Challenges and opportunities: an in-depth empirical study on configuration error injection testing

W Li, Z Jia, S Li, Y Zhang, T Wang, E Xu… - Proceedings of the 30th …, 2021 - dl.acm.org
Configuration error injection testing (CEIT) could systematically evaluate software reliability
and diagnosability to runtime configuration errors. This paper explores the challenges and …

Understanding and discovering software configuration dependencies in cloud and datacenter systems

Q Chen, T Wang, O Legunsen, S Li, T Xu - … of the 28th ACM Joint Meeting …, 2020 - dl.acm.org
A large percentage of real-world software configuration issues, such as misconfigurations,
involve multiple interdependent configuration parameters. However, existing techniques and …

An evolutionary study of configuration design and implementation in cloud systems

Y Zhang, H He, O Legunsen, S Li… - 2021 IEEE/ACM 43rd …, 2021 - ieeexplore.ieee.org
Many techniques were proposed for detecting software misconfigurations in cloud systems
and for diagnosing unintended behavior caused by such misconfigurations. Detection and …

Balancing storage efficiency and data confidentiality with tunable encrypted deduplication

J Li, Z Yang, Y Ren, PPC Lee, X Zhang - Proceedings of the Fifteenth …, 2020 - dl.acm.org
Conventional encrypted deduplication approaches retain the deduplication capability on
duplicate chunks after encryption by always deriving the key for encryption/decryption from …

The dilemma between deduplication and locality: Can both be achieved?

X Zou, J Yuan, P Shilane, W Xia, H Zhang… - … USENIX conference on …, 2021 - usenix.org
Data deduplication is widely used to reduce the size of backup workloads, but it has the
known disadvantage of causing poor data locality, also referred to as the fragmentation …

Building a high-performance fine-grained deduplication framework for backup storage with high deduplication ratio

X Zou, W Xia, P Shilane, H Zhang, X Wang - 2022 USENIX Annual …, 2022 - usenix.org
Fine-grained deduplication, which first removes identical chunks and then eliminates
redundancies between similar but non-identical chunks (ie, delta compression), could …

From hyper-dimensional structures to linear structures: Maintaining deduplicated data's locality

X Zou, J Yuan, P Shilane, W Xia, H Zhang… - ACM Transactions on …, 2022 - dl.acm.org
Data deduplication is widely used to reduce the size of backup workloads, but it has the
known disadvantage of causing poor data locality, also referred to as the fragmentation …

Enlightening the {I/O} Path: A Holistic Approach for Application Performance

S Kim, H Kim, J Lee, J Jeong - 15th USENIX Conference on File and …, 2017 - usenix.org
In data-intensive applications, such as databases and keyvalue stores, reducing the request
handling latency is important for providing better data services. In such applications, I/O …

Diagconfig: Configuration diagnosis of performance violations in configurable software systems

Z Chen, P Chen, P Wang, G Yu, Z He… - Proceedings of the 31st …, 2023 - dl.acm.org
Performance degradation due to misconfiguration in software systems that violates SLOs
(service-level objectives) is commonplace. Diagnosing and explaining the root causes of …

ECFuzz: Effective Configuration Fuzzing for Large-Scale Systems

J Li, S Li, K Li, F Luo, H Yu, S Li, X Li - Proceedings of the 46th IEEE …, 2024 - dl.acm.org
A large-scale system contains a huge configuration space because of its large number of
configuration parameters. This leads to a combination explosion among configuration …