{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T03:15:37Z","timestamp":1761621337327,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,9,2]],"date-time":"2017-09-02T00:00:00Z","timestamp":1504310400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1526707, 1526102, 1161541, 1318572, 1405641, 1228839"],"award-info":[{"award-number":["1526707, 1526102, 1161541, 1318572, 1405641, 1228839"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100007297","name":"Office of Naval Research","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100007297","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,9,2]]},"DOI":"10.1145\/3124680.3124732","type":"proceedings-article","created":{"date-parts":[[2017,9,5]],"date-time":"2017-09-05T12:23:44Z","timestamp":1504614224000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["dm-x"],"prefix":"10.1145","author":[{"given":"Anrin","family":"Chakraborti","sequence":"first","affiliation":[{"name":"Stony Brook University"}]},{"given":"Bhushan","family":"Jain","sequence":"additional","affiliation":[{"name":"Stony Brook University &amp; UNC, Chapel Hill"}]},{"given":"Jan","family":"Kasiak","sequence":"additional","affiliation":[{"name":"Stony Brook University"}]},{"given":"Tao","family":"Zhang","sequence":"additional","affiliation":[{"name":"Stony Brook University &amp; UNC, Chapel Hill"}]},{"given":"Donald","family":"Porter","sequence":"additional","affiliation":[{"name":"Stony Brook University &amp; UNC, Chapel Hill"}]},{"given":"Radu","family":"Sion","sequence":"additional","affiliation":[{"name":"Stony Brook University"}]}],"member":"320","published-online":{"date-parts":[[2017,9,2]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Using Raw Disk Partitions for the System Tablespace in MySQL. http:\/\/dev.mysql.com\/doc\/refman\/5.7\/en\/innodb-raw-devices.html.  Using Raw Disk Partitions for the System Tablespace in MySQL. http:\/\/dev.mysql.com\/doc\/refman\/5.7\/en\/innodb-raw-devices.html."},{"key":"e_1_3_2_1_2_1","unstructured":"2017. Amazon Virtual Private Cloud. \"\"https:\/\/aws.amazon.com\/vpc\/\"\". (2017).  2017. Amazon Virtual Private Cloud. \"\"https:\/\/aws.amazon.com\/vpc\/\"\". (2017)."},{"key":"e_1_3_2_1_3_1","unstructured":"2017. dm-verity. https:\/\/code.google.com\/p\/cryptsetup\/wiki\/DMVerity. (2017).  2017. dm-verity. https:\/\/code.google.com\/p\/cryptsetup\/wiki\/DMVerity. (2017)."},{"key":"e_1_3_2_1_4_1","unstructured":"2017. ext4 Disk Layout. https:\/\/ext4.wiki.kernel.org\/index.php\/Ext4_Disk_Layout. (2017).  2017. ext4 Disk Layout. https:\/\/ext4.wiki.kernel.org\/index.php\/Ext4_Disk_Layout. (2017)."},{"key":"e_1_3_2_1_5_1","unstructured":"2017. iperf. \"https:\/\/iperf.fr\/\". (2017).  2017. iperf. \"https:\/\/iperf.fr\/\". (2017)."},{"key":"e_1_3_2_1_6_1","volume-title":"ZFS: The Last Word in File Systems","author":"Bonwick Jeff","year":"2008","unstructured":"Jeff Bonwick and B. Moore . 2008 . ZFS: The Last Word in File Systems . http:\/\/opensolaris.org\/os\/community\/zfs\/docs\/zfslast.pdf. (2008). Jeff Bonwick and B. Moore. 2008. ZFS: The Last Word in File Systems. http:\/\/opensolaris.org\/os\/community\/zfs\/docs\/zfslast.pdf. (2008)."},{"key":"e_1_3_2_1_7_1","first-page":"17","article-title":"VICE-catch the hookers","volume":"61","author":"Butler James","year":"2004","unstructured":"James Butler and Greg Hoglund . 2004 . VICE-catch the hookers . Black Hat USA 61 (2004), 17 -- 35 . James Butler and Greg Hoglund. 2004. VICE-catch the hookers. Black Hat USA 61 (2004), 17--35.","journal-title":"Black Hat USA"},{"key":"e_1_3_2_1_8_1","unstructured":"filebench 2017. FileBench. http:\/\/sourceforge.net\/projects\/filebench\/. (2017).  filebench 2017. FileBench. http:\/\/sourceforge.net\/projects\/filebench\/. (2017)."},{"key":"e_1_3_2_1_9_1","volume-title":"Verizon Survey: Hybrid Cloud Now Mainstream","author":"Leopold George","year":"2015","unstructured":"George Leopold , Enterprise Tech . 2015 . Verizon Survey: Hybrid Cloud Now Mainstream . http:\/\/www.enterprisetech.com\/2015\/11\/09\/verizon-survey-hybrid-cloud-now-mainstream\/. (2015). George Leopold, Enterprise Tech. 2015. Verizon Survey: Hybrid Cloud Now Mainstream. http:\/\/www.enterprisetech.com\/2015\/11\/09\/verizon-survey-hybrid-cloud-now-mainstream\/. (2015)."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1506409.1506429"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1456469.1456479"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Owen S. Hofmann Alan M. Dunn Sangman Kim Indrajit Roy and Emmett Witchel. 2011. Ensuring operating system kernel integrity with OSck. 279--290.  Owen S. Hofmann Alan M. Dunn Sangman Kim Indrajit Roy and Emmett Witchel. 2011. Ensuring operating system kernel integrity with OSck. 279--290.","DOI":"10.1145\/1961296.1950398"},{"key":"e_1_3_2_1_13_1","volume-title":"NAS 2009. IEEE International Conference on. 51--56","author":"Hou Fangyong","year":"2009","unstructured":"Fangyong Hou , Dawu Gu , Nong Xiao , Fang Liu , and Hongjun He . 2009 . Performance and Consistency Improvements of Hash Tree Based Disk Storage Protection. In Networking, Architecture, and Storage, 2009 . NAS 2009. IEEE International Conference on. 51--56 . https:\/\/doi.org\/10.1109\/NAS.2009.15 10.1109\/NAS.2009.15 Fangyong Hou, Dawu Gu, Nong Xiao, Fang Liu, and Hongjun He. 2009. Performance and Consistency Improvements of Hash Tree Based Disk Storage Protection. In Networking, Architecture, and Storage, 2009. NAS 2009. IEEE International Conference on. 51--56. https:\/\/doi.org\/10.1109\/NAS.2009.15"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Michael Kaminsky George Savvides David Mazieres and M. Frans Kaashoek. 2003. Decentralized user authentication in a global file system. 60--73.  Michael Kaminsky George Savvides David Mazieres and M. Frans Kaashoek. 2003. Decentralized user authentication in a global file system. 60--73.","DOI":"10.1145\/1165389.945452"},{"key":"e_1_3_2_1_15_1","unstructured":"Dmitry Kasatkin. 2013. dm-integrity: integrity protection device-mapper target. http:\/\/lwn.net\/Articles\/533558\/. (2013).  Dmitry Kasatkin. 2013. dm-integrity: integrity protection device-mapper target. http:\/\/lwn.net\/Articles\/533558\/. (2013)."},{"key":"e_1_3_2_1_16_1","unstructured":"Jinyuan Li Maxwell Krohn David Mazi\u00e8res and Dennis Shasha. 2004. Secure untrusted data repository (SUNDR). 9--9.  Jinyuan Li Maxwell Krohn David Mazi\u00e8res and Dennis Shasha. 2004. Secure untrusted data repository (SUNDR). 9--9."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2063509.2063512"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"David Mazi\u00e8res Michael Kaminsky M. Frans Kaashoek and Emmett Witchel. 1999. Separating key management from file system security. 124--139.  David Mazi\u00e8res Michael Kaminsky M. Frans Kaashoek and Emmett Witchel. 1999. Separating key management from file system security. 124--139.","DOI":"10.1145\/319344.319160"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487726.2488368"},{"key":"e_1_3_2_1_20_1","unstructured":"Amanda McPherson. 2009. A Conversation with Chris Mason on BTRfs: the next generation file system for Linux. http:\/\/www.linuxfoundation.org\/news-media\/blogs\/browse\/2009\/06\/conversation-chris-mason-btrfs-next-generation-file-system-linux. (2009).  Amanda McPherson. 2009. A Conversation with Chris Mason on BTRfs: the next generation file system for Linux. http:\/\/www.linuxfoundation.org\/news-media\/blogs\/browse\/2009\/06\/conversation-chris-mason-btrfs-next-generation-file-system-linux. (2009)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48184-2_32"},{"volume-title":"Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium (SS'07)","author":"Oprea Alina","key":"e_1_3_2_1_22_1","unstructured":"Alina Oprea and Michael K. Reiter . 2007. Integrity Checking in Cryptographic File Systems with Constant Trusted Storage . In Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium (SS'07) . USENIX Association, Berkeley, CA, USA, Article 13, 16 pages. http:\/\/dl.acm.org\/citation.cfm?id=1362903.1362916 Alina Oprea and Michael K. Reiter. 2007. Integrity Checking in Cryptographic File Systems with Constant Trusted Storage. In Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium (SS'07). USENIX Association, Berkeley, CA, USA, Article 13, 16 pages. http:\/\/dl.acm.org\/citation.cfm?id=1362903.1362916"},{"key":"e_1_3_2_1_23_1","volume-title":"Space-Efficient Block Storage Integrity. In In Proc. of NDSS '05","author":"Oprea Alina","year":"2005","unstructured":"Alina Oprea , Michael K. Reiter , and Ke Yang . 2005 . Space-Efficient Block Storage Integrity. In In Proc. of NDSS '05 . Alina Oprea, Michael K. Reiter, and Ke Yang. 2005. Space-Efficient Block Storage Integrity. In In Proc. of NDSS '05."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14623-7_27"},{"key":"e_1_3_2_1_25_1","unstructured":"PulserG2 anfd XDA. 2015. A Look at Marshmallow Root & Verity Complications. http:\/\/www.xda-developers.com\/a-look-at-marshmallow-root-verity-complications\/. (2015).  PulserG2 anfd XDA. 2015. A Look at Marshmallow Root & Verity Complications. http:\/\/www.xda-developers.com\/a-look-at-marshmallow-root-verity-complications\/. (2015)."},{"volume-title":"Proceedings of the Annual Conference on USENIX Annual Technical Conference (ATEC '00)","author":"Seltzer Margo I.","key":"e_1_3_2_1_26_1","unstructured":"Margo I. Seltzer , Gregory R. Ganger , M. Kirk McKusick , Keith A. Smith , Craig A. N. Soules , and Christopher A. Stein . 2000. Journaling Versus Soft Updates: Asynchronous Meta-data Protection in File Systems . In Proceedings of the Annual Conference on USENIX Annual Technical Conference (ATEC '00) . USENIX Association, Berkeley, CA, USA, 6--6. http:\/\/dl.acm.org\/citation.cfm?id=1267724.1267730 Margo I. Seltzer, Gregory R. Ganger, M. Kirk McKusick, Keith A. Smith, Craig A. N. Soules, and Christopher A. Stein. 2000. Journaling Versus Soft Updates: Asynchronous Meta-data Protection in File Systems. In Proceedings of the Annual Conference on USENIX Annual Technical Conference (ATEC '00). USENIX Association, Berkeley, CA, USA, 6--6. http:\/\/dl.acm.org\/citation.cfm?id=1267724.1267730"},{"key":"e_1_3_2_1_27_1","volume-title":"Proceedings of the General Track: 2001 USENIX Annual Technical Conference, June 25--30","author":"Stein Christopher A.","year":"2001","unstructured":"Christopher A. Stein , John H. Howard , and Margo I. Seltzer . 2001. Unifying File System Protection . In Proceedings of the General Track: 2001 USENIX Annual Technical Conference, June 25--30 , 2001 , Boston, Massachusetts, USA. 79--90. http:\/\/www.usenix.org\/publications\/library\/proceedings\/usenix01\/stein.html Christopher A. Stein, John H. Howard, and Margo I. Seltzer. 2001. Unifying File System Protection. In Proceedings of the General Track: 2001 USENIX Annual Technical Conference, June 25--30, 2001, Boston, Massachusetts, USA. 79--90. http:\/\/www.usenix.org\/publications\/library\/proceedings\/usenix01\/stein.html"},{"key":"e_1_3_2_1_28_1","volume-title":"Proceedings of the 2011 USENIX Conference on USENIX Annual Technical Conference (USENIX-ATC'11)","author":"Weinhold Carsten","year":"2011","unstructured":"Carsten Weinhold and Hermann H\u00e4rtig . 2011 . jVPFS: Adding Robustness to a Secure Stacked File System with Untrusted Local Storage Components . In Proceedings of the 2011 USENIX Conference on USENIX Annual Technical Conference (USENIX-ATC'11) . USENIX Association, Berkeley, CA, USA, 32--32. http:\/\/dl.acm.org\/citation.cfm?id= 2002181.2002213 Carsten Weinhold and Hermann H\u00e4rtig. 2011. jVPFS: Adding Robustness to a Secure Stacked File System with Untrusted Local Storage Components. In Proceedings of the 2011 USENIX Conference on USENIX Annual Technical Conference (USENIX-ATC'11). USENIX Association, Berkeley, CA, USA, 32--32. http:\/\/dl.acm.org\/citation.cfm?id=2002181.2002213"},{"key":"e_1_3_2_1_29_1","volume-title":"Proceedings of the 8th USENIX Conference on File and Storage Technologies (FAST'10)","author":"Zhang Yupu","year":"1855","unstructured":"Yupu Zhang , Abhishek Rajimwale , Andrea C. Arpaci-Dusseau , and Remzi H . Arpaci-Dusseau. 2010. End-to-end Data Integrity for File Systems: A ZFS Case Study . In Proceedings of the 8th USENIX Conference on File and Storage Technologies (FAST'10) . USENIX Association, Berkeley, CA, USA, 3--3. http:\/\/dl.acm.org\/citation.cfm?id= 1855 511.1855514 Yupu Zhang, Abhishek Rajimwale, Andrea C. Arpaci-Dusseau, and Remzi H. Arpaci-Dusseau. 2010. End-to-end Data Integrity for File Systems: A ZFS Case Study. In Proceedings of the 8th USENIX Conference on File and Storage Technologies (FAST'10). USENIX Association, Berkeley, CA, USA, 3--3. http:\/\/dl.acm.org\/citation.cfm?id=1855511.1855514"}],"event":{"name":"APSys '17: 8th Asia-Pacific Workshop on Systems","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems"],"location":"Mumbai India","acronym":"APSys '17"},"container-title":["Proceedings of the 8th Asia-Pacific Workshop on Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3124680.3124732","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3124680.3124732","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3124680.3124732","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:11:23Z","timestamp":1750212683000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3124680.3124732"}},"subtitle":["Protecting Volume-level Integrity for Cloud Volumes and Local Block Devices"],"short-title":[],"issued":{"date-parts":[[2017,9,2]]},"references-count":29,"alternative-id":["10.1145\/3124680.3124732","10.1145\/3124680"],"URL":"https:\/\/doi.org\/10.1145\/3124680.3124732","relation":{},"subject":[],"published":{"date-parts":[[2017,9,2]]},"assertion":[{"value":"2017-09-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}