Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Jake Wires is active.

Publication


Featured researches published by Jake Wires.


european conference on computer systems | 2007

Secure file system versioning at the block level

Jake Wires; Michael J. Feeley

In typical file systems, valuable data is vulnerable to being accidentally or maliciously deleted or overwritten. Versioning file systems protect data from accidents by transparently retaining old versions, but do less well in protecting data from malicious attack. These systems remain vulnerable to attackers who gain unauthorized access to prune old file versions, who bypass the file system to directly manipulate storage, or who exploit bugs in any part of the operating system. This paper presents VDisk, a secure, block-level versioning system that adds file-grain versioning to a standard, unmodified file system. VDisk consists of a set of untrusted user-mode tools and a trusted, secure kernel that is implemented within an isolated Xen virtual machine domain. The secure kernel is designed to be simple and thus trustworthy. This kernel logs file-system updates to a secure log, exports a read-only view of the log to the rest of the system and securely removes unwanted versions from the log. Secure cleaning is implemented in a two-level manner. An untrusted, user-mode cleaner selects log entries for reclamation and submits cleaning requests to the trusted VDisk kernel along with a proof that the request satisifies the devices version-retention policy. The secure kernel verifies the proof and updates the log.


ACM Queue | 2015

Non-volatile storage

Mihir Nanavati; Malte Schwarzkopf; Jake Wires; Andrew Warfield

For the entire careers of most practicing computer scientists, a fundamental observation has consistently held true: CPUs are significantly more performant and more expensive than I/O devices. The fact that CPUs can process data at extremely high rates, while simultaneously servicing multiple I/O devices, has had a sweeping impact on the design of both hardware and software for systems of all sizes, for pretty much as long as we’ve been building them.


MATA'05 Proceedings of the Second international conference on Mobility Aware Technologies and Applications | 2005

APHIDS++: evolution of a programmable hybrid intrusion detection system

Mohammed S. Alam; Abhishek Gupta; Jake Wires; Son T. Vuong

With the rapid growth of the Internet and the ever-increasing security problems associated with its popularity, the need for protection against unwanted intruders has become imperative. Antivirus software, intrusion detection systems, spyware detectors, and mal-ware detectors are some of the protection mechanisms available to users today. The diversity of these manifold systems suggests the need for a unifying managerial system, such as APHIDS (A Programmable Hybrid Intrusion Detection System), which can correlate and coalesce preexisting security components. In this paper we provide a description of improvements made to the initial APHIDS design, comprising the introduction of agent caching, the addition of an optional intelligent agent, and an XML implementation of our Distributed Correlation Script (DCS).


international workshop and international workshop on approximation, randomization, and combinatorial optimization. algorithms and techniques | 2015

Approximating Hit Rate Curves using Streaming Algorithms.

Zachary Drudi; Nicholas J. A. Harvey; Stephen Ingram; Andrew Warfield; Jake Wires

A hit rate curve is a function that maps cache size to the proportion of requests that can be served from the cache. (The caching policy and sequence of requests are assumed to be fixed.) Hit rate curves have been studied for decades in the operating system, database and computer architecture communities. They are useful tools for designing appropriate cache sizes, dynamically allocating memory between competing caches, and for summarizing locality properties of the request sequence. In this paper we focus on the widely-used LRU caching policy. Computing hit rate curves is very efficient from a runtime standpoint, but existing algorithms are not efficient in their space usage. For a stream of m requests for n cacheable objects, all existing algorithms that provably compute the hit rate curve use space linear in n. In the context of modern storage systems, n can easily be in the billions or trillions, so the space usage of these algorithms makes them impractical. We present the first algorithm for provably approximating hit rate curves for the LRU policy with sublinear space. Our algorithm uses O( p^2 * log(n) * log^2(m) / epsilon^2 ) bits of space and approximates the hit rate curve at p uniformly-spaced points to within additive error epsilon. This is not far from optimal. Any single-pass algorithm with the same guarantees must use Omega(p^2 + epsilon^{-2} + log(n)) bits of space. Furthermore, our use of additive error is necessary. Any single-pass algorithm achieving multiplicative error requires Omega(n) bits of space.


symposium on cloud computing | 2017

Sketches of space: ownership accounting for shared storage

Jake Wires; Pradeep Ganesan; Andrew Warfield

Efficient snapshots are an important feature of modern storage systems. However, the implicit sharing underlying most snapshot implementations makes it difficult to answer basic questions about the storage costs of individual snapshots. Traditional techniques for answering these questions incur significant performance penalties due to expensive metadata overheads. We present a novel probabilistic data structure, compatible with existing storage systems, that can provide approximate answers about snapshot costs with very low computational and storage overheads while achieving better than 95% accuracy for real-world data sets.


operating systems design and implementation | 2014

Characterizing storage workloads with counter stacks

Jake Wires; Stephen Ingram; Zachary Drudi; Nicholas J. A. Harvey; Andrew Warfield


file and storage technologies | 2011

Capo: recapitulating storage for virtual desktops

Mohammad Shamma; Dutch T. Meyer; Jake Wires; Maria Ivanova; Norman C. Hutchinson; Andrew Warfield


file and storage technologies | 2014

Strata: scalable high-performance storage on virtualized non-volatile memory

Brendan Cully; Jake Wires; Dutch T. Meyer; Kevin Jamieson; Keir Fraser; Tim Deegan; Daniel Stodden; Geoffrey Lefebvre; Andrew Warfield


file and storage technologies | 2014

Strata: High-Performance Scalable Storage on Virtualized Non-volatile Memory

Brendan Cully; Jake Wires; Dutch T. Meyer; Kevin Jamieson; Keir Fraser; Tim Deegan; Daniel Stodden; Geoffre Lefebvre; Andrew Warfield


WIOV'08 Proceedings of the First conference on I/O virtualization | 2008

Block mason

Dutch T. Meyer; Brendan Cully; Jake Wires; Norman C. Hutchinson; Andrew Warfield

Collaboration


Dive into the Jake Wires's collaboration.

Top Co-Authors

Avatar

Andrew Warfield

University of British Columbia

View shared research outputs
Top Co-Authors

Avatar

Dutch T. Meyer

University of British Columbia

View shared research outputs
Top Co-Authors

Avatar

Brendan Cully

University of British Columbia

View shared research outputs
Top Co-Authors

Avatar

Nicholas J. A. Harvey

University of British Columbia

View shared research outputs
Top Co-Authors

Avatar

Norman C. Hutchinson

University of British Columbia

View shared research outputs
Top Co-Authors

Avatar

Mihir Nanavati

University of British Columbia

View shared research outputs
Top Co-Authors

Avatar

Mohammad Shamma

University of British Columbia

View shared research outputs
Top Co-Authors

Avatar

Keir Fraser

University of Cambridge

View shared research outputs
Top Co-Authors

Avatar

Tim Deegan

University of Cambridge

View shared research outputs
Top Co-Authors

Avatar

Abhishek Gupta

University of British Columbia

View shared research outputs
Researchain Logo
Decentralizing Knowledge