Zhihong Luo
EECS Department
University of California, Berkeley
Technical Report No. UCB/EECS-2025-89
May 16, 2025
http://www2.eecs.berkeley.edu/Pubs/TechRpts/2025/EECS-2025-89.pdf
This dissertation presents a series of systems that push the boundaries of what is considered feasible and widely accepted in the design of datacenter and cellular infrastructures. The first part focuses on improving datacenter efficiency through finer-grained software mechanisms. It introduces software systems that harvest memory-bound CPU stall cycles for useful work and perform object-level memory management in tiered memory systems. The second part explores how cellular network functionality can be expanded through clean-slate architectural redesigns. It introduces systems that challenge entrenched assumptions around network control and user privacy, demonstrating the feasibility of more open and privacy-preserving models.
The first system, MSH, targets the underutilization of memory-bound CPU stall cycles, which represent a significant inefficiency in datacenter workloads. Traditional hardware-based approaches like simultaneous multithreading (SMT) are limited in configurability and concurrency, especially for latency-sensitive services. MSH is a software system that transparently and efficiently harvests stall cycles using a co-design of profiling, static analysis, binary instrumentation, and runtime scheduling. It achieves high throughput with minimal latency overhead, outperforming SMT in scenarios where SMT cannot be used due to the latency requirement.
The second system, Fava, addresses the challenge of effective data placement in tiered memory systems combining fast local memory with slower disaggregated options such as CXL-attached memory. Unlike prior approaches that operate at the page or cache-line level, Fava enables object-level memory management in managed-language environments. It accurately tracks object hotness with minimal overhead and leverages a hybrid mechanism combining object colocation with page migration. As a result, Fava significantly improves local memory utilization and reduces application slowdowns compared to state-of-the-art systems.
The third system, CellBricks, introduces a novel cellular architecture that lowers the barrier to entry for new network operators. By moving key functionality such as mobility and user management out of the network and into end hosts, CellBricks enables users to dynamically access service from a variety of operators, including small-scale and untrusted ones. This design fosters greater competition and flexibility while maintaining performance comparable to traditional infrastructure.
Finally, LOCA tackles the long-standing issue of location privacy in cellular networks. Today’s architectures allow operators to track both the identity and location of users, posing serious privacy risks. LOCA decouples location information from identity while preserving support for identity-based services such as billing, lawful intercept, and emergency access. Leveraging MVNO-based deployments, LOCA redesigns key cellular protocols using cryptographic primitives to deliver strong privacy guarantees without sacrificing scalability or service quality.
Together, these four systems demonstrate how rethinking software mechanisms and architectural designs can lead to meaningful gains in efficiency, performance, openness, and privacy across modern computing infrastructure.
Advisor: Scott Shenker and Sylvia Ratnasamy
";
?>
BibTeX citation:
@phdthesis{Luo:EECS-2025-89, Author = {Luo, Zhihong}, Title = {Topics in Extreme System Design}, School = {EECS Department, University of California, Berkeley}, Year = {2025}, Month = {May}, URL = {http://www2.eecs.berkeley.edu/Pubs/TechRpts/2025/EECS-2025-89.html}, Number = {UCB/EECS-2025-89}, Abstract = {This dissertation presents a series of systems that push the boundaries of what is considered feasible and widely accepted in the design of datacenter and cellular infrastructures. The first part focuses on improving datacenter efficiency through finer-grained software mechanisms. It introduces software systems that harvest memory-bound CPU stall cycles for useful work and perform object-level memory management in tiered memory systems. The second part explores how cellular network functionality can be expanded through clean-slate architectural redesigns. It introduces systems that challenge entrenched assumptions around network control and user privacy, demonstrating the feasibility of more open and privacy-preserving models. The first system, MSH, targets the underutilization of memory-bound CPU stall cycles, which represent a significant inefficiency in datacenter workloads. Traditional hardware-based approaches like simultaneous multithreading (SMT) are limited in configurability and concurrency, especially for latency-sensitive services. MSH is a software system that transparently and efficiently harvests stall cycles using a co-design of profiling, static analysis, binary instrumentation, and runtime scheduling. It achieves high throughput with minimal latency overhead, outperforming SMT in scenarios where SMT cannot be used due to the latency requirement. The second system, Fava, addresses the challenge of effective data placement in tiered memory systems combining fast local memory with slower disaggregated options such as CXL-attached memory. Unlike prior approaches that operate at the page or cache-line level, Fava enables object-level memory management in managed-language environments. It accurately tracks object hotness with minimal overhead and leverages a hybrid mechanism combining object colocation with page migration. As a result, Fava significantly improves local memory utilization and reduces application slowdowns compared to state-of-the-art systems. The third system, CellBricks, introduces a novel cellular architecture that lowers the barrier to entry for new network operators. By moving key functionality such as mobility and user management out of the network and into end hosts, CellBricks enables users to dynamically access service from a variety of operators, including small-scale and untrusted ones. This design fosters greater competition and flexibility while maintaining performance comparable to traditional infrastructure. Finally, LOCA tackles the long-standing issue of location privacy in cellular networks. Today’s architectures allow operators to track both the identity and location of users, posing serious privacy risks. LOCA decouples location information from identity while preserving support for identity-based services such as billing, lawful intercept, and emergency access. Leveraging MVNO-based deployments, LOCA redesigns key cellular protocols using cryptographic primitives to deliver strong privacy guarantees without sacrificing scalability or service quality. Together, these four systems demonstrate how rethinking software mechanisms and architectural designs can lead to meaningful gains in efficiency, performance, openness, and privacy across modern computing infrastructure.} }
EndNote citation:
%0 Thesis %A Luo, Zhihong %T Topics in Extreme System Design %I EECS Department, University of California, Berkeley %D 2025 %8 May 16 %@ UCB/EECS-2025-89 %U http://www2.eecs.berkeley.edu/Pubs/TechRpts/2025/EECS-2025-89.html %F Luo:EECS-2025-89