacks, and limits scalability. This article introduces a novel TCP-like transport protocol and a new interface to replace sockets that together enable all state to be kept on one endpoint, allowing the other endpoint, typically the server, to operate without any per-connection state. Called Trickles, this approach enables servers to scale well with increasing numbers of clients, consume fewer resources, and better resist denial-of-service attacks. Measurements on a full implementation in Linux indicate that Trickles achieves performance comparable to TCP/IP, interacts well with other flows, and scales well. Trickles also enables qualitatively different kinds of networked services. Services can be geographically replicated and contacted through an anycast primitive for improved availability and performance. Widely-deployed practices that currently have client-observable side effects, such as periodic server reboots, connection redirection, and failover, can be made transparent, and perform well, under Trickles. The protocol is secure against tampering and replay attacks, and the client interface is backward-compatible, requiring no changes to sockets-based client applications.
networked systems design and implementation | 2011
Alan Shieh; Srikanth Kandula; Albert G. Greenberg; Changhoon Kim; Bikas Saha
ieee international conference on cloud computing technology and science | 2010
Alan Shieh; Srikanth Kandula; Albert G. Greenberg; Changhoon Kim
Archive | 2011
Albert G. Greenberg; Alan Shieh; Srikanth Kandula; Changhoon Kim
Proceedings of the ACM CoNEXT Student Workshop on | 2010
Alan Shieh; Emin Gün Sirer; Fred B. Schneider
networked systems design and implementation | 2005
Alan Shieh; Andrew C. Myers; Emin Gün Sirer
Archive | 2009
Alan Shieh; Oliver Kennedy; Emin Gün Sirer; Fred B. Schneider