Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Suzanne K. McIntosh is active.

Publication


Featured researches published by Suzanne K. McIntosh.


acm ifip usenix international conference on middleware | 2007

XenSocket: a high-throughput interdomain transport for virtual machines

Xiaolan Zhang; Suzanne K. McIntosh; Pankaj Rohatgi; John Linwood Griffin

This paper presents the design and implementation of XenSocket, a UNIX-domain-socket-like construct for high-throughput in-terdomain (VM-to-VM) communication on the same system. The design of XenSocket replaces the Xen page-flipping mechanism with a static circular memory buffer shared between two domains, wherein information is written by one domain and read asynchronously by the other domain. XenSocket draws on best-practice work in this field and avoids incurring the overhead of multiple hypercalls and memory page table updates by aggregating what were previously multiple operations on multiple network packets into one or more large operations on the shared buffer. While the reference implementation (and name) of XenSocket is written against the Xen virtual machine monitor, the principle behind XenSocket applies broadly across the field of virtual machines.


international symposium on computer architecture | 2013

Agile, efficient virtualization power management with low-latency server power states

Canturk Isci; Suzanne K. McIntosh; Jeffrey O. Kephart; Rajarshi Das; James E. Hanson; Scott A. Piper; Robert R. Wolford; Thomas M. Brey; Robert F. Kantner; Allen Ng; James Norris; Abdoulaye Traore; Michael J. Frissora

One of the main driving forces of the growing adoption of virtualization is its dramatic simplification of the provisioning and dynamic management of IT resources. By decoupling running entities from the underlying physical resources, and by providing easy-to-use controls to allocate, deallocate and migrate virtual machines (VMs) across physical boundaries, virtualization opens up new opportunities for improving overall system resource use and power efficiency. While a range of techniques for dynamic, distributed resource management of virtualized systems have been proposed and have seen their widespread adoption in enterprise systems, similar techniques for dynamic power management have seen limited acceptance. The main barrier to dynamic, power-aware virtualization management stems not from the limitations of virtualization, but rather from the underlying physical systems; and in particular, the high latency and energy cost of power state change actions suited for virtualization power management. In this work, we first explore the feasibility of low-latency power states for enterprise server systems and demonstrate, with real prototypes, their quantitative energy-performance trade offs compared to traditional server power states. Then, we demonstrate an end-to-end power-aware virtualization management solution leveraging these states, and evaluate the dramatically-favorable power-performance characteristics achievable with such systems. We present, via both real system implementations and scale-out simulations, that virtualization power management with low-latency server power states can achieve comparable overheads as base distributed resource management in virtualized systems, and thus can benefit from the same level of adoption, while delivering close to energy-proportional power efficiency.


international conference on autonomic computing | 2011

Towards data center self-diagnosis using a mobile robot

Jonathan Lenchner; Canturk Isci; Jeffrey O. Kephart; Christopher R. Mansley; Jonathan H. Connell; Suzanne K. McIntosh

We describe an inexpensive robot that serves as a physical autonomic element, capable of navigating, mapping and monitoring data centers with little or no human involvement, even ones that it has never seen before. Through a series of real experiments and simulations, we establish that the robot is sufficiently accurate, efficient and robust to be of practical benefit in real data center environments. We demonstrate how the robots integration with Maximo for Energy Optimization, a commercial data center energy management product, supports autonomic management at the level of the data center as a whole, particularly self-diagnosis of emerging thermal problems.


international conference on robotics and automation | 2011

Robotic mapping and monitoring of data centers

Christopher R. Mansley; Jonathan H. Connell; Canturk Isci; Jonathan Lenchner; Jeffrey O. Kephart; Suzanne K. McIntosh; Michael Alan Schappert

We describe an inexpensive autonomous robot capable of navigating previously unseen data centers and monitoring key metrics such as air temperature1. The robot provides real-time navigation and sensor data to commercial IBM software, thereby enabling real-time generation of the data center layout, a thermal map and other visualizations of energy dynamics. Once it has mapped a data center, the robot can efficiently monitor it for hot spots and other anomalies using intelligent sampling. We demonstrate the robots effectiveness via experimental studies from two production data centers.


Operating Systems Review | 2008

The Caernarvon secure embedded operating system

David C. Toll; Paul A. Karger; Elaine R. Palmer; Suzanne K. McIntosh; Sam Weber

The Caernarvon operating system was developed to demonstrate that a high assurance system for smart cards was technically feasible and commercially viable. The entire system has been designed to be evaluated under the Common Criteria at EAL7, the highest defined level of assurance. Historically, smart card processors have not supported the hardware protection features necessary to separate the OS from the applications, and one application from another. The Caernarvon OS has taken advantage of the first smart card processors with such features to be the first smart card OS to provide this kind of protection. Even when compared with conventional systems where the hardware protection is routine, the Caernarvon OS is noteworthy, because of the EAL7 assurance. This approach facilitated implementation of a formally specified, mandatory security policy providing multi-level security (MLS) suitable for both government agencies and commercial users. The mandatory security policy requires effective authentication of its users that is independent of applications. For this reason, the Caernarvon OS also contains a privacy-preserving, two-way authentication protocol integrated with the Mandatory Security Policy. The Caernarvon OS includes a strong cryptographic library that has been separately certified under the Common Criteria at EAL5+ for use with other systems. The Caernarvon OS implements a secure method for downloading trusted and untrusted application software and data in the field, with the assumption that all applications are potentially hostile. While the initial platform for the operating system was smart cards, the design could also be used in other embedded devices, such as USB tokens, PDAs, cell phones, etc.


ieee symposium on security and privacy | 2011

Lessons Learned: Building the Caernarvon High-Assurance Operating System

Paul A. Karger; Suzanne K. McIntosh; Elaine R. Palmer; David C. Toll; Samuel Weber

This article features lessons learned in designing, developing, and testing features for a high-assurance smart card operating system. In particular, this paper describes software design, development, and testing process, and the advantages reaped from following established process guidelines. The authors describe the project impact experienced from external influences and count among them market pressure from a rapidly changing commercial landscape which demands agility in order to assure continued funding and product success.


international conference on autonomic computing | 2011

A robot as mobile sensor and agent in data center energy management

Hoi Chan; Jonathan H. Connell; Canturk Isci; Jeffrey O. Kephart; Jonathan Lenchner; Christopher R. Mansley; Suzanne K. McIntosh

In this poster/software demonstration we illustrate the integration of an autonomous mobile robot into a slightly customized version of a commercially available asset and data center energy management application known as Maximo Asset Management for Energy Optimization (MEO), version 7.1.1, through a number of practical scenarios. The scenarios showcase increasing degrees of autonomy and sophistication in the areas of data center mapping, monitoring and thermally-aware diagnostics.


financial cryptography | 2010

Implementing a high-assurance smart-card OS

Paul A. Karger; David C. Toll; Elaine R. Palmer; Suzanne K. McIntosh; Sam Weber; Jonathan W. Edwards

Building a high-assurance, secure operating system for memory constrained systems, such as smart cards, introduces many challenges. The increasing power of smart cards has made their use feasible in applications such as electronic passports, military and public sector identification cards, and cell-phone based financial and entertainment applications. Such applications require a secure environment, which can only be provided with sufficient hardware and a secure operating system. We argue that smart cards pose additional security challenges when compared to traditional computer platforms. We discuss our design for a secure smart card operating system, named Caernarvon, and show that it addresses these challenges, which include secure application download, protection of cryptographic functions from malicious applications, resolution of covert channels, and assurance of both security and data integrity in the face of arbitrary power losses.


international symposium on software reliability engineering | 2008

The Feasibility of Automated Feedback-Directed Specification-Based Test Generation: A Case Study of a High-Assurance Operating System

Sam Weber; Amitkumar M. Paradkar; Suzanne K. McIntosh; David C. Toll; Paul A. Karger; Matthew Kaplan; Elaine R. Palmer

In this paper, we describe results of a case study to establish the feasibility of deriving mappings between an abstract user level specification and the code elements in a concrete implementation of a highly secure smart card operating system. Such a mapping is necessary for feedback-directed specification-based test generation to improve code coverage, needed by the stringent criteria for high-assurance systems. We used test cases generated from the user level specification to identify the executed code elements and attempted to use static analysis to map the unexecuted code elements to the corresponding elements in the user level specification. Our primary result is evidence that, given a sufficiently expressive user level specification and a test generation system that is able to effectively use such a specification, the resulting tests will cover the vast majority of the code branches that are able to be covered. Therefore, the benefit of a feedback-directed system will be limited. We further provide evidence that the static analysis required to generate feedback in these cases tends to be difficult, involving inferring the semantics of the internal implementation of data structures. In particular, we observed that the internal states at the implementation level in a high security application pose significant challenges to this mapping process.


Archive | 2007

Method and system for hardware based program flow monitor for embedded software

Suzanne K. McIntosh; Daniel Brand; Matthew Kaplan; Paul A. Karger; Michael G. McIntosh; Elaine R. Palmer; Amitkumar M. Paradkar; David C. Toll; Sam Weber

Researchain Logo
Decentralizing Knowledge