Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Glenn Ammons is active.

Publication


Featured researches published by Glenn Ammons.


ieee international conference on cloud computing technology and science | 2009

Managing security of virtual machine images in a cloud environment

Jinpeng Wei; Xiaolan Zhang; Glenn Ammons; Vasanth Bala; Peng Ning

Cloud computing is revolutionizing how information technology resources and services are used and managed but the revolution comes with new security problems. Among these is the problem of securely managing the virtual-machine images that encapsulate each application of the cloud. These images must have high integrity because the initial state of every virtual machine in the cloud is determined by some image. However, as some of the enefits of the cloud depend on users employing images built by third parties, users must also be able to share images safely. This paper explains the new risks that face administrators and users (both image publishers and image retrievers) of a clouds image repository. To address those risks, we propose an image management system that controls access to images, tracks the provenance of images, and provides users and administrators with efficient image filters and scanners that detect and repair security violations. Filters and scanners achieve efficiency by exploiting redundancy among images; an early implementation of the system shows that this approach scales better than a naive approach that treats each image independently.


virtual execution environments | 2007

Libra: a library operating system for a jvm in a virtualized execution environment

Glenn Ammons; Jonathan Appavoo; Maria A. Butrico; Dilma Da Silva; David Grove; Kiyokuni Kawachiya; Orran Krieger; Bryan S. Rosenburg; Eric Van Hensbergen; Robert W. Wisniewski

If the operating system could be specialized for every application, many applications would run faster. For example, Java virtual machines (JVMs) provide their own threading model and memory protection, so general-purpose operating system implementations of these abstractions are redundant. However, traditional means of transforming existing systems into specialized systems are difficult to adopt because they require replacing the entire operating system. This paper describes Libra, an execution environment specialized for IBMs J9 JVM. Libra does not replace the entire operating system. Instead, Libra and J9 form a single statically-linked image that runs in a hypervisor partition. Libra provides the services necessary to achieve good performance for the Java workloads of interest but relies on an instance of Linux in another hypervisor partition to provide a networking stack, a filesystem, and other services. The expense of remote calls is offset by the fact that Libras services can be customized for a particular workload; for example, on the Nutch search engine, we show that two simple customizations improve application throughput by a factor of 2.7.


european conference on object-oriented programming | 2004

Finding and removing performance bottlenecks in large systems

Glenn Ammons

Software systems obey the 80/20 rule: aggressively optimizing a vital few execution paths yields large speedups. However, finding the vital few paths can be difficult, especially for large systems like web applications. This paper describes a novel approach to finding bottlenecks in such systems, given (possibly very large) profiles of system executions. In the approach, for each kind of profile (for example, call-tree profiles), a tool developer implements a simple profile interface that exposes a small set of primitives for selecting summaries of profile measurements and querying how summaries overlap. Next, an analyst uses a search tool, which is written to the profile interface and thus independent of the kind of profile, to find bottlenecks. Our search tool (BOTTLENECKS) manages the bookkeeping of the search for bottlenecks and provides heuristics that automatically suggest likely bottlenecks. In one case study, after using BOTTLENECKS for half an hour, one of the authors found 14 bottlenecks in IBMs WebSphere Application Server. By optimizing some of these bottlenecks, we obtained a throughput improvement of 23% on the Trade3 benchmark. The optimizations include novel optimizations of J2EE and Java security, which exploit the high temporal and spatial redundancy of security checks.


annual computer security applications conference | 2010

Always up-to-date: scalable offline patching of VM images in a compute cloud

Wu Zhou; Peng Ning; Xiaolan Zhang; Glenn Ammons; Ruowen Wang; Vasanth Bala

Patching is a critical security service that keeps computer systems up to date and defends against security threats. Existing patching systems all require running systems. With the increasing adoption of virtualization and cloud computing services, there is a growing number of dormant virtual machine (VM) images. Such VM images cannot benefit from existing patching systems, and thus are often left vulnerable to emerging security threats. It is possible to bring VM images online, apply patches, and capture the VMs back to dormant images. However, such approaches suffer from unpredictability, performance challenges, and high operational costs, particularly in large-scale compute clouds where there could be thousands of dormant VM images. This paper presents a novel tool named Nüwa that enables efficient and scalable offline patching of dormant VM images. Nüwa analyzes patches and, when possible, converts them into patches that can be applied offline by rewriting the patching scripts. Nüwa also leverages the VM image manipulation technologies offered by the Mirage image library to provide an efficient and scalable way to patch VM images in batch. Nüwa has been evaluated on freshly built images and on real-world images from the IBM Research Compute Cloud (RC2), a compute cloud used by IBM researchers worldwide. When applying security patches to a fresh installation of Ubuntu-8.04, Nüwa successfully applies 402 of 406 patches. It speeds up the patching process by more than 4 times compared to the online approach and by another 2--10 times when integrated with Mirage. Nüwa also successfully applies the 10 latest security updates to all VM images in RC2.


computer software and applications conference | 2010

The Case for Content Search of VM Clouds

Mahadev Satyanarayanan; Wolfgang Richter; Glenn Ammons; Jan Harkes; Adam Goode

The success of cloud computing can lead to large, centralized collections of virtual machine~(VM) images. The ability to interactively search these VM images at a high semantic level emerges as an important capability. This paper examines the opportunities and challenges in creating such a search capability, and presents early evidence of its feasibility.


virtual execution environments | 2008

Opening black boxes: using semantic information to combat virtual machine image sprawl

Darrell C. Reimer; Arun Thomas; Glenn Ammons; Todd W. Mummert; Bowen Alpern; Vasanth Bala


Archive | 2007

Creating a virtual machine image with a software deployment system

Bower L. Alpern; Glenn Ammons; Vasanth Bala; Todd W. Mummert; Darrell C. Reimer


ieee international conference on cloud computing technology and science | 2011

Virtual machine images as structured data: the mirage image library

Glenn Ammons; Vasanth Bala; Todd W. Mummert; Darrell C. Reimer; Xiaolan Zhang


Archive | 2007

Method for delivering, testing, and applying software patches or other changes to a conventionally installed application in virtual application containers

Bowen Alpern; Glenn Ammons; Vasanth Bala; Todd W. Mummert; Balachandar Rajaraman; Darrell C. Reimer; Mark N. Wegman


Archive | 2007

Method and system for optimization of an application

Bowen Alpern; Glenn Ammons; Joshua S. Auerbach; Vasanth Bala; Thomas V. Frauenhofer; Todd W. Mummert; Darrell C. Reimer

Researchain Logo
Decentralizing Knowledge