Michael M. Swift

Orcid: 0000-0002-7926-648X

Affiliations:
  • University of Wisconsin-Madison, Madison, USA


According to our database1, Michael M. Swift authored at least 105 papers between 2001 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Cost-effective and performant virtual WANs with CORNIFER.
CoRR, 2024

Characterizing Physical Memory Fragmentation.
CoRR, 2024

FBMM: Making Memory Management Extensible With Filesystems.
Proceedings of the 2024 USENIX Annual Technical Conference, 2024

Architecting Trigger-Action Platforms for Security, Performance and Functionality.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

BypassD: Enabling fast userspace access to shared SSDs.
Proceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2024

2023
Policy/mechanism separation in the Warehouse-Scale OS.
CoRR, 2023

Guarding Serverless Applications with Kalium.
Proceedings of the 32nd USENIX Security Symposium, 2023

STYX: Exploiting SmartNIC Capability to Reduce Datacenter Memory Tax.
Proceedings of the 2023 USENIX Annual Technical Conference, 2023

LEED: A Low-Power, Fast Persistent Key-Value Store on SmartNIC JBOFs.
Proceedings of the ACM SIGCOMM 2023 Conference, 2023

LogNIC: A High-Level Performance Model for SmartNICs.
Proceedings of the 56th Annual IEEE/ACM International Symposium on Microarchitecture, 2023

FBMM: Using the VFS for Extensibility in Kernel Memory Management.
Proceedings of the 19th Workshop on Hot Topics in Operating Systems, 2023

MadFS: Per-File Virtualization for Userspace Persistent Memory Filesystems.
Proceedings of the 21st USENIX Conference on File and Storage Technologies, 2023

2022
Using Trātṛ to tame Adversarial Synchronization.
Proceedings of the 31st USENIX Security Symposium, 2022

Gossamer: Securely Measuring Password-based Logins.
Proceedings of the 31st USENIX Security Symposium, 2022

CBMM: Financial Advice for Kernel Memory Managers.
Proceedings of the 2022 USENIX Annual Technical Conference, 2022

DaxVM: Stressing the Limits of Memory as a File Interface.
Proceedings of the 55th IEEE/ACM International Symposium on Microarchitecture, 2022

ASAP: A Speculative Approach to Persistence.
Proceedings of the IEEE International Symposium on High-Performance Computer Architecture, 2022

Software-defined address mapping: a case on 3D memory.
Proceedings of the ASPLOS '22: 27th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Lausanne, Switzerland, 28 February 2022, 2022

2021
PL2: Towards Predictable Low Latency in Rack-Scale Networks.
CoRR, 2021

ATP: In-network Aggregation for Multi-tenant Learning.
Proceedings of the 18th USENIX Symposium on Networked Systems Design and Implementation, 2021

2020
Guarding Serverless Applications with SecLambda.
CoRR, 2020

Blending containers and virtual machines: a study of firecracker and gVisor.
Proceedings of the VEE '20: 16th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, 2020

Scalable Parallel Flash Firmware for Many-core Architectures.
Proceedings of the 18th USENIX Conference on File and Storage Technologies, 2020

Avoiding scheduler subversion using scheduler-cooperative locks.
Proceedings of the EuroSys '20: Fifteenth EuroSys Conference 2020, 2020

∅sim: Preparing System Software for a World with Terabyte-scale Memories.
Proceedings of the ASPLOS '20: Architectural Support for Programming Languages and Operating Systems, 2020

MOD: Minimally Ordered Durable Datastructures for Persistent Memory.
Proceedings of the ASPLOS '20: Architectural Support for Programming Languages and Operating Systems, 2020

2019
Don't Persist All : Efficient Persistent Data Structures.
CoRR, 2019

Loom: Flexible and Efficient NIC Packet Scheduling.
Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation, 2019

Per-Application Power Delivery.
Proceedings of the Fourteenth EuroSys Conference 2019, Dresden, Germany, March 25-28, 2019, 2019

On the Impact of Cluster Configuration on RoCE Application Design.
Proceedings of the 3rd Asia-Pacific Workshop on Networking, 2019

2018
Introduction to the Special Issue on NVM and Storage.
ACM Trans. Storage, 2018

Peeking Behind the Curtains of Serverless Platforms.
Proceedings of the 2018 USENIX Annual Technical Conference, 2018

BIBIM: A Prototype Multi-Partition Aware Heterogeneous New Memory.
Proceedings of the 10th USENIX Workshop on Hot Topics in Storage and File Systems, 2018

Your Programmable NIC Should be a Programmable Switch.
Proceedings of the 17th ACM Workshop on Hot Topics in Networks, 2018

RoGUE: RDMA over Generic Unconverged Ethernet.
Proceedings of the ACM Symposium on Cloud Computing, 2018

Devirtualizing Memory in Heterogeneous Systems.
Proceedings of the Twenty-Third International Conference on Architectural Support for Programming Languages and Operating Systems, 2018

2017
Agile Paging for Efficient Memory Virtualization.
IEEE Micro, 2017

Rethinking Security in the Era of Cloud Computing.
IEEE Secur. Priv., 2017

Titan: Fair Packet Scheduling for Commodity Multiqueue NICs.
Proceedings of the 2017 USENIX Annual Technical Conference, 2017

Towards O(1) Memory.
Proceedings of the 16th Workshop on Hot Topics in Operating Systems, 2017

TapCon: Practical Third-Party Attestation for the Cloud.
Proceedings of the 9th USENIX Workshop on Hot Topics in Cloud Computing, 2017

UNO: uniflying host and smart NIC offload for flexible packet processing.
Proceedings of the 2017 Symposium on Cloud Computing, SoCC 2017, Santa Clara, CA, USA, 2017

An Analysis of Persistent Memory Use with WHISPER.
Proceedings of the Twenty-Second International Conference on Architectural Support for Programming Languages and Operating Systems, 2017

2016
Range Translations for Fast Virtual Memory.
IEEE Micro, 2016

Agile Paging: Exceeding the Best of Nested and Shadow Paging.
Proceedings of the 43rd ACM/IEEE Annual International Symposium on Computer Architecture, 2016

Energy-efficient address translation.
Proceedings of the 2016 IEEE International Symposium on High Performance Computer Architecture, 2016

CQSTR: Securing Cross-Tenant Applications with Cloud Containers.
Proceedings of the Seventh ACM Symposium on Cloud Computing, 2016

POSTER: Firestorm: Operating Systems for Power-Constrained Architectures.
Proceedings of the 2016 International Conference on Parallel Architectures and Compilation, 2016

Rinnegan: Efficient Resource Use in Heterogeneous Architectures.
Proceedings of the 2016 International Conference on Parallel Architectures and Compilation, 2016

2015
A Placement Vulnerability Study in Multi-Tenant Public Clouds.
Proceedings of the 24th USENIX Security Symposium, 2015

Bolt: Faster Reconfiguration in Operating Systems.
Proceedings of the 2015 USENIX Annual Technical Conference, 2015

Redundant memory mappings for fast access to large memories.
Proceedings of the 42nd Annual International Symposium on Computer Architecture, 2015

2014
Design and Prototype of a Solid-State Cache.
ACM Trans. Storage, 2014

BadgerTrap: a tool to instrument x86-64 TLB misses.
SIGARCH Comput. Archit. News, 2014

Scheduler-based Defenses against Cross-VM Side-channels.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

Not-So-Random Numbers in Virtualized Linux and the Whirlwind RNG.
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014

DESSERT: DESign Space ExploRation Tool based on power and energy at System-Level.
Proceedings of the 27th IEEE International System-on-Chip Conference, 2014

Efficient Memory Virtualization: Reducing Dimensionality of Nested Page Walks.
Proceedings of the 47th Annual IEEE/ACM International Symposium on Microarchitecture, 2014

Performance analysis of the memory management unit under scale-out workloads.
Proceedings of the 2014 IEEE International Symposium on Workload Characterization, 2014

A Day Late and a Dollar Short: The Case for Research on Cloud Billing Systems.
Proceedings of the 6th USENIX Workshop on Hot Topics in Cloud Computing, 2014

Aerie: flexible file-system interfaces to storage-class memory.
Proceedings of the Ninth Eurosys Conference 2014, 2014

2013
Efficient virtual memory for big memory servers.
Proceedings of the 40th Annual International Symposium on Computer Architecture, 2013

FreshCache: Statically and dynamically exploiting dataless ways.
Proceedings of the 2013 IEEE 31st International Conference on Computer Design, 2013

Getting real: lessons in transitioning research simulations into hardware systems.
Proceedings of the 11th USENIX conference on File and Storage Technologies, 2013

Fine-grained fault tolerance using device checkpoints.
Proceedings of the Architectural Support for Programming Languages and Operating Systems, 2013

Storage-class memory needs flexible interfaces.
Proceedings of the Asia-Pacific Workshop on Systems, 2013

2012
SymDrive: Testing Drivers without Devices.
Proceedings of the 10th USENIX Symposium on Operating Systems Design and Implementation, 2012

Reducing memory reference energy with opportunistic virtual caching.
Proceedings of the 39th International Symposium on Computer Architecture (ISCA 2012), 2012

Operating Systems Should Manage Accelerators.
Proceedings of the 4th USENIX Workshop on Hot Topics in Parallelism, 2012

FlashTier: a lightweight, consistent and durable storage cache.
Proceedings of the European Conference on Computer Systems, 2012

Hathi: durable transactions for memory using flash.
Proceedings of the Eighth International Workshop on Data Management on New Hardware, 2012

More for your money: exploiting performance heterogeneity in public clouds.
Proceedings of the ACM Symposium on Cloud Computing, SOCC '12, 2012

Resource-freeing attacks: improve your cloud performance (at your neighbor's expense).
Proceedings of the ACM Conference on Computer and Communications Security, 2012

Applying transactional memory to concurrency bugs.
Proceedings of the 17th International Conference on Architectural Support for Programming Languages and Operating Systems, 2012

Chameleon: operating system support for dynamic processors.
Proceedings of the 17th International Conference on Architectural Support for Programming Languages and Operating Systems, 2012

Understanding modern device drivers.
Proceedings of the 17th International Conference on Architectural Support for Programming Languages and Operating Systems, 2012

2011
The Best of Both Worlds with On-Demand Virtualization.
Proceedings of the 13th Workshop on Hot Topics in Operating Systems, 2011

Mnemosyne: lightweight persistent memory.
Proceedings of the 16th International Conference on Architectural Support for Programming Languages and Operating Systems, 2011

2010
Membrane: Operating system support for restartable file systems.
ACM Trans. Storage, 2010

Why panic()?: improving reliability with restartable file systems.
ACM SIGOPS Oper. Syst. Rev., 2010

FlashVM: Virtual Memory Management on Flash.
Proceedings of the 2010 USENIX Annual Technical Conference, 2010

2009
Live migration of direct-access devices.
ACM SIGOPS Oper. Syst. Rev., 2009

Decaf: Moving Device Drivers to a Modern Language.
Proceedings of the 2009 USENIX Annual Technical Conference, 2009

Tolerating hardware device failures in software.
Proceedings of the 22nd ACM Symposium on Operating Systems Principles 2009, 2009

FlashVM: Revisiting the Virtual Memory Hierarchy.
Proceedings of HotOS'09: 12th Workshop on Hot Topics in Operating Systems, 2009

xCalls: safe I/O in memory transactions.
Proceedings of the 2009 EuroSys Conference, Nuremberg, Germany, April 1-3, 2009, 2009

Protecting Commodity Operating System Kernels from Vulnerable Device Drivers.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009

2008
Performance Pathologies in Hardware Transactional Memory.
IEEE Micro, 2008

TokenTM: Efficient Execution of Large Transactions with Hardware Transactional Memory.
Proceedings of the 35th International Symposium on Computer Architecture (ISCA 2008), 2008

Analyzing the effects of disk-pointer corruption.
Proceedings of the 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2008

The design and implementation of microdrivers.
Proceedings of the 13th International Conference on Architectural Support for Programming Languages and Operating Systems, 2008

2007
LogTM-SE: Decoupling Hardware Transactional Memory from Caches.
Proceedings of the 13st International Conference on High-Performance Computer Architecture (HPCA-13 2007), 2007

Microdrivers: A New Architecture for Device Drivers.
Proceedings of HotOS'07: 11th Workshop on Hot Topics in Operating Systems, 2007

A Case for Deconstructing Hardware Transactional Memory Systems.
Proceedings of the Programming Models for Ubiquitous Parallelism, 02.09. - 07.09.2007, 2007

2006
Recovering device drivers.
ACM Trans. Comput. Syst., 2006

Supporting nested transactional memory in logTM.
Proceedings of the 12th International Conference on Architectural Support for Programming Languages and Operating Systems, 2006

2005
Improving the reliability of commodity operating systems.
ACM Trans. Comput. Syst., 2005

2004
Recovering Device Drivers (Awarded Best Paper!).
Proceedings of the 6th Symposium on Operating System Design and Implementation (OSDI 2004), 2004

2003
An evaluation of speculative instruction execution on simultaneous multithreaded processors.
ACM Trans. Comput. Syst., 2003

Using Computers to Diagnose Computer Problems.
Proceedings of HotOS'03: 9th Workshop on Hot Topics in Operating Systems, 2003

2002
Microsoft Windows 2000 Kerberos Change Password and Set Password Protocols.
RFC, February, 2002

Improving the granularity of access control for Windows 2000.
ACM Trans. Inf. Syst. Secur., 2002

Nooks: an architecture for reliable device drivers.
Proceedings of the 10th ACM SIGOPS European Workshop, Saint-Emilion, France, July 1, 2002, 2002

2001
Improving the granularity of access control in Windows NT.
Proceedings of the 6th ACM Symposium on Access Control Models and Technologies, 2001

Implementation of Crossrealm Referral Handling in the MIT Kerberos Client.
Proceedings of the Network and Distributed System Security Symposium, 2001


  Loading...