With my permission, you can substitute an article by a different one. You can add an additional article with or without my permission. An excellent resource for searching the literature is: scholar.google.com If you find an author that you really like, try: google: AUTHOR_NAME dblp Memory consistency: a. Adve, S.V. and Gharachorloo, K., 1996. Shared memory consistency models: A tutorial. computer, 29(12), pp.66-76. http://ieeexplore.ieee.org/abstract/document/546611/ http://www.dtic.mil/get-tr-doc/pdf?AD=ADA638015 b. Hammond, L., Wong, V., Chen, M., Carlstrom, B.D., Davis, J.D., Hertzberg, B., Prabhu, M.K., Wijaya, H., Kozyrakis, C. and Olukotun, K., 2004, June. Transactional memory coherence and consistency. In ACM SIGARCH Computer Architecture News (Vol. 32, No. 2, p. 102). IEEE Computer Society. https://dl.acm.org/citation.cfm?id=1006711 http://csl.stanford.edu/~christos/publications/2004.tcc.isca.slides.pdf c. Fraser, K., 2004. Practical lock-freedom (No. UCAM-CL-TR-579). University of Cambridge, Computer Laboratory. https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-579.html http://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-579.pdf Cache coherence: directory-based and bus snooping a. Agarwal, A., Simoni, R., Hennessy, J. and Horowitz, M., 1988, June. An evaluation of directory schemes for cache coherence. In ACM SIGARCH Computer Architecture News (Vol. 16, No. 2, pp. 280-298). IEEE Computer Society Press. http://eecs.vanderbilt.edu/Courses/eece343/papers/p280-agarwal.pdf https://dl.acm.org/citation.cfm?id=52432 b. Lenoski, D., Laudon, J., Gharachorloo, K., Gupta, A. and Hennessy, J., 1990. The directory-based cache coherence protocol for the DASH multiprocessor (Vol. 18, No. 2SI, pp. 148-159). ACM. http://dl.acm.org/citation.cfm?id=325132 http://www.academia.edu/download/31966721/p148-lenoski.pdf c. Mellor-Crummey, J.M. and Scott, M.L., 1991. Algorithms for scalable synchronization on shared-memory multiprocessors. ACM Transactions on Computer Systems (TOCS), 9(1), pp.21-65. http://dl.acm.org/citation.cfm?id=103729 https://cis.temple.edu/~qzeng/cis5512-fall2015/papers/p21-mellor-crummey.pdf Distributed Computing (introduction and fundamentals) a. Time, Clocks, and the Ordering of Events in a Distributed System: http://lamport.azurewebsites.net/pubs/time-clocks.pdf (This paper introduces a global view of time in a distributed system.) b. Paxos Made Simple, Leslie Lamport http://www.cs.utexas.edu/users/lorenzo/corsi/cs380d/past/03F/notes/paxos-simple.pdf (Again, this is the root of almost every distributed transaction system.) c. In Search of an Understandable Consensus Algorithm: https://www.usenix.org/system/files/conference/atc14/atc14-paper-ongaro.pdf (Compared to Paxos, Raft is more understandable.) d. Distributed snapshots: determining global states of distributed systems: https://dl.acm.org/citation.cfm?id=214456 (Since we've done checkpointing, you may find the theory behind a global snapshot interesting.) Distributed Shared Memory a. Nitzberg, B. and Lo, V., 1991. Distributed shared memory: A survey of issues and algorithms. Computer, 24(8), pp.52-60. http://ieeexplore.ieee.org/abstract/document/84877/ https://pdfs.semanticscholar.org/867a/d29b3392965e40ede63f3cdbfdedac1c781b.pdf b. Nelson, Jacob, et al. "Latency-Tolerant Software Distributed Shared Memory." USENIX Annual Technical Conference. 2015. https://www.usenix.org/sites/default/files/conference/protected-files/atc15_slides_nelson.pdf https://sampa.cs.washington.edu/new/papers/grappa-usenix-2015.pdf https://www.usenix.org/conference/atc15/technical-session/presentation/nelson c. Zaharia, M., Chowdhury, M., Franklin, M.J., Shenker, S. and Stoica, I., 2010. Spark: Cluster computing with working sets. HotCloud, 10(10-10), p.95. http://static.usenix.org/legacy/events/hotcloud10/tech/full_papers/Zaharia.pdf http://static.usenix.org/legacy/events/hotcloud10/tech/full_papers/Zaharia.pdf d. Cao, G., 2003. A scalable low-latency cache invalidation strategy for mobile environments. IEEE Transactions on Knowledge and Data Engineering, 15(5), pp.1251-1265. http://ieeexplore.ieee.org/abstract/document/1232276/ http://www.cs.columbia.edu/~danr/courses/6762/Summer03/week13/mobile-cache.pdf [ CHOOSE 3 of the 4 articles ] Locksets and Concurrent Software a. A Survey of Recent Trends in Testing Concurrent Software Systems b. Eraser: a Dynamic Data Race Detector for Multi-threaded Progrmans Proc. ACM Symp. on Op. Sys. Principles, 1997; or Journal ACM Trans. on Comp. Sys. (TOCS) c. FILL IN Lock-free algorithms a. Michael, M.M., 2004. ABA prevention using single-word instructions. IBM Research Division, RC23089 (W0401-136), Tech. Rep. http://bb3x.ru/blog/goto/http://www.research.ibm.com/people/m/michael/RC23089.pdf http://www.research.ibm.com/people/m/michael/RC23089.pdf b. Michael, M.M., 2004. Hazard pointers: Safe memory reclamation for lock-free objects. IEEE Transactions on Parallel and Distributed Systems, 15(6), pp.491-504. http://ieeexplore.ieee.org/abstract/document/1291819/ https://www.cs.bgu.ac.il/~satcc112/wiki.files/HazardPointers.pdf c. Hendler, D., Shavit, N. and Yerushalmi, L., 2004, June. A scalable lock-free stack algorithm. In Proceedings of the sixteenth annual ACM symposium on Parallelism in algorithms and architectures (pp. 206-215). ACM. http://dl.acm.org/citation.cfm?id=1007944 http://www.inf.ufsc.br/~dovicchi/pos-ed/pos/artigos/p206-hendler.pdf Docker and containers a. Stubbs, J., Moreira, W. and Dooley, R., 2015, June. Distributed systems of microservices using docker and serfnode. In Science Gateways (IWSG), 2015 7th International Workshop on (pp. 34-39). IEEE. http://ieeexplore.ieee.org/abstract/document/7217926/ b. Manco, F., Lupu, C., Schmidt, F., Mendes, J., Kuenzer, S., Sati, S., Yasukata, K., Raiciu, C. and Huici, F., 2017. My VM is Lighter (and Safer) than your Container. http://flosch.eu/papers/2017-sosp-lightvm.pdf c. Bernstein, D., 2014. Containers and cloud: From LXC to Docker to Kubernetes. IEEE Cloud Computing, 1(3), pp.81-84. http://ieeexplore.ieee.org/abstract/document/7036275/ http://www.ce.uniroma2.it/courses/sdcc1617/articoli/bernstein_cc2014.pdf Docker and the Cloud a. Smet, P., Dhoedt, B. and Simoens, P., 2016, April. On-demand provisioning of long-tail services in distributed clouds. In Network Operations and Management Symposium (NOMS), 2016 IEEE/IFIP (pp. 1320-1323). IEEE. http://ieeexplore.ieee.org/abstract/document/7503011/ https://biblio.ugent.be/publication/7242833/file/7242835 b. Higgins, J., Holmes, V. and Venters, C., 2015, July. Orchestrating docker containers in the HPC environment. In International Conference on High Performance Computing (pp. 506-513). Springer, Cham. http://link.springer.com/chapter/10.1007/978-3-319-20119-1_36 https://www.researchgate.net/profile/Joshua_Higgins/publication/300779185_Orchestrating_Docker_Containers_in_the_HPC_Environment/links/57e63d9408aed7fe46653a1f/Orchestrating-Docker-Containers-in-the-HPC-Environment.pdf c. Pahl, C. and Lee, B., 2015, August. Containers and clusters for edge cloud architectures--a technology review. In Future Internet of Things and Cloud (FiCloud), 2015 3rd International Conference on (pp. 379-386). IEEE. http://ieeexplore.ieee.org/abstract/document/7300842/ http://doras.dcu.ie/20641/1/FICloud15-EdgeCloudContainer.pdf d. Bui, T., 2015. Analysis of docker security. arXiv preprint arXiv:1501.02967. https://arxiv.org/abs/1501.02967 https://arxiv.org/abs/1501.02967 [ CHOOSE 3 of the 4 articles ] Mesos, OpenShift, etc. a. Grit, L., Irwin, D., Yumerefendi, A. and Chase, J., 2006, November. Virtual machine hosting for networked clusters: Building the foundations for" autonomic" orchestration. In Virtualization Technology in Distributed Computing, 2006. VTDC 2006. First International Workshop on (pp. 7-7). IEEE. http://ieeexplore.ieee.org/abstract/document/4299352/ http://www.ecs.umass.edu/~deirwin/migration.pdf b. Hindman, B., Konwinski, A., Zaharia, M., Ghodsi, A., Joseph, A.D., Katz, R.H., Shenker, S. and Stoica, I., 2011, March. Mesos: A Platform for Fine-Grained Resource Sharing in the Data Center. In NSDI (Vol. 11, No. 2011, pp. 22-22). http://static.usenix.org/events/nsdi11/tech/full_papers/Hindman_new.pdf c. Pahl, C. and Lee, B., 2015, August. Containers and clusters for edge cloud architectures--a technology review. In Future Internet of Things and Cloud (FiCloud), 2015 3rd International Conference on (pp. 379-386). IEEE. http://ieeexplore.ieee.org/abstract/document/7300842/ http://doras.dcu.ie/20641/1/FICloud15-EdgeCloudContainer.pdf Evolution of GPU computing for mixed games and general computation a. Owens, J.D., Houston, M., Luebke, D., Green, S., Stone, J.E. and Phillips, J.C., 2008. GPU computing. Proceedings of the IEEE, 96(5), pp.879-899. http://ieeexplore.ieee.org/abstract/document/4490127/ http://cs.utsa.edu/~qitian/seminar/Spring11/03_04_11/GPU.pdf b. Nickolls, J. and Dally, W.J., 2010. The GPU computing era. IEEE micro, 30(2). http://ieeexplore.ieee.org/abstract/document/5446251/ http://www.joehummel.net/uploads/GPU-Computing-Era.pdf c. Pratx, G. and Xing, L., 2011. GPU computing in medical physics: A review. Medical physics, 38(5), pp.2685-2697. http://onlinelibrary.wiley.com/doi/10.1118/1.3578605/full https://pdfs.semanticscholar.org/e91c/7049e519a3d43fac7c1e75f71a5de5165938.pdf d. Lee, V.W., Kim, C., Chhugani, J., Deisher, M., Kim, D., Nguyen, A.D., Satish, N., Smelyanskiy, M., Chennupaty, S., Hammarlund, P. and Singhal, R., 2010. Debunking the 100X GPU vs. CPU myth: an evaluation of throughput computing on CPU and GPU. ACM SIGARCH computer architecture news, 38(3), pp.451-460. http://dl.acm.org/citation.cfm?id=1816021 http://www.academia.edu/download/44352770/Debunking_the_100X_GPU_vs._CPU_myth_an_e20160403-24068-1lejaes.pdf e. Lindholm, E., Nickolls, J., Oberman, S. and Montrym, J., 2008. NVIDIA Tesla: A unified graphics and computing architecture. IEEE micro, 28(2). http://ieeexplore.ieee.org/abstract/document/4523358/ https://fenix.tecnico.ulisboa.pt/downloadFile/3779576765088/IEEEMicro_TESLA.pdf [ CHOOSE 3 of the 5 articles ] GPU computing and Deep Learning a. Nickolls, J. and Dally, W.J., 2010. The GPU computing era. IEEE micro, 30(2). http://ieeexplore.ieee.org/abstract/document/5446251/ http://www.joehummel.net/uploads/GPU-Computing-Era.pdf b. Jia, Y., Shelhamer, E., Donahue, J., Karayev, S., Long, J., Girshick, R., Guadarrama, S. and Darrell, T., 2014, November. Caffe: Convolutional architecture for fast feature embedding. In Proceedings of the 22nd ACM international conference on Multimedia (pp. 675-678). ACM. http://dl.acm.org/citation.cfm?id=2654889 https://arxiv.org/pdf/1408.5093 c. Coates, A., Huval, B., Wang, T., Wu, D., Catanzaro, B. and Andrew, N., 2013, February. Deep learning with COTS HPC systems. In International Conference on Machine Learning (pp. 1337-1345). http://www.jmlr.org/proceedings/papers/v28/coates13.pdf http://www.jmlr.org/proceedings/papers/v28/coates13.pdf d. Jia, Y., Shelhamer, E., Donahue, J., Karayev, S., Long, J., Girshick, R., Guadarrama, S. and Darrell, T., 2014, November. Caffe: Convolutional architecture for fast feature embedding. In Proceedings of the 22nd ACM international conference on Multimedia (pp. 675-678). ACM. http://dl.acm.org/citation.cfm?id=2654889 http://dl.acm.org/citation.cfm?id=2654889 [ CHOOSE 3 of the 4 articles ] Deep Learning at large scale a. Abadi, M., Barham, P., Chen, J., Chen, Z., Davis, A., Dean, J., Devin, M., Ghemawat, S., Irving, G., Isard, M. and Kudlur, M., 2016, November. TensorFlow: A System for Large-Scale Machine Learning. In OSDI (Vol. 16, pp. 265-283). https://www.usenix.org/system/files/conference/osdi16/osdi16-abadi.pdf b. Li, M., Andersen, D.G., Park, J.W., Smola, A.J., Ahmed, A., Josifovski, V., Long, J., Shekita, E.J. and Su, B.Y., 2014, October. Scaling Distributed Machine Learning with the Parameter Server. In OSDI (Vol. 1, No. 10.4, p. 3). https://www.usenix.org/system/files/conference/osdi14/osdi14-paper-li_mu.pdf d. Cui, H., Zhang, H., Ganger, G.R., Gibbons, P.B. and Xing, E.P., 2016, April. GeePS: Scalable deep learning on distributed GPUs with a GPU-specialized parameter server. In Proceedings of the Eleventh European Conference on Computer Systems (p. 4). ACM. http://dl.acm.org/citation.cfm?id=2901323 http://dl.acm.org/ft_gateway.cfm?id=2901323&type=pdf d. Dean, J., Corrado, G., Monga, R., Chen, K., Devin, M., Mao, M., Senior, A., Tucker, P., Yang, K., Le, Q.V. and Ng, A.Y., 2012. Large scale distributed deep networks. In Advances in neural information processing systems (pp. 1223-1231). http://papers.nips.cc/paper/4687-large-scale-distributed-deep-networks http://papers.nips.cc/paper/4687-large-scale-distributed-deep-networks.pdf [ CHOOSE 3 of the 4 articles ] Variations on Deep Learning a. Du, M., Li, F., Zheng, G. and Srikumar, V., 2017. DeepLog: Anomaly Detection and Diagnosis from System Logs through Deep Learning. http://www.cs.utah.edu/~lifeifei/papers/deeplog.pdf b. Li, H., Su, P., Chi, Z. and Wang, J., 2016, August. Image retrieval and classification on deep convolutional SparkNet. In Signal Processing, Communications and Computing (ICSPCC), 2016 IEEE International Conference on (pp. 1-6). IEEE. http://ieeexplore.ieee.org/abstract/document/7753615/ (should be available through N.U. account at school) c. Nishihara, R., Moritz, P., Wang, S., Tumanov, A., Paul, W., Schleier-Smith, J., Liaw, R., Niknami, M., Jordan, M.I. and Stoica, I., 2017, May. Real-time machine learning: The missing pieces. In Proceedings of the 16th Workshop on Hot Topics in Operating Systems (pp. 106-110). ACM. http://dl.acm.org/citation.cfm?id=3102998 https://arxiv.org/pdf/1703.03924 GPU computing and HPC a. Kindratenko, V.V., Enos, J.J., Shi, G., Showerman, M.T., Arnold, G.W., Stone, J.E., Phillips, J.C. and Hwu, W.M., 2009, August. GPU clusters for high-performance computing. In Cluster Computing and Workshops, 2009. CLUSTER'09. IEEE International Conference on (pp. 1-8). IEEE. http://ieeexplore.ieee.org/abstract/document/5289128/ http://www.academia.edu/download/46144265/GPU_clusters_for_high-performance_comput20160601-26072-pnwmu7.pdf b. Ubal, R., Jang, B., Mistry, P., Schaa, D. and Kaeli, D., 2012, September. Multi2Sim: a simulation framework for CPU-GPU computing. In Parallel Architectures and Compilation Techniques (PACT), 2012 21st International Conference on (pp. 335-344). IEEE. http://ieeexplore.ieee.org/abstract/document/7842946/ http://www1.coe.neu.edu/~ubal/pubfiles/pact12.pdf c. Grasso, I., Radojkovic, P., Rajovic, N., Gelado, I. and Ramirez, A., 2014, May. Energy efficient hpc on embedded socs: Optimization techniques for mali gpu. In Parallel and Distributed Processing Symposium, 2014 IEEE 28th International (pp. 123-132). IEEE. http://ieeexplore.ieee.org/abstract/document/6877248/ https://www.researchgate.net/profile/Ivan_Grasso2/publication/269268665_Energy_efficient_HPC_on_embedded_SoCs_Optimization_techniques_for_mali_GPU/links/558bb79008aee99ca9ca555a.pdf supercomputing and silend data corruption (SDC) a. Guhur, P.L., Constantinescu, E., Ghosh, D., Peterka, T. and Cappello, F., 2017, September. Detection of Silent Data Corruption in Adaptive Numerical Integration Solvers. In Cluster Computing (CLUSTER), 2017 IEEE International Conference on (pp. 592-602). IEEE. http://ieeexplore.ieee.org/abstract/document/8048974/ https://www.researchgate.net/profile/Debojyoti_Ghosh2/publication/320027919_Detection_of_Silent_Data_Corruption_in_Adaptive_Numerical_Integration_Solvers/links/59cd34fb4585152f7d95ff3a/Detection-of-Silent-Data-Corruption-in-Adaptive-Numerical-Integration-Solvers.pdf b. Ma, J., Wang, Y., Zhou, L., Hu, C. and Wang, H., 2015, September. SDCInfer: Inference of silent data corruption causing instructions. In Software Engineering and Service Science (ICSESS), 2015 6th IEEE International Conference on (pp. 228-232). IEEE. http://ieeexplore.ieee.org/abstract/document/7339043/ c. Thomas, T.E., Bhattad, A.J., Mitra, S. and Bagchi, S., 2016, September. Sirius: Neural network based probabilistic assertions for detecting silent data corruption in parallel programs. In Reliable Distributed Systems (SRDS), 2016 IEEE 35th Symposium on (pp. 41-50). IEEE. http://ieeexplore.ieee.org/abstract/document/7794328/ d. Di, S., Berrocal, E. and Cappello, F., 2015, May. An efficient silent data corruption detection method with error-feedback control and even sampling for HPC applications. In Cluster, Cloud and Grid Computing (CCGrid), 2015 15th IEEE/ACM International Symposium on (pp. 271-280). IEEE. http://ieeexplore.ieee.org/abstract/document/7152493/ http://www.academia.edu/download/41525335/An_Efficient_Silent_Data_Corruption_Dete20160124-26447-ssbo5c.pdf [ CHOOSE 3 of the 4 articles ] false sharing: a. Nanavati, M., Spear, M., Taylor, N., Rajagopalan, S., Meyer, D.T., Aiello, W. and Warfield, A., 2013, April. Whose cache line is it anyway?: operating system support for live detection and repair of false sharing. In Proceedings of the 8th ACM European Conference on Computer Systems (pp. 141-154). ACM. http://dl.acm.org/citation.cfm?id=2465366 http://www.cs.ubc.ca/~andy/papers/plastic-eurosys-final.pdf b. Liu, T. and Berger, E., 2010. Sheriff: Detecting and eliminating false sharing. University of Massachusetts, Amherst, Tech. Rep. UM-CS-2010-047. https://pdfs.semanticscholar.org/57e0/302f165fe531514a47e8c70419ba1ca490e7.pdf https://pdfs.semanticscholar.org/57e0/302f165fe531514a47e8c70419ba1ca490e7.pdf c. DeLozier, C., Eizenberg, A., Hu, S., Pokam, G. and Devietti, J., 2017, October. TMI: thread memory isolation for false sharing repair. In Proceedings of the 50th Annual IEEE/ACM International Symposium on Microarchitecture (pp. 639-650). ACM. http://dl.acm.org/citation.cfm?id=3123947 https://pdfs.semanticscholar.org/9249/15ae02e621c10f257fb09a1dcc0202d9aad4.pdf d. Liu, T., Tian, C., Hu, Z. and Berger, E.D., 2014, February. PREDATOR: predictive false sharing detection. In ACM SIGPLAN Notices (Vol. 49, No. 8, pp. 3-14). ACM. http://dl.acm.org/citation.cfm?id=2555244 http://www.cs.utsa.edu/~tongpingliu/pubs/Predator-ppopp14.pdf [ CHOOSE 3 of the 4 articles ] Race conditions and determinism a. Liu, T., Curtsinger, C. and Berger, E.D., 2011, October. Dthreads: efficient deterministic multithreading. In Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles (pp. 327-336). ACM. http://dl.acm.org/citation.cfm?id=2043587 http://www.cse.iitd.ac.in/~cs1100211/files/btp_paper.pdf b. Jin, G., Zhang, W., Deng, D., Liblit, B. and Lu, S., 2012, October. Automated Concurrency-Bug Fixing. In OSDI (Vol. 12, pp. 221-236). https://www.usenix.org/system/files/conference/osdi12/osdi12-final-103.pdf c. Cui, H., Wu, J., Gallagher, J., Guo, H. and Yang, J., 2011, October. Efficient deterministic multithreading through schedule relaxation. In Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles (pp. 337-351). ACM. http://dl.acm.org/citation.cfm?id=2043588 https://pdfs.semanticscholar.org/a115/68c8209c44ae873092d10ae66fdeca33d9c2.pdf d. Cui, H., Simsa, J., Lin, Y.H., Li, H., Blum, B., Xu, X., Yang, J., Gibson, G.A. and Bryant, R.E., 2013, November. Parrot: a practical runtime for deterministic, stable, and reliable threads. In Proceedings of the Twenty-Fourth ACM Symposium on Operating Systems Principles (pp. 388-405). ACM. http://dl.acm.org/citation.cfm?id=2522735 [ CHOOSE 3 of the 4 articles ] Scalable memory allocation a. Berger, E.D., McKinley, K.S., Blumofe, R.D. and Wilson, P.R., 2000. Hoard: A scalable memory allocator for multithreaded applications. ACM Sigplan Notices, 35(11), pp.117-128. http://dl.acm.org/citation.cfm?id=357000 http://parasol.tamu.edu/people/rwerger/Courses/689/spring2002/day-3-ParMemAlloc/papers/berger00hoard.pdf b. Michael, M.M., 2004. Scalable lock-free dynamic memory allocation. ACM Sigplan Notices, 39(6), pp.35-46. http://dl.acm.org/citation.cfm?id=996848 http://researchweb.watson.ibm.com/people/m/michael/pldi-2004.pdf c. Berger, E.D., Zorn, B.G. and McKinley, K.S., 2013. OOPSLA 2002: Reconsidering custom memory allocation. ACM SIGPLAN Notices, 48(4S), pp.46-57. http://dl.acm.org/citation.cfm?id=2502522 http://www.allendowney.com/ss08/handouts/berger02reconsidering.pdf Hypervisors a. Seshadri, A., Luk, M., Qu, N. and Perrig, A., 2007, October. SecVisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity OSes. In ACM SIGOPS Operating Systems Review (Vol. 41, No. 6, pp. 335-350). ACM. http://dl.acm.org/citation.cfm?id=1294294 http://cs.cmu.edu/~arvinds/pubs/secvisor.pdf b. Szefer, J., Keller, E., Lee, R.B. and Rexford, J., 2011, October. Eliminating the hypervisor attack surface for a more secure cloud. In Proceedings of the 18th ACM conference on Computer and communications security (pp. 401-412). ACM. http://dl.acm.org/citation.cfm?id=2046754 https://www.researchgate.net/profile/Ruby_Lee/publication/221609831_Eliminating_the_hypervisor_attack_surface_for_a_more_secure_cloud/links/0fcfd50bd9fd9aa12d000000.pdf c. Azab, A.M., Swidowski, K., Bhutkar, R., Ma, J., Shen, W., Wang, R. and Ning, P., 2016. SKEE: A lightweight Secure Kernel-level Execution Environment for ARM. In NDSS. https://pdfs.semanticscholar.org/8ec7/7d3f34d9c4f71e7c0e8b832cc7afb8479d59.pdf d. Hofmann, O.S., Kim, S., Dunn, A.M., Lee, M.Z. and Witchel, E., 2013, March. Inktag: Secure applications on an untrusted operating system. In ACM SIGARCH Computer Architecture News (Vol. 41, No. 1, pp. 265-278). ACM. http://dl.acm.org/citation.cfm?id=2451146 https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3890416/ Virtual memory a. Yang, T., Berger, E.D., Kaplan, S.F. and Moss, J.E.B., 2006, November. CRAMM: Virtual memory support for garbage-collected applications. In Proceedings of the 7th symposium on Operating systems design and implementation (pp. 103-116). USENIX Association. http://dl.acm.org/citation.cfm?id=1298466 https://www.usenix.org/event/osdi06/tech/full_papers/yang_ting/yang_ting.pdf b. Li, K. and Hudak, P., 1989. Memory coherence in shared virtual memory systems. ACM Transactions on Computer Systems (TOCS), 7(4), pp.321-359. http://dl.acm.org/citation.cfm?id=75105 http://www.cs.utexas.edu/users/dahlin/Classes/GradOS/papers/p321-li.pdf c. Amza, C., Cox, A.L., Dwarkadas, S., Keleher, P., Lu, H., Rajamony, R., Yu, W. and Zwaenepoel, W., 1996. Treadmarks: Shared memory computing on networks of workstations. Computer, 29(2), pp.18-28. http://ieeexplore.ieee.org/abstract/document/485843/ https://infoscience.epfl.ch/record/55539/files/computer96.pdf Virtual machine a. Sugerman, J., Venkitachalam, G. and Lim, B.H., 2001, June. Virtualizing I/O Devices on VMware Workstation's Hosted Virtual Machine Monitor. In USENIX Annual Technical Conference, General Track (pp. 1-14). http://static.usenix.org/legacy/publications/library/proceedings/usenix01/sugerman/sugerman.ps b. Kivity, A., Kamay, Y., Laor, D., Lublin, U. and Liguori, A., 2007, July. KVM: the Linux virtual machine monitor. In Proceedings of the Linux symposium (Vol. 1, pp. 225-230). https://ols.fedoraproject.org/OLS/Reprints-2007/OLS2007-Proceedings-V1.pdf#page=225 c. Barham, P., Dragovic, B., Fraser, K., Hand, S., Harris, T., Ho, A., Neugebauer, R., Pratt, I. and Warfield, A., 2003, October. Xen and the art of virtualization. In ACM SIGOPS operating systems review (Vol. 37, No. 5, pp. 164-177). ACM. http://dl.acm.org/citation.cfm?id=945462 http://cse.iitd.ernet.in/~sbansal/csl862-virt/readings/2003-xensosp.pdf d. Formal requirements for virtualizable third generation architectures: https://dl.acm.org/citation.cfm?id=361073 (This is the very basis of virtualization.) e. Memory resource management in VMware ESX server: https://dl.acm.org/citation.cfm?id=844146 [ CHOOSE 3 of the 5 articles ] Virtual machine and Live Migration a. Clark, C., Fraser, K., Hand, S., Hansen, J.G., Jul, E., Limpach, C., Pratt, I. and Warfield, A., 2005, May. Live migration of virtual machines. In Proceedings of the 2nd Conference on Symposium on Networked Systems Design & Implementation-Volume 2 (pp. 273-286). USENIX Association. http://dl.acm.org/citation.cfm?id=1251223 http://static.usenix.org/event/nsdi05/tech/full_papers/clark/clark_html/ b. Lagar-Cavilla, H.A., Whitney, J.A., Scannell, A.M., Patchin, P., Rumble, S.M., De Lara, E., Brudno, M. and Satyanarayanan, M., 2009, April. SnowFlock: rapid virtual machine cloning for cloud computing. In Proceedings of the 4th ACM European conference on Computer systems (pp. 1-12). ACM. http://dl.acm.org/citation.cfm?id=1519067 https://people.eecs.berkeley.edu/~kubitron/courses/cs262a/handouts/papers/LagarCavillaEurosys09.pdf c. Liu, H., Jin, H., Liao, X., Hu, L. and Yu, C., 2009, June. Live migration of virtual machine based on full system trace and replay. In Proceedings of the 18th ACM international symposium on High performance distributed computing (pp. 101-110). ACM. http://dl.acm.org/citation.cfm?id=1551630 http://users.cis.fiu.edu/~lhu/doc/livemigration.pdf Virtual machine and security a. Garfinkel, T. and Rosenblum, M., 2003, February. A Virtual Machine Introspection Based Architecture for Intrusion Detection. In Ndss (Vol. 3, No. 2003, pp. 191-206). http://www.isoc.org/isoc/conferences/ndss/03/proceedings/papers/13.pdf b. Bahram, S., Jiang, X., Wang, Z., Grace, M., Li, J., Srinivasan, D., Rhee, J. and Xu, D., 2010, October. Dksm: Subverting virtual machine introspection for fun and profit. In Reliable Distributed Systems, 2010 29th IEEE Symposium on (pp. 82-91). IEEE. http://ieeexplore.ieee.org/abstract/document/5623380/ https://www.researchgate.net/profile/Junghwan_Rhee/publication/220960689_DKSM_Subverting_Virtual_Machine_Introspection_for_Fun_and_Profit/links/54b7cf4d0cf28faced607fc8.pdf c. Chen, X., Garfinkel, T., Lewis, E.C., Subrahmanyam, P., Waldspurger, C.A., Boneh, D., Dwoskin, J. and Ports, D.R., 2008, March. Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems. In ACM SIGARCH Computer Architecture News (Vol. 36, No. 1, pp. 2-13). ACM. http://dl.acm.org/citation.cfm?id=1346284 https://css.csail.mit.edu/6.858/2010/readings/overshadow.pdf Checkpointing a. Plank, J.S., Beck, M., Kingsley, G. and Li, K., 1994. Libckpt: Transparent checkpointing under unix (pp. 213-223). Computer Science Department. http://static.usenix.org/publications/library/proceedings/neworl/full_papers/plank.a http://static.usenix.org/publications/library/proceedings/neworl/full_papers/plank.a b. Litzkow, M. and Solomon, M., 1992. Supporting checkpointing and process migration outside the UNIX kernel. http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.65.9095 c. Thain, D. and Livny, M., 2001. Multiple bypass: Interposition agents for distributed computing. Cluster Computing, 4(1), pp.39-47. https://link.springer.com/article/10.1023%2FA%3A1011412209850?LI=true https://www3.nd.edu/~dthain/papers/bypass-jcc-preprint.pdf Formal verification and program synthesis a. Feiertag, R.J. and Neumann, P.G., 1979, June. The foundations of a provably secure operating system (PSOS). In Proceedings of the National Computer Conference (Vol. 48, pp. 329-334). http://www.csl.sri.com/~neumann/psos.pdf b. Elphinstone, K., Klein, G., Derrin, P., Roscoe, T. and Heiser, G., 2007, May. Towards a Practical, Verified Kernel. In HotOS. https://www.usenix.org/legacy/events/hotos07/tech/full_papers/elphinstone/elphinstone_html/ c. Shapiro, J., Doerrie, M.S., Northup, E., Sridhar, S. and Miller, M., 2004. Towards a verified, general-purpose operating system kernel. Klein [10], pp.1-19. http://wwwbroy.informatik.tu-muenchen.de/~kleing/papers/os-verify-04.pdf#page=7 d. Ryzhyk, L., Walker, A., Keys, J., Legg, A., Raghunath, A., Stumm, M. and Vij, M., 2014, October. User-Guided Device Driver Synthesis. In OSDI (pp. 661-676). https://www.usenix.org/system/files/conference/osdi14/osdi14-paper-ryzhyk.pdf [ CHOOSE 3 of the 4 articles ] Exokernels and microkernels a. Engler, D.R. and Kaashoek, M.F., 1995. Exokernel: An operating system architecture for application-level resource management (Vol. 29, No. 5, pp. 251-266). ACM. http://dl.acm.org/citation.cfm?id=224076 https://www.cs.utexas.edu/users/dahlin/Classes/439/ref/exokernel.pdf b. Golub, D.B., Julin, D.P., Rashid, R.F., Draves, R.P., Dean, R.W., Forin, A., Barrera, J., Tokuda, H., Malan, G. and Bohman, D., 1992. Microkernel operating system architecture and Mach. In In Proceedings of the USENIX Workshop on Micro-Kernels and Other Kernel Architectures (pp. 11-30). https://courses.cs.washington.edu/courses/cse451/15wi/lectures/extra/Black92.pdf c. Klein, G., Andronick, J., Elphinstone, K., Murray, T., Sewell, T., Kolanski, R. and Heiser, G., 2014. Comprehensive formal verification of an OS microkernel. ACM Transactions on Computer Systems (TOCS), 32(1), p.2. http://dl.acm.org/citation.cfm?id=2560537 https://pdfs.semanticscholar.org/afbd/c64dca2399ffb547231ebb4e5d7c64bfc628.pdf Cloud computing, virtual machines (or containers), and side-channel attacks to thwart security a. Ristenpart, T., Tromer, E., Shacham, H. and Savage, S., 2009, November. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In Proceedings of the 16th ACM conference on Computer and communications security (pp. 199-212). ACM. http://dl.acm.org/citation.cfm?id=1653687 https://css.csail.mit.edu/6.858/2011/readings/get-off-my-cloud.pdf b. Zhang, Y., Juels, A., Reiter, M.K. and Ristenpart, T., 2012, October. Cross-VM side channels and their use to extract private keys. In Proceedings of the 2012 ACM conference on Computer and communications security (pp. 305-316). ACM. http://dl.acm.org/citation.cfm?id=2382230 https://pdfs.semanticscholar.org/25b2/4d6cc547c80e3a1ad037082694a5f6a2b8a9.pdf c. Zhang, Y., Juels, A., Oprea, A. and Reiter, M.K., 2011, May. Homealone: Co-residency detection in the cloud via side-channel analysis. In Security and Privacy (SP), 2011 IEEE Symposium on (pp. 313-328). IEEE. http://ieeexplore.ieee.org/abstract/document/5958037/ https://www.researchgate.net/profile/Michael_Reiter3/publication/224248626_HomeAlone_Co-Residency_Detection_in_the_Cloud_via_Side-Channel_Analysis/links/0fcfd50df0acf7004d000000.pdf d. Kong, J., Aciicmez, O., Seifert, J.P. and Zhou, H., 2008, October. Deconstructing new cache designs for thwarting software cache-based side channel attacks. In Proceedings of the 2nd ACM workshop on Computer security architectures (pp. 25-34). ACM. http://dl.acm.org/citation.cfm?id=1456514 e. Xu, Y., Bailey, M., Jahanian, F., Joshi, K., Hiltunen, M. and Schlichting, R., 2011, October. An exploration of L2 cache covert channels in virtualized environments. In Proceedings of the 3rd ACM workshop on Cloud computing security workshop (pp. 29-40). ACM. http://dl.acm.org/citation.cfm?id=2046670 http://nsrg.ece.illinois.edu/publications/ccsw-2011.pdf f. Percival, C., 2005. Cache missing for fun and profit. (technical report) http://css.csail.mit.edu/6.858/2014/readings/ht-cache.pdf [ CHOOSE 3 of the 6 articles ]