{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,7]],"date-time":"2025-05-07T04:17:59Z","timestamp":1746591479036,"version":"3.40.5"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T00:00:00Z","timestamp":1740787200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T00:00:00Z","timestamp":1740787200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J. Comput. Sci. Technol."],"published-print":{"date-parts":[[2025,3]]},"DOI":"10.1007\/s11390-025-3762-3","type":"journal-article","created":{"date-parts":[[2025,5,6]],"date-time":"2025-05-06T14:59:22Z","timestamp":1746543562000},"page":"464-481","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Harmonizing Security and Performance in Microkernel File Servers"],"prefix":"10.1007","volume":"40","author":[{"given":"Wen-Tai","family":"Li","sequence":"first","affiliation":[]},{"given":"Zi-Xuan","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jin-Yu","family":"Gu","sequence":"additional","affiliation":[]},{"given":"Yu-Bin","family":"Xia","sequence":"additional","affiliation":[]},{"given":"Bin-Yu","family":"Zang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,6]]},"reference":[{"key":"3762_CR1","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1145\/1629575.1629596","volume-title":"Proc. the 22nd ACM SIGOPS Symposium on Operating Systems Principles","author":"G Klein","year":"2009","unstructured":"Klein G, Elphinstone K, Heiser G, Andronick J, Cock D, Derrin P, Elkaduwe D, Engelhardt K, Kolanski R, Norrish M, Sewell T, Tuch H, Winwood S. seL4: Formal verification of an OS kernel. In Proc. the 22nd ACM SIGOPS Symposium on Operating Systems Principles, Oct. 2009, pp.207\u2013220. DOI: https:\/\/doi.org\/10.1145\/1629575.1629596."},{"key":"3762_CR2","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1145\/319151.319163","volume-title":"Proc. the 17th ACM Symposium on Operating Systems Principles","author":"J S Shapiro","year":"1999","unstructured":"Shapiro J S, Smith J M, Farber D J. EROS: A fast capability system. In Proc. the 17th ACM Symposium on Operating Systems Principles, Dec. 1999, pp.170\u2013185. DOI: https:\/\/doi.org\/10.1145\/319151.319163."},{"key":"3762_CR3","first-page":"401","volume-title":"Proc. the 2020 USENIX Conference on USENIX Annual Technical Conference","author":"J Gu","year":"2020","unstructured":"Gu J, Wu X, Li W, Liu N, Mi Z, Xia Y, Chen H. Harmonizing performance and isolation in microkernels with efficient intra-kernel isolation and communication. In Proc. the 2020 USENIX Conference on USENIX Annual Technical Conference, Jul. 2020, pp.401\u2013417."},{"key":"3762_CR4","first-page":"59","volume-title":"Proc. the 8th USENIX Conference on Operating Systems Design and Implementation","author":"F M David","year":"2008","unstructured":"David F M, Chan E M, Carlyle J C, Campbell R H. CuriOS: Improving reliability through operating system structure. In Proc. the 8th USENIX Conference on Operating Systems Design and Implementation, Dec. 2008, pp.59\u201372."},{"key":"3762_CR5","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1145\/3341301.3359662","volume-title":"Proc. the 27th ACM Symposium on Operating Systems Principles","author":"S Kim","year":"2019","unstructured":"Kim S, Xu M, Kashyap S, Yoon J, Xu W, Kim T. Finding semantic bugs in file systems with an extensible fuzzing framework. In Proc. the 27th ACM Symposium on Operating Systems Principles, Oct. 2019, pp.147\u2013161. DOI: https:\/\/doi.org\/10.1145\/3341301.3359662."},{"issue":"4","key":"3762_CR6","doi-asserted-by":"publisher","first-page":"1356","DOI":"10.1109\/TR.2019.2916204","volume":"68","author":"G Xiao","year":"2019","unstructured":"Xiao G, Zheng Z, Yin B, Trivedi K S, Du X, Cai K Y. An empirical study of fault triggers in the Linux operating system: An evolutionary perspective. IEEE Trans. Reliability, 2019, 68(4): 1356\u20131383. DOI: https:\/\/doi.org\/10.1109\/TR.2019.2916204.","journal-title":"IEEE Trans. Reliability"},{"key":"3762_CR7","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1145\/1217935.1217951","volume-title":"Proc. the 1st ACM SIGOPS\/EuroSys European Conference on Computer Systems 2006","author":"L Singaravelu","year":"2006","unstructured":"Singaravelu L, Pu C, H\u00e4rtig H, Helmuth C. Reducing TCB complexity for security-sensitive applications: Three case studies. In Proc. the 1st ACM SIGOPS\/EuroSys European Conference on Computer Systems 2006, Apr. 2006, pp.161\u2013174. DOI: https:\/\/doi.org\/10.1145\/1217935.1217951."},{"key":"3762_CR8","volume-title":"Proc. the 2011 USENIX Conference on USENIX Annual Technical Conference","author":"C Weinhold","year":"2011","unstructured":"Weinhold C, H\u00e4rtig H. jVPFS: Adding robustness to a secure stacked file system with untrusted local storage components. In Proc. the 2011 USENIX Conference on USENIX Annual Technical Conference, Jun. 2011, Article No.32."},{"key":"3762_CR9","first-page":"323","volume-title":"Proc. the 13th USENIX Conference on Operating Systems Design and Implementation","author":"A Ileri","year":"2018","unstructured":"Ileri A, Chajed T, Chlipala A, Kaashoek M F, Zeldovich N. Proving confidentiality in a file system using DiskSec. In Proc. the 13th USENIX Conference on Operating Systems Design and Implementation, Oct. 2018, pp.323\u2013338."},{"key":"3762_CR10","first-page":"409","volume-title":"Proc. the 2014 USENIX Conference on USENIX Annual Technical Conference","author":"Y Li","year":"2014","unstructured":"Li Y, McCune J, Newsome J, Perrig A, Baker B, Drewry W. MiniBox: A two-way sandbox for x86 native code. In Proc. the 2014 USENIX Conference on USENIX Annual Technical Conference, Jun. 2014, pp.409\u2013420."},{"key":"3762_CR11","doi-asserted-by":"publisher","unstructured":"Baumann A, Peinado M, Hunt G. Shielding applications from an untrusted cloud with haven. ACM Transactions on Computer Systems (TOCS), 2015, 33(3): Article No. 8. DOI: https:\/\/doi.org\/10.1145\/2799647.","DOI":"10.1145\/2799647"},{"issue":"2","key":"3762_CR12","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1145\/1353535.1346284","volume":"42","author":"X Chen","year":"2008","unstructured":"Chen X, Garfinkel T, Lewis E C, Subrahmanyam P, Waldspurger C A, Boneh D, Dwoskin J, Ports D R K. Overshadow: A virtualization-based approach to retrofitting protection in commodity operating systems. ACM SIGOPS Operating Systems Review, 2008, 42(2): 2\u201313. DOI: https:\/\/doi.org\/10.1145\/1353535.1346284.","journal-title":"ACM SIGOPS Operating Systems Review"},{"key":"3762_CR13","first-page":"645","volume-title":"Proc. the 2017 USENIX Conference on Usenix Annual Technical Conference","author":"C C Tsai","year":"2017","unstructured":"Tsai C C, Porter D E, Vij M. Graphene-SGX: A practical library OS for unmodified applications on SGX. In Proc. the 2017 USENIX Conference on Usenix Annual Technical Conference, Jul. 2017, pp.645\u2013658."},{"key":"3762_CR14","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1145\/2451116.2451146","volume-title":"Proc. the 18th International Conference on Architectural Support for Programming Languages and Operating Systems","author":"O S Hofmann","year":"2013","unstructured":"Hofmann O S, Kim S, Dunn A M, Lee M Z, Witchel E. InkTag: Secure applications on an untrusted operating system. In Proc. the 18th International Conference on Architectural Support for Programming Languages and Operating Systems, Mar. 2013, pp.265\u2013278. DOI: https:\/\/doi.org\/10.1145\/2451116.2451146."},{"key":"3762_CR15","doi-asserted-by":"publisher","first-page":"494","DOI":"10.1109\/ICDCS51616.2021.00054","volume-title":"Proc. the 41st IEEE International Conference on Distributed Computing Systems","author":"W Li","year":"2021","unstructured":"Li W, Gu J, Liu N, Zang B. Efficiently recovering state-ful system components of multi-server microkernels. In Proc. the 41st IEEE International Conference on Distributed Computing Systems, Jul. 2021, pp.494\u2013505. DOI: https:\/\/doi.org\/10.1109\/ICDCS51616.2021.00054."},{"key":"3762_CR16","first-page":"69","volume-title":"Proc. the Ottawa Linux Symposium","author":"M Cao","year":"2005","unstructured":"Cao M, Tso T Y, Pulavarty B, Bhattacharya S, Dilger A, Tomas A. State of the art: Where we are with the Ext3 filesystem. In Proc. the Ottawa Linux Symposium, Jul. 2005, pp.69\u201396."},{"key":"3762_CR17","first-page":"375","volume-title":"Proc. the 2015 USENIX Conference on Usenix Annual Technical Conference","author":"X Zhu","year":"2015","unstructured":"Zhu X, Han W, Chen W. GridGraph: Large-scale graph processing on a single machine using 2-level hierarchical partitioning. In Proc. the 2015 USENIX Conference on Usenix Annual Technical Conference, Jul. 2015, pp.375\u2013386."},{"key":"3762_CR18","doi-asserted-by":"publisher","first-page":"591","DOI":"10.1145\/1772690.1772751","volume-title":"Proc. the 19th International Conference on World Wide Web","author":"H Kwak","year":"2010","unstructured":"Kwak H, Lee C, Park H, Moon S. What is twitter, a social network or a news media? In Proc. the 19th International Conference on World Wide Web, Apr. 2010, pp.591\u2013600. DOI: https:\/\/doi.org\/10.1145\/1772690.1772751."},{"key":"3762_CR19","first-page":"683","volume-title":"Proc. the 16th USENIX Symposium on Operating Systems Design and Implementation","author":"A Van\u2019t Hof","year":"2022","unstructured":"Van\u2019t Hof A, Nieh J. BlackBox: A container security monitor for protecting containers on untrusted operating systems. In Proc. the 16th USENIX Symposium on Operating Systems Design and Implementation, Jul. 2022, pp.683\u2013700."},{"key":"3762_CR20","first-page":"523","volume-title":"Proc. the 29th USENIX Conference on Security Symposium","author":"S Shinde","year":"2020","unstructured":"Shinde S, Wang S, Yuan P, Hobor A, Roychoudhury A, Saxena P. BesFS: A POSIX filesystem for enclaves with a mechanized safety proof. In Proc. the 29th USENIX Conference on Security Symposium, Aug. 2020, pp.523\u2013540."},{"key":"3762_CR21","doi-asserted-by":"publisher","unstructured":"Hunt T, Zhu Z, Xu Y, Peter S, Witchel E. Ryoan: A distributed sandbox for untrusted computation on secret data. ACM Transactions on Computer Systems (TOCS), 2018, 35(4): Article No. 13. DOI: https:\/\/doi.org\/10.1145\/3231594.","DOI":"10.1145\/3231594"},{"key":"3762_CR22","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1109\/DSN.2019.00049","volume-title":"Proc. the 49th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks","author":"J B Djoko","year":"2019","unstructured":"Djoko J B, Lange J, Lee A J. NeXUS: Practical and secure access control on untrusted storage platforms using client-side SGX. In Proc. the 49th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks, Jun. 2019, pp.401\u2013413. DOI: https:\/\/doi.org\/10.1109\/DSN.2019.00049."},{"key":"3762_CR23","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1145\/3471621.3471840","volume-title":"Proc. the 24th International Symposium on Research in Attacks, Intrusions and Defenses","author":"S Kumar","year":"2021","unstructured":"Kumar S, Sarangi S R. SecureFS: A secure file system for intel SGX. In Proc. the 24th International Symposium on Research in Attacks, Intrusions and Defenses, Oct. 2021, pp.91\u2013102. DOI: https:\/\/doi.org\/10.1145\/3471621.3471840."},{"issue":"2","key":"3762_CR24","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1145\/2980024.2872372","volume":"44","author":"Y Kwon","year":"2016","unstructured":"Kwon Y, Dunn A M, Lee M Z, Hofmann O S, Xu Y, Witchel E. Sego: Pervasive trusted metadata for efficiently verified untrusted system services. ACM SIGARCH Computer Architecture News, 2016, 44(2): 277\u2013290. DOI: https:\/\/doi.org\/10.1145\/2980024.2872372.","journal-title":"ACM SIGARCH Computer Architecture News"},{"key":"3762_CR25","first-page":"81","volume-title":"Proc. the 11th USENIX Conference on Operating Systems Design and Implementation","author":"L Lu","year":"2014","unstructured":"Lu L, Zhang Y, Do T, Al-Kiswany S, Arpaci-Dusseau A C, Arpaci-Dusseau R H. Physical disentanglement in a container-based file system. In Proc. the 11th USENIX Conference on Operating Systems Design and Implementation, Oct. 2014, pp.81\u201396."},{"key":"3762_CR26","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/2815400.2815402","volume-title":"Proc. the 25th Symposium on Operating Systems Principles","author":"H Chen","year":"2015","unstructured":"Chen H, Ziegler D, Chajed T, Chlipala A, Kaashoek M F, Zeldovich N. Using Crash Hoare Logic for certifying the FSCQ file system. In Proc. the 25th Symposium on Operating Systems Principles, Oct. 2015, pp.18\u201337. DOI: https:\/\/doi.org\/10.1145\/2815400.2815402."},{"key":"3762_CR27","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1145\/3341301.3359644","volume-title":"Proc. the 27th ACM Symposium on Operating Systems Principles","author":"M Zou","year":"2019","unstructured":"Zou M, Ding H, Du D, Fu M, Gu R, Chen H. Using concurrent relational logic with helpers for verifying the AtomFS file system. In Proc. the 27th ACM Symposium on Operating Systems Principles, Oct. 2019, pp.259\u2013274. DOI: https:\/\/doi.org\/10.1145\/3341301.3359644."},{"key":"3762_CR28","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1145\/2815400.2815422","volume-title":"Proc. the 25th Symposium on Operating Systems Principles","author":"C Min","year":"2015","unstructured":"Min C, Kashyap S, Lee B, Song C, Kim T. Cross-checking semantic correctness: The case of finding file system bugs. In Proc. the 25th Symposium on Operating Systems Principles, Oct. 2015, pp.361\u2013377. DOI: https:\/\/doi.org\/10.1145\/2815400.2815422."},{"key":"3762_CR29","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1145\/3600006.3613171","volume-title":"Proc. the 29th Symposium on Operating Systems Principles","author":"D Zhou","year":"2023","unstructured":"Zhou D, Aschenbrenner V, Lyu T, Zhang J, Kannan S, Kashyap S. Enabling high-performance and secure userspace NVM file systems with the Trio architecture. In Proc. the 29th Symposium on Operating Systems Principles, Oct. 2023, pp.150\u2013165. DOI: https:\/\/doi.org\/10.1145\/3600006.3613171."},{"key":"3762_CR30","doi-asserted-by":"publisher","first-page":"478","DOI":"10.1145\/3341301.3359637","volume-title":"Proc. the 27th ACM Symposium on Operating Systems Principles","author":"M Dong","year":"2019","unstructured":"Dong M, Bu H, Yi J, Dong B, Chen H. Performance and protection in the ZoFS user-space NVM file system. In Proc. the 27th ACM Symposium on Operating Systems Principles, Oct. 2019, pp.478\u2013493. DOI: https:\/\/doi.org\/10.1145\/3341301.3359637."},{"key":"3762_CR31","first-page":"265","volume-title":"Proc. the 21st USENIX Conference on File and Storage Technologies","author":"S Zhong","year":"2023","unstructured":"Zhong S, Ye C, Hu G, Qu S, Arpaci-Dusseau A, Arpaci-Dusseau R, Swift M. MadFS: Per-file virtualization for userspace persistent memory filesystems. In Proc. the 21st USENIX Conference on File and Storage Technologies, Feb. 2023, pp.265\u2013280."},{"key":"3762_CR32","doi-asserted-by":"publisher","unstructured":"Zhu B, Chen Y, Wang Q, Lu Y, Shu J. Octopus+: An RDMA-enabled distributed persistent memory file system. ACM Transactions on Storage (TOS), 2021, 17(3): Article No. 19. DOI: https:\/\/doi.org\/10.1145\/3448418.","DOI":"10.1145\/3448418"},{"key":"3762_CR33","doi-asserted-by":"publisher","unstructured":"Lembke J, Roman P L, Eugster P. DEFUSE: An interface for fast and correct user space file system access. ACM Transactions on Storage (TOS), 2022, 18(3): Article No. 22. DOI: https:\/\/doi.org\/10.1145\/3494556.","DOI":"10.1145\/3494556"}],"container-title":["Journal of Computer Science and Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11390-025-3762-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11390-025-3762-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11390-025-3762-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,6]],"date-time":"2025-05-06T14:59:26Z","timestamp":1746543566000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11390-025-3762-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3]]},"references-count":33,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2025,3]]}},"alternative-id":["3762"],"URL":"https:\/\/doi.org\/10.1007\/s11390-025-3762-3","relation":{},"ISSN":["1000-9000","1860-4749"],"issn-type":[{"value":"1000-9000","type":"print"},{"value":"1860-4749","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,3]]},"assertion":[{"value":"11 September 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 January 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 May 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Conflict of Interest The authors declare that they have no conflict of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics"}}]}}