Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Mona Vij is active.

Publication


Featured researches published by Mona Vij.


architectural support for programming languages and operating systems | 2011

Improved device driver reliability through hardware verification reuse

Leonid Ryzhyk; John Keys; Balachandra Mirla; Arun Raghunath; Mona Vij; Gernot Heiser

Faulty device drivers are a major source of operating system failures. We argue that the underlying cause of many driver faults is the separation of two highly-related tasks: device verification and driver development. These two tasks have a lot in common, and result in software that is conceptually and functionally similar, yet kept totally separate. The result is a particularly bad case of duplication of effort: the verification code is correct, but is discarded after the device has been manufactured; the driver code is inferior, but used in actual device operation. We claim that the two tasks, and the software they produce, can and should be unified, and this will result in drastic improvement of device-driver quality and reduction in the development cost and time to market. In this paper we propose a device driver design and verification workflow that achieves such unification. We apply this workflow to develop and test drivers for four different I/O devices and demonstrate that it improves the driver test coverage and allows detecting driver defects that are extremely hard to find using conventional testing techniques.


hardware and architectural support for security and privacy | 2017

Intel® Software Guard Extensions (Intel® SGX) Architecture for Oversubscription of Secure Memory in a Virtualized Environment

Somnath Chakrabarti; Rebekah Leslie-Hurd; Mona Vij; Frank McKeen; Carlos V. Rozas; Dror Caspi; Ilya Alexandrovich; Ittai Anati

As workloads and data move to the cloud, it is essential that software writers are able to protect their applications from untrusted hardware, systems software, and co-tenants. Intel® Software Guard Extensions (SGX) enables a new mode of execution that is protected from attacks in such an environment with strong confidentiality, integrity, and replay protection guarantees. Though SGX supports memory oversubscription via paging, virtualizing the protected memory presents a significant challenge to Virtual Machine Monitor (VMM) writers and comes with a high performance overhead. This paper introduces SGX Oversubscription Extensions that add additional instructions and virtualization support to the SGX architecture so that cloud service providers can oversubscribe secure memory in a less complex and more performant manner.


Operating Systems Review | 2011

Direct data flows

Arun Raghunath; John Keys; Mona Vij

Reducing power consumption of Mobile Internet Devices (MID) and smartphones is critical as battery life is a key feature for mobility. Most vendors use System-On-Chip designs integrating more and more fixed-function hardware modules in a bid to reduce power consumption. On the other hand the explosion of new applications has increased the demand for PC-like processing capabilities on these devices. They are best supported by general purpose CPUs and Operating Systems which consume more power. Traditional system architectures focus on a data transfer model with the CPU as one of the endpoints. Consequently there are numerous usage scenarios where the general purpose CPU just acts as an intermediary between hardware modules, transferring data from a hardware module to memory and vice-versa. We propose Direct Data Flows, an SoC focused system architecture where the OS can configure fixed-function hardware modules to communicate data directly with each other. This eliminates unnecessary data hops and reduces CPU interrupts allowing the general purpose CPU to be opportunistically brought into lower power states, reducing overall power consumption. We have created a prototype Direct Data Flow setup for network file downloads which demonstrates up to 65% energy savings for typical file sizes.


Archive | 2004

Memory isolation and virtualization among virtual machines

Mona Vij; Carlos V. Rozas; Kumar Ranganathan


Archive | 2006

Method and apparatus for supporting immutable memory

Carlos V. Rozas; Mona Vij; David Bowler; Christopher F. Clark


Archive | 2005

Virtualized measurement agent

Burzin Daruwala; Carlos V. Rozas; Mona Vij


operating systems design and implementation | 2014

User-guided device driver synthesis

Leonid Ryzhyk; Adam Walker; John Keys; Alexander Legg; Arun Raghunath; Michael Stumm; Mona Vij


Archive | 2011

Storing Data Using A Direct Data Path Architecture To Reduce Energy Consumption And Improve Performance

Ren Wang; Christian Maciocco; Tsung-Yuan C. Tai; Ahmad Samih; Mona Vij; Arun Raghunath; John Keys; Scott Hahn; Raj Yavatkar


Archive | 2005

Method and system for measuring a program using a measurement agent

Burzin Daruwala; Carlos V. Rozas; Mona Vij


Archive | 2015

PROCESSORS, METHODS, SYSTEMS, AND INSTRUCTIONS TO SUPPORT LIVE MIGRATION OF PROTECTED CONTAINERS

Carlos V. Rozas; Mona Vij; Rebekah Leslie-Hurd; Krystof C. Zmudzinski; Somnath Chakrabarti; Francis X. McKeen; Vincent R. Scarlata; Simon P. Johnson; Ilya Alexandrovich; Gilbert Neiger; Vedvyas Shanbhogue; Ittai Anati

Researchain Logo
Decentralizing Knowledge