首页 > 最新文献

2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)最新文献

英文 中文
Measuring the Role of Greylisting and Nolisting in Fighting Spam 衡量灰名单和非名单在打击垃圾邮件中的作用
Fabio Pagani, Matteo De Astis, Mariano Graziano, A. Lanzi, D. Balzarotti
Spam has been largely studied in the past years from different perspectives but, unfortunately, it is still an open problem and a lucrative and active business for criminals and bot herders. While several countermeasures have been proposed and deployed in the past decade, their impact and effectiveness is not always clear. In particular, on top of the most common content-and sender-based anti-spam techniques, two minor approaches are popular among system administrators to cope with this annoying problem: greylisting and nolisting. These techniques exploit known features of the Simple Mail Transfer Protocol (SMTP) protocol that are not often respected by spambots. This assumption makes these two countermeasures really simple to adopt and, at least in theory, quite effective. In this paper we present the first comprehensive study of nolisting and greylisting, in which we analyze these spam countermeasures from different perspectives. First, we measure their world-wide deployment and provide insights from their distribution. Second, we measure their effectiveness against areal dataset of malware samples responsible to generate over 70% of the global spam traffic. Finally, we measure the impact of these two defensive mechanisms on the delivery of normal emails. Our study provides a unique and valuable perspective on two of the most innovative and atypical anti-spam systems. Our findings may guide system administrators and security experts to better assess their anti-spam infrastructure and shed some light on myths about greylisting and nolisting.
在过去的几年里,人们从不同的角度对垃圾邮件进行了大量的研究,但不幸的是,它仍然是一个悬而未决的问题,对犯罪分子和机器人牧人来说,它仍然是一个有利可图的活跃行业。虽然在过去十年中提出并实施了若干对策,但其影响和效力并不总是很明确。特别是,除了最常见的基于内容和发件人的反垃圾邮件技术之外,系统管理员还常用两种方法来处理这个恼人的问题:灰名单和非名单。这些技术利用了简单邮件传输协议(Simple Mail Transfer Protocol, SMTP)的已知特性,而这些特性通常不受垃圾邮件机器人的重视。这一假设使得这两种对策非常容易采用,而且至少在理论上相当有效。本文首次对非黑名单和灰名单进行了全面的研究,从不同的角度分析了这些垃圾邮件的对策。首先,我们衡量它们在全球的部署情况,并从它们的分布情况中提供见解。其次,我们根据恶意软件样本的真实数据集衡量它们的有效性,这些样本负责产生超过70%的全球垃圾邮件流量。最后,我们测量了这两种防御机制对正常电子邮件传递的影响。我们的研究为两个最具创新性和非典型的反垃圾邮件系统提供了独特而有价值的视角。我们的发现可以指导系统管理员和安全专家更好地评估他们的反垃圾邮件基础设施,并揭示一些关于灰名单和非名单的神话。
{"title":"Measuring the Role of Greylisting and Nolisting in Fighting Spam","authors":"Fabio Pagani, Matteo De Astis, Mariano Graziano, A. Lanzi, D. Balzarotti","doi":"10.1109/DSN.2016.57","DOIUrl":"https://doi.org/10.1109/DSN.2016.57","url":null,"abstract":"Spam has been largely studied in the past years from different perspectives but, unfortunately, it is still an open problem and a lucrative and active business for criminals and bot herders. While several countermeasures have been proposed and deployed in the past decade, their impact and effectiveness is not always clear. In particular, on top of the most common content-and sender-based anti-spam techniques, two minor approaches are popular among system administrators to cope with this annoying problem: greylisting and nolisting. These techniques exploit known features of the Simple Mail Transfer Protocol (SMTP) protocol that are not often respected by spambots. This assumption makes these two countermeasures really simple to adopt and, at least in theory, quite effective. In this paper we present the first comprehensive study of nolisting and greylisting, in which we analyze these spam countermeasures from different perspectives. First, we measure their world-wide deployment and provide insights from their distribution. Second, we measure their effectiveness against areal dataset of malware samples responsible to generate over 70% of the global spam traffic. Finally, we measure the impact of these two defensive mechanisms on the delivery of normal emails. Our study provides a unique and valuable perspective on two of the most innovative and atypical anti-spam systems. Our findings may guide system administrators and security experts to better assess their anti-spam infrastructure and shed some light on myths about greylisting and nolisting.","PeriodicalId":102292,"journal":{"name":"2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124465975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
ePVF: An Enhanced Program Vulnerability Factor Methodology for Cross-Layer Resilience Analysis ePVF:一种用于跨层弹性分析的改进程序脆弱性因子方法学
Bo Fang, Qining Lu, K. Pattabiraman, M. Ripeanu, S. Gurumurthi
The Program Vulnerability Factor (PVF) has been proposed as a metric to understand the impact of hardware faults on software. The PVF is calculated by identifying the program bits required for architecturally correct execution (ACE bits). PVF, however, is conservative as it assumes that all erroneous executions are a major concern, not just those that result in silent data corruptions, and it also does not account for errorsthat are detected at runtime, i.e., lead to program crashes. A more discriminating metric can inform the choice of the appropriate resilience techniques with acceptable performance and energy overheads. This paper proposes ePVF, an enhancement of the original PVF methodology, which filters out the crash-causing bits from the ACE bits identified by the traditional PVF analysis. The ePVF methodology consists of an error propagation model that reasons about error propagation in the program, and a crash model that encapsulates the platform-specific characteristics for handling hardware exceptions. ePVF reduces the vulnerable bits estimated by the original PVF analysis by between 45% and 67% depending on the benchmark, and has high accuracy (89% recall, 92% precision) in identifying the crash-causing bits. We demonstrate the utility of ePVF by using it to inform selective protection of the most SDC-prone instructions in a program.
程序漏洞因子(PVF)被提出作为理解硬件故障对软件影响的度量。PVF是通过确定体系结构正确执行所需的程序位(ACE位)来计算的。然而,PVF是保守的,因为它假设所有错误执行都是主要问题,而不仅仅是那些导致静默数据损坏的错误,并且它也不考虑在运行时检测到的错误,即导致程序崩溃。一个更具辨别性的度量可以告知选择适当的弹性技术,并具有可接受的性能和能源开销。本文提出了ePVF,这是对原有PVF方法的改进,它从传统PVF分析识别的ACE比特中过滤掉导致崩溃的比特。ePVF方法由错误传播模型和崩溃模型组成,前者解释程序中的错误传播,后者封装了用于处理硬件异常的特定于平台的特征。根据基准,ePVF将原始PVF分析估计的脆弱比特减少了45%至67%,并且在识别导致崩溃的比特方面具有很高的准确性(召回率89%,精度92%)。我们通过使用ePVF来通知程序中最容易发生sdc的指令的选择性保护来演示ePVF的实用性。
{"title":"ePVF: An Enhanced Program Vulnerability Factor Methodology for Cross-Layer Resilience Analysis","authors":"Bo Fang, Qining Lu, K. Pattabiraman, M. Ripeanu, S. Gurumurthi","doi":"10.1109/DSN.2016.24","DOIUrl":"https://doi.org/10.1109/DSN.2016.24","url":null,"abstract":"The Program Vulnerability Factor (PVF) has been proposed as a metric to understand the impact of hardware faults on software. The PVF is calculated by identifying the program bits required for architecturally correct execution (ACE bits). PVF, however, is conservative as it assumes that all erroneous executions are a major concern, not just those that result in silent data corruptions, and it also does not account for errorsthat are detected at runtime, i.e., lead to program crashes. A more discriminating metric can inform the choice of the appropriate resilience techniques with acceptable performance and energy overheads. This paper proposes ePVF, an enhancement of the original PVF methodology, which filters out the crash-causing bits from the ACE bits identified by the traditional PVF analysis. The ePVF methodology consists of an error propagation model that reasons about error propagation in the program, and a crash model that encapsulates the platform-specific characteristics for handling hardware exceptions. ePVF reduces the vulnerable bits estimated by the original PVF analysis by between 45% and 67% depending on the benchmark, and has high accuracy (89% recall, 92% precision) in identifying the crash-causing bits. We demonstrate the utility of ePVF by using it to inform selective protection of the most SDC-prone instructions in a program.","PeriodicalId":102292,"journal":{"name":"2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131183120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
Secure Point-of-Care Medical Diagnostics via Trusted Sensing and Cyto-Coded Passwords 通过可信感测和细胞编码密码确保医疗诊断的安全性
Tuan Le, Gabriel Salles-Loustau, L. Najafizadeh, M. Javanmard, S. Zonouz
Trustworthy and usable healthcare requires not only effective disease diagnostic procedures to ensure delivery of rapid and accurate outcomes, but also lightweight user privacy-preserving capabilities for resource-limited medical sensing devices. In this paper, we present MedSen, a portable, inexpensive and secure smartphone-based biomarker1 detection sensor to provide users with easy-to-use real-time disease diagnostic capabilities without the need for in-person clinical visits. To minimize the deployment cost and size without sacrificing the diagnostic accuracy, security and time requirement, MedSen operates as a dongle to the user's smartphone and leverages the smartphone's computational capabilities for its real-time data processing. From the security viewpoint, MedSen introduces a new hardware-level trusted sensing framework, built in the sensor, to encrypt measured analog signals related to cell counting in the patient's blood sample, at the data acquisition point. To protect the user privacy, MedSen's in-sensor encryption scheme conceals the user's private information before sending them out for cloud-based medical diagnostics analysis. The analysis outcomes are sent back to Med-Sen for decryption and user notifications. Additionally, MedSen introduces cyto-coded passwords to authenticate the user to the cloud server without the need for explicit screen password entry. Each user's password constitutes a predetermined number of synthetic beads with different dielectric characteristics. MedSen mixes the password beads with the user's blood before submitting the data for diagnostics analysis. The cloud server authenticates the user based on the statistics and characteristics of the beads with the blood sample, and links the user's identity to the encrypted analysis outcomes. We have implemented a real-world working prototype of MedSen through bio-sensor fabrication and smartphone app (Android) implementations. Our results show that MedSen can reliably classify different users based on their cyto-coded passwords with high accuracy. MedSen's built-in analog signal encryption guarantees the user's privacy by considering the smartphone and cloud server possibly untrusted (curious but honest). MedSen's end-to-end time requirement for disease diagnostics is approximately 0.2 seconds on average.
值得信赖和可用的医疗保健不仅需要有效的疾病诊断程序来确保提供快速和准确的结果,还需要轻量级的用户隐私保护功能,用于资源有限的医疗传感设备。在本文中,我们介绍了MedSen,一种便携式,廉价和安全的基于智能手机的生物ker1检测传感器,为用户提供易于使用的实时疾病诊断功能,而无需亲自临床就诊。为了在不牺牲诊断准确性、安全性和时间要求的情况下最大限度地降低部署成本和尺寸,MedSen可以作为用户智能手机的加密狗,并利用智能手机的计算能力进行实时数据处理。从安全的角度来看,MedSen引入了一个新的硬件级可信传感框架,内置在传感器中,在数据采集点加密与患者血液样本中细胞计数相关的测量模拟信号。为了保护用户隐私,MedSen的传感器内加密方案在将用户的私人信息发送出去进行基于云的医疗诊断分析之前,将其隐藏起来。分析结果被发送回Med-Sen进行解密和用户通知。此外,MedSen引入细胞编码密码,无需显式的屏幕密码输入,即可向云服务器验证用户身份。每个用户的密码由具有不同介电特性的预定数量的合成磁珠组成。MedSen将密码珠与用户的血液混合,然后提交数据进行诊断分析。云服务器根据带有血液样本的珠子的统计数据和特征对用户进行身份验证,并将用户的身份与加密的分析结果联系起来。我们已经通过生物传感器制造和智能手机应用程序(Android)实现了MedSen的真实工作原型。我们的研究结果表明,MedSen可以根据细胞编码密码对不同的用户进行可靠的分类,准确率很高。MedSen内置的模拟信号加密系统考虑到智能手机和云服务器可能不可信,从而保证了用户的隐私(奇怪但诚实)。MedSen对疾病诊断的端到端时间要求平均约为0.2秒。
{"title":"Secure Point-of-Care Medical Diagnostics via Trusted Sensing and Cyto-Coded Passwords","authors":"Tuan Le, Gabriel Salles-Loustau, L. Najafizadeh, M. Javanmard, S. Zonouz","doi":"10.1109/DSN.2016.59","DOIUrl":"https://doi.org/10.1109/DSN.2016.59","url":null,"abstract":"Trustworthy and usable healthcare requires not only effective disease diagnostic procedures to ensure delivery of rapid and accurate outcomes, but also lightweight user privacy-preserving capabilities for resource-limited medical sensing devices. In this paper, we present MedSen, a portable, inexpensive and secure smartphone-based biomarker1 detection sensor to provide users with easy-to-use real-time disease diagnostic capabilities without the need for in-person clinical visits. To minimize the deployment cost and size without sacrificing the diagnostic accuracy, security and time requirement, MedSen operates as a dongle to the user's smartphone and leverages the smartphone's computational capabilities for its real-time data processing. From the security viewpoint, MedSen introduces a new hardware-level trusted sensing framework, built in the sensor, to encrypt measured analog signals related to cell counting in the patient's blood sample, at the data acquisition point. To protect the user privacy, MedSen's in-sensor encryption scheme conceals the user's private information before sending them out for cloud-based medical diagnostics analysis. The analysis outcomes are sent back to Med-Sen for decryption and user notifications. Additionally, MedSen introduces cyto-coded passwords to authenticate the user to the cloud server without the need for explicit screen password entry. Each user's password constitutes a predetermined number of synthetic beads with different dielectric characteristics. MedSen mixes the password beads with the user's blood before submitting the data for diagnostics analysis. The cloud server authenticates the user based on the statistics and characteristics of the beads with the blood sample, and links the user's identity to the encrypted analysis outcomes. We have implemented a real-world working prototype of MedSen through bio-sensor fabrication and smartphone app (Android) implementations. Our results show that MedSen can reliably classify different users based on their cyto-coded passwords with high accuracy. MedSen's built-in analog signal encryption guarantees the user's privacy by considering the smartphone and cloud server possibly untrusted (curious but honest). MedSen's end-to-end time requirement for disease diagnostics is approximately 0.2 seconds on average.","PeriodicalId":102292,"journal":{"name":"2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"303 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128626530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Practical, Formal Synthesis and Automatic Enforcement of Security Policies for Android Android安全策略的实用、正式合成和自动执行
H. Bagheri, Alireza Sadeghi, Reyhaneh Jabbarvand Behrouz, S. Malek
As the dominant mobile computing platform, Android has become a prime target for cyber-security attacks. Many of these attacks are manifested at the application level, and through the exploitation of vulnerabilities in apps downloaded from the popular app stores. Increasingly, sophisticated attacks exploit the vulnerabilities in multiple installed apps, making it extremely difficult to foresee such attacks, as neither the app developers nor the store operators know a priori which apps will be installed together. This paper presents an approach that allows the end-users to safeguard a given bundle of apps installed on their device from such attacks. The approach, realized in a tool, called SEPAR, combines static analysis with lightweight formal methods to automatically infer security-relevant properties from a bundle of apps. It then uses a constraint solver to synthesize possible security exploits, from which fine-grained security policies are derived and automatically enforced to protect a given device. In our experiments with over 4,000 Android apps, SEPAR has proven to be highly effective at detecting previously unknown vulnerabilities as well as preventing their exploitation.
作为占主导地位的移动计算平台,Android已经成为网络安全攻击的首要目标。这些攻击大多表现在应用程序级别,并通过利用从流行应用商店下载的应用程序中的漏洞。越来越多的复杂攻击利用了多个已安装应用的漏洞,这使得预测此类攻击变得极其困难,因为应用开发商和商店运营商都不知道哪些应用将被一起安装。本文提出了一种方法,允许最终用户保护安装在其设备上的给定应用程序包免受此类攻击。这种方法是在一个名为SEPAR的工具中实现的,它将静态分析与轻量级的形式化方法结合起来,从一堆应用程序中自动推断出与安全相关的属性。然后,它使用约束求解器综合可能的安全漏洞,从中派生并自动执行细粒度安全策略以保护给定设备。在我们对超过4000个Android应用程序的实验中,SEPAR已被证明在检测以前未知的漏洞以及防止它们被利用方面非常有效。
{"title":"Practical, Formal Synthesis and Automatic Enforcement of Security Policies for Android","authors":"H. Bagheri, Alireza Sadeghi, Reyhaneh Jabbarvand Behrouz, S. Malek","doi":"10.1109/DSN.2016.53","DOIUrl":"https://doi.org/10.1109/DSN.2016.53","url":null,"abstract":"As the dominant mobile computing platform, Android has become a prime target for cyber-security attacks. Many of these attacks are manifested at the application level, and through the exploitation of vulnerabilities in apps downloaded from the popular app stores. Increasingly, sophisticated attacks exploit the vulnerabilities in multiple installed apps, making it extremely difficult to foresee such attacks, as neither the app developers nor the store operators know a priori which apps will be installed together. This paper presents an approach that allows the end-users to safeguard a given bundle of apps installed on their device from such attacks. The approach, realized in a tool, called SEPAR, combines static analysis with lightweight formal methods to automatically infer security-relevant properties from a bundle of apps. It then uses a constraint solver to synthesize possible security exploits, from which fine-grained security policies are derived and automatically enforced to protect a given device. In our experiments with over 4,000 Android apps, SEPAR has proven to be highly effective at detecting previously unknown vulnerabilities as well as preventing their exploitation.","PeriodicalId":102292,"journal":{"name":"2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128125060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
SDNShield: Reconciliating Configurable Application Permissions for SDN App Markets SDN shield:协调SDN应用市场的可配置应用权限
Xitao Wen, Bo Yang, Yan Chen, Chengchen Hu, Yi Wang, B. Liu, Xiaolin Chen
The OpenFlow paradigm embraces third-party development efforts, and therefore suffers from potential attacks that usurp the excessive privileges of control plane applications (apps). Such privilege abuse could lead to various attacks impacting the entire administrative domain. In this paper, we present SDNShield, a permission control system that helps network administrators to express and enforce only the minimum required privileges to individual controller apps. SDNShield achieves this goal through (i) fine-grained SDN permission abstractions that allow accurate representation of app behavior boundary, (ii) automatic security policy reconciliation that incorporates security policies specified by administrators into the requested app permissions, and (iii) a lightweight thread-based controller architecture for controller/app isolation and reliable permission enforcement. Through prototype implementation, we verify its effectiveness against proof-of-concept attacks. Performance evaluation shows that SDNShield introduces negligible runtime overhead.
OpenFlow范式支持第三方开发工作,因此遭受了潜在的攻击,这些攻击篡夺了控制平面应用程序(app)的过多特权。这种特权滥用可能导致影响整个管理域的各种攻击。在本文中,我们提出了SDNShield,一个权限控制系统,可以帮助网络管理员表达和强制执行单个控制器应用程序所需的最低权限。SDN shield通过以下方式实现了这一目标:(i)细粒度的SDN权限抽象,允许准确表示应用程序的行为边界;(ii)自动安全策略协调,将管理员指定的安全策略整合到请求的应用程序权限中;(iii)轻量级的基于线程的控制器架构,用于控制器/应用程序隔离和可靠的权限执行。通过原型实现,我们验证了其对概念验证攻击的有效性。性能评估表明,snshield引入的运行时开销可以忽略不计。
{"title":"SDNShield: Reconciliating Configurable Application Permissions for SDN App Markets","authors":"Xitao Wen, Bo Yang, Yan Chen, Chengchen Hu, Yi Wang, B. Liu, Xiaolin Chen","doi":"10.1109/DSN.2016.20","DOIUrl":"https://doi.org/10.1109/DSN.2016.20","url":null,"abstract":"The OpenFlow paradigm embraces third-party development efforts, and therefore suffers from potential attacks that usurp the excessive privileges of control plane applications (apps). Such privilege abuse could lead to various attacks impacting the entire administrative domain. In this paper, we present SDNShield, a permission control system that helps network administrators to express and enforce only the minimum required privileges to individual controller apps. SDNShield achieves this goal through (i) fine-grained SDN permission abstractions that allow accurate representation of app behavior boundary, (ii) automatic security policy reconciliation that incorporates security policies specified by administrators into the requested app permissions, and (iii) a lightweight thread-based controller architecture for controller/app isolation and reliable permission enforcement. Through prototype implementation, we verify its effectiveness against proof-of-concept attacks. Performance evaluation shows that SDNShield introduces negligible runtime overhead.","PeriodicalId":102292,"journal":{"name":"2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133405841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
Leveraging ECC to Mitigate Read Disturbance, False Reads and Write Faults in STT-RAM 利用ECC减轻STT-RAM中的读干扰、误读和写错误
Seyed Mohammad Seyedzadeh, R. Maddah, A. Jones, R. Melhem
Designing reliable systems using scaled Spin-Transfer Torque Random Access Memory (STT-RAM) has become a significant challenge as the memory technology feature size is scaled down. The introduction of a more prominent read disturbance is a key contributor in this reliability challenge. However, techniques to address read disturbance are often considered in a vacuum that assumes other concerns like transient read errors (false reads) and write faults do not occur. This paper studies several techniques that leverage ECC to mitigate persistent errors resulting from read disturbance and write faults of STT-RAM while still considering the impact of transient errors of false reads. In particular, we study three policies to enable better-than-conservative read disturbance mitigation. The first policy, write after error (WAE), uses ECC to detect errors and write back data to clear persistent errors. The second policy, write after persistent error (WAP), filters out false reads by reading a second time when an error is detected leading to trade-off between write and read energy. The third policy, write after error threshold (WAT), leaves cells with incorrect data behind (up to a threshold) when the number of errors is less than the ECC capability. To evaluate the effectiveness of the different schemes and compare with the simple previously proposed scheme of writing after every read (WAR), we model these policies using Markov processes. This approach allows the determination of appropriate bit error rates in the context of both persistent and transient errors to accurately estimate the system reliability and the energy consumption of different error correction approaches. Our evaluations show that each of these policies provides benefits for different error scenarios. Moreover some approaches can save energy by an average of 99.5%, while incurring the same reliability as other approaches.
随着存储技术特征尺寸的缩小,设计可靠的自旋传递扭矩随机存取存储器(STT-RAM)系统已成为一个重大挑战。在这种可靠性挑战中,引入一个更突出的读干扰是一个关键因素。然而,解决读干扰的技术通常是在真空中考虑的,假设没有发生其他问题,如瞬态读错误(误读)和写错误。本文研究了几种利用ECC来减轻STT-RAM读干扰和写错误导致的持续错误的技术,同时仍然考虑错误读的瞬态错误的影响。特别是,我们研究了三种策略来实现优于保守的读干扰缓解。第一种策略是WAE (write after error),使用ECC检测错误,并回写数据以清除持久错误。第二个策略是持久错误后写入(WAP),当检测到错误时,通过第二次读取来过滤错误读取,从而在写和读能量之间进行权衡。第三个策略是在错误阈值之后写入(WAT),当错误数量少于ECC能力时,将不正确数据的单元留在后面(直到一个阈值)。为了评估不同方案的有效性,并与之前提出的简单的每次读取后写入(WAR)方案进行比较,我们使用马尔可夫过程对这些策略进行建模。这种方法允许在持久错误和瞬态错误的情况下确定适当的误码率,以准确地估计系统可靠性和不同纠错方法的能耗。我们的评估表明,这些策略中的每一个都为不同的错误场景提供了好处。此外,一些方法可以平均节省99.5%的能源,同时产生与其他方法相同的可靠性。
{"title":"Leveraging ECC to Mitigate Read Disturbance, False Reads and Write Faults in STT-RAM","authors":"Seyed Mohammad Seyedzadeh, R. Maddah, A. Jones, R. Melhem","doi":"10.1109/DSN.2016.28","DOIUrl":"https://doi.org/10.1109/DSN.2016.28","url":null,"abstract":"Designing reliable systems using scaled Spin-Transfer Torque Random Access Memory (STT-RAM) has become a significant challenge as the memory technology feature size is scaled down. The introduction of a more prominent read disturbance is a key contributor in this reliability challenge. However, techniques to address read disturbance are often considered in a vacuum that assumes other concerns like transient read errors (false reads) and write faults do not occur. This paper studies several techniques that leverage ECC to mitigate persistent errors resulting from read disturbance and write faults of STT-RAM while still considering the impact of transient errors of false reads. In particular, we study three policies to enable better-than-conservative read disturbance mitigation. The first policy, write after error (WAE), uses ECC to detect errors and write back data to clear persistent errors. The second policy, write after persistent error (WAP), filters out false reads by reading a second time when an error is detected leading to trade-off between write and read energy. The third policy, write after error threshold (WAT), leaves cells with incorrect data behind (up to a threshold) when the number of errors is less than the ECC capability. To evaluate the effectiveness of the different schemes and compare with the simple previously proposed scheme of writing after every read (WAR), we model these policies using Markov processes. This approach allows the determination of appropriate bit error rates in the context of both persistent and transient errors to accurately estimate the system reliability and the energy consumption of different error correction approaches. Our evaluations show that each of these policies provides benefits for different error scenarios. Moreover some approaches can save energy by an average of 99.5%, while incurring the same reliability as other approaches.","PeriodicalId":102292,"journal":{"name":"2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129397814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Secure Identification of Actively Executed Code on a Generic Trusted Component 通用可信组件上主动执行代码的安全标识
Bruno Vavala, N. Neves, P. Steenkiste
Code identity is a fundamental concept for authenticated operations in Trusted Computing. In today's approach, the overhead of assigning an identity to a protected service increases linearly with the service code size. In addition, service code size continues to grow to accommodate richer services. This trend negatively impacts either the security or the efficiency of current protocols for trusted executions. We present an execution protocol that breaks the dependency between the code size of the service and the identification overhead, without affecting security, and that works on different trusted components. This is achieved by computing an identity for each of the code modules that are actually executed, and then building a robust chain of trust that links them together for efficient verification. We implemented and applied our protocol to a widely-deployed database engine, improving query-processing time up to 2× compared to the monolithic execution of the engine.
代码标识是可信计算中经过身份验证的操作的基本概念。在目前的方法中,为受保护的服务分配标识的开销随着服务代码大小呈线性增加。此外,服务代码的大小也在不断增长,以适应更丰富的服务。这种趋势会对当前可信执行协议的安全性或效率产生负面影响。我们提供了一个执行协议,它打破了服务代码大小和标识开销之间的依赖关系,而不影响安全性,并且可以在不同的可信组件上工作。这是通过计算实际执行的每个代码模块的标识来实现的,然后构建一个健壮的信任链,将它们连接在一起以进行有效的验证。我们在一个广泛部署的数据库引擎上实现并应用了我们的协议,与引擎的单片执行相比,查询处理时间提高了2倍。
{"title":"Secure Identification of Actively Executed Code on a Generic Trusted Component","authors":"Bruno Vavala, N. Neves, P. Steenkiste","doi":"10.1109/DSN.2016.45","DOIUrl":"https://doi.org/10.1109/DSN.2016.45","url":null,"abstract":"Code identity is a fundamental concept for authenticated operations in Trusted Computing. In today's approach, the overhead of assigning an identity to a protected service increases linearly with the service code size. In addition, service code size continues to grow to accommodate richer services. This trend negatively impacts either the security or the efficiency of current protocols for trusted executions. We present an execution protocol that breaks the dependency between the code size of the service and the identification overhead, without affecting security, and that works on different trusted components. This is achieved by computing an identity for each of the code modules that are actually executed, and then building a robust chain of trust that links them together for efficient verification. We implemented and applied our protocol to a widely-deployed database engine, improving query-processing time up to 2× compared to the monolithic execution of the engine.","PeriodicalId":102292,"journal":{"name":"2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115710270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Reconsidering Single Failure Recovery in Clustered File Systems 重新考虑集群文件系统的单故障恢复
Zhirong Shen, J. Shu, P. Lee
How to improve the performance of single failure recovery has been an active research topic because of its prevalence in large-scale storage systems. We argue that when erasure coding is deployed in a cluster file system (CFS), existing single failure recovery designs are limited in different aspects: neglecting the bandwidth diversity property in a CFS architecture, targeting specific erasure code constructions, and no special treatment on load balancing during recovery. In this paper, we reconsider the single failure recovery problem in a CFS setting, and propose CAR, a cross-rack-aware recovery algorithm. For each stripe, CAR finds a recovery solution that retrieves data from the minimum number of racks. It also reduces the amount of cross-rack repair traffic by performing intra-rack data aggregation prior to cross-rack transmission. Furthermore, by considering multi-stripe recovery, CAR balances the amount of cross-rack repair traffic across multiple racks. Evaluation results show that CAR can effectively reduce the amount of cross-rack repair traffic and the resulting recovery time.
由于单故障恢复在大型存储系统中的普遍存在,如何提高单故障恢复的性能一直是一个活跃的研究课题。本文认为,当在集群文件系统(CFS)中部署擦除编码时,现有的单故障恢复设计在不同方面存在局限性:忽略了CFS架构中的带宽分集特性,针对特定的擦除码结构,以及在恢复过程中没有对负载均衡进行特殊处理。本文重新考虑了CFS环境下的单故障恢复问题,提出了一种交叉机架感知恢复算法CAR。对于每个条带,CAR找到一个从最少机架数量检索数据的恢复解决方案。它还通过在跨机架传输之前执行机架内数据聚合,减少了跨机架修复通信量。此外,通过考虑多条恢复,CAR在多个机架上平衡了跨机架的修复流量。评估结果表明,CAR可以有效地减少跨机架维修流量和由此产生的恢复时间。
{"title":"Reconsidering Single Failure Recovery in Clustered File Systems","authors":"Zhirong Shen, J. Shu, P. Lee","doi":"10.1109/DSN.2016.37","DOIUrl":"https://doi.org/10.1109/DSN.2016.37","url":null,"abstract":"How to improve the performance of single failure recovery has been an active research topic because of its prevalence in large-scale storage systems. We argue that when erasure coding is deployed in a cluster file system (CFS), existing single failure recovery designs are limited in different aspects: neglecting the bandwidth diversity property in a CFS architecture, targeting specific erasure code constructions, and no special treatment on load balancing during recovery. In this paper, we reconsider the single failure recovery problem in a CFS setting, and propose CAR, a cross-rack-aware recovery algorithm. For each stripe, CAR finds a recovery solution that retrieves data from the minimum number of racks. It also reduces the amount of cross-rack repair traffic by performing intra-rack data aggregation prior to cross-rack transmission. Furthermore, by considering multi-stripe recovery, CAR balances the amount of cross-rack repair traffic across multiple racks. Evaluation results show that CAR can effectively reduce the amount of cross-rack repair traffic and the resulting recovery time.","PeriodicalId":102292,"journal":{"name":"2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124254766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 46
Repackage-Proofing Android Apps 重新包装的Android应用程序
Lannan Luo, Yu Fu, Dinghao Wu, Sencun Zhu, Peng Liu
App repackaging has become a severe threat to theAndroid ecosystem. While various protection techniques, such as watermarking and repackaging detection, have been proposed, a defense that stops repackaged apps from working on user devices, i.e., repackage-proofing, is missing. We propose a technique that builds a reliable and stealthy repackage-proofing capability into Android apps. A large number of detection nodes are inserted into the original app without incurring much overhead, each is woven into the surrounding code to blur itself. Once repackaging is detected, a response node injects a failure in the form of delayed malfunctions, making it difficult to trace back. The response nodes and detection nodes form high-degree connections and communicate through stealthy communication channels, such that upon detection several of the many response nodes are selected stochastically to take actions, which further obfuscates and enhances the protection. We have built a prototype. The evaluation shows that the technique is effective and efficient.
应用重新包装已经成为android生态系统的一个严重威胁。虽然已经提出了各种保护技术,如水印和重新包装检测,但阻止重新包装的应用程序在用户设备上工作的防御措施,即重新包装防护,是缺失的。我们提出了一种技术,该技术可以在Android应用程序中构建可靠且隐秘的再包装防护功能。大量的检测节点被插入到原始应用程序中,而不会产生太多的开销,每个节点都被编织到周围的代码中以模糊自己。一旦检测到重新打包,响应节点就会以延迟故障的形式注入故障,使其难以追溯。响应节点和检测节点形成高度连接,通过隐蔽通信通道进行通信,在检测到多个响应节点时,随机选择几个节点采取行动,进一步模糊和增强了防护。我们已经建立了一个原型。评价结果表明,该技术是有效的、高效的。
{"title":"Repackage-Proofing Android Apps","authors":"Lannan Luo, Yu Fu, Dinghao Wu, Sencun Zhu, Peng Liu","doi":"10.1109/DSN.2016.56","DOIUrl":"https://doi.org/10.1109/DSN.2016.56","url":null,"abstract":"App repackaging has become a severe threat to theAndroid ecosystem. While various protection techniques, such as watermarking and repackaging detection, have been proposed, a defense that stops repackaged apps from working on user devices, i.e., repackage-proofing, is missing. We propose a technique that builds a reliable and stealthy repackage-proofing capability into Android apps. A large number of detection nodes are inserted into the original app without incurring much overhead, each is woven into the surrounding code to blur itself. Once repackaging is detected, a response node injects a failure in the form of delayed malfunctions, making it difficult to trace back. The response nodes and detection nodes form high-degree connections and communicate through stealthy communication channels, such that upon detection several of the many response nodes are selected stochastically to take actions, which further obfuscates and enhances the protection. We have built a prototype. The evaluation shows that the technique is effective and efficient.","PeriodicalId":102292,"journal":{"name":"2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125448808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
ReadDuo: Constructing Reliable MLC Phase Change Memory through Fast and Robust Readout ReadDuo:通过快速和稳健的读出构建可靠的MLC相变存储器
Rujia Wang, Youtao Zhang, Jun Yang
Phase change memory (PCM) has emerged as a promising non-volatile memory technology. Multi-level cell (MLC) PCM, while effectively reducing per bit fabrication cost, suffers from resistance drift based soft errors. It is challenging to construct reliable MLC chips that achieve high performance, high storage density, and low energy consumption simultaneously. In this paper, we propose ReadDuo, a fast and robust readout solution to address resistance drift in MLC PCM. We first integrate fast current sensing and resistance drift resilient voltage sensing, which exposes performance optimization opportunities without sacrificing reliability. We then devise last writes tracking and selective different write schemes to minimize performance and energy consumption overhead in scrubbing. Our experimental results show that ReadDuo achieves 37% improvement on average over existing solutions when considering performance, dynamic energy consumption, and storage density all together.
相变存储器(PCM)是一种很有前途的非易失性存储技术。多层单元(MLC) PCM在有效降低每比特制造成本的同时,也存在基于电阻漂移的软误差。构建可靠的MLC芯片,同时实现高性能、高存储密度和低能耗是一项挑战。在本文中,我们提出了ReadDuo,一个快速和稳健的读出解决方案,以解决MLC PCM中的电阻漂移。我们首先集成了快速电流传感和电阻漂移弹性电压传感,在不牺牲可靠性的情况下提供了性能优化机会。然后,我们设计最后的写入跟踪和选择不同的写入方案,以最小化性能和能耗开销。我们的实验结果表明,在综合考虑性能、动态能耗和存储密度的情况下,ReadDuo比现有解决方案平均提高了37%。
{"title":"ReadDuo: Constructing Reliable MLC Phase Change Memory through Fast and Robust Readout","authors":"Rujia Wang, Youtao Zhang, Jun Yang","doi":"10.1109/DSN.2016.27","DOIUrl":"https://doi.org/10.1109/DSN.2016.27","url":null,"abstract":"Phase change memory (PCM) has emerged as a promising non-volatile memory technology. Multi-level cell (MLC) PCM, while effectively reducing per bit fabrication cost, suffers from resistance drift based soft errors. It is challenging to construct reliable MLC chips that achieve high performance, high storage density, and low energy consumption simultaneously. In this paper, we propose ReadDuo, a fast and robust readout solution to address resistance drift in MLC PCM. We first integrate fast current sensing and resistance drift resilient voltage sensing, which exposes performance optimization opportunities without sacrificing reliability. We then devise last writes tracking and selective different write schemes to minimize performance and energy consumption overhead in scrubbing. Our experimental results show that ReadDuo achieves 37% improvement on average over existing solutions when considering performance, dynamic energy consumption, and storage density all together.","PeriodicalId":102292,"journal":{"name":"2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122306865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
期刊
2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1