首页 > 最新文献

2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)最新文献

英文 中文
OI-RAID: A Two-Layer RAID Architecture towards Fast Recovery and High Reliability io -RAID:一种快速恢复、高可靠性的两层RAID架构
Neng Wang, Yinlong Xu, Yongkun Li, Si Wu
A lot of inexpensive disks in modern storage systems induce frequent disk failures. It takes a long time to recover a failed disk due to its large capacity and limited I/O. This paper proposes a hierarchical architecture of erasure code, OI-RAID. OI-RAID consists of two layers of codes, outer layer code and inner layer code. The outer layer code is based on disk grouping and Balanced Incomplete Block Design (BIBD) with skewed data layout to provide efficient parallel I/O of all disks for failure recovery. Inner layer code is deployed within a group of disks. As an example, we deploy RAID5 in both layers and present detailed performance analysis. With RAID5 in both layers, OI-RAID tolerates at least three disk failures meeting practical data availability, and achieves much higher speed up of disk failure recovery than existing approaches, while keeping optimal data update complexity and practically low storage overhead.
现代存储系统中大量廉价的磁盘导致了频繁的磁盘故障。硬盘容量大,I/O受限,恢复时间较长。本文提出了一种擦除码的分层结构——OI-RAID。io - raid由两层代码组成,外层代码和内层代码。外层代码基于磁盘分组和倾斜数据布局的均衡不完全块设计(BIBD),为所有磁盘提供高效的并行I/O,用于故障恢复。内层代码部署在一组磁盘中。作为示例,我们在两层中都部署了RAID5,并给出了详细的性能分析。在这两层中使用RAID5, OI-RAID可以容忍至少三次磁盘故障,以满足实际数据可用性,并实现比现有方法更高的磁盘故障恢复速度,同时保持最佳的数据更新复杂性和实际上较低的存储开销。
{"title":"OI-RAID: A Two-Layer RAID Architecture towards Fast Recovery and High Reliability","authors":"Neng Wang, Yinlong Xu, Yongkun Li, Si Wu","doi":"10.1109/DSN.2016.15","DOIUrl":"https://doi.org/10.1109/DSN.2016.15","url":null,"abstract":"A lot of inexpensive disks in modern storage systems induce frequent disk failures. It takes a long time to recover a failed disk due to its large capacity and limited I/O. This paper proposes a hierarchical architecture of erasure code, OI-RAID. OI-RAID consists of two layers of codes, outer layer code and inner layer code. The outer layer code is based on disk grouping and Balanced Incomplete Block Design (BIBD) with skewed data layout to provide efficient parallel I/O of all disks for failure recovery. Inner layer code is deployed within a group of disks. As an example, we deploy RAID5 in both layers and present detailed performance analysis. With RAID5 in both layers, OI-RAID tolerates at least three disk failures meeting practical data availability, and achieves much higher speed up of disk failure recovery than existing approaches, while keeping optimal data update complexity and practically low storage overhead.","PeriodicalId":102292,"journal":{"name":"2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127857304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Enabling Deep Voltage Scaling in Delay Sensitive L1 Caches 在延迟敏感L1缓存中启用深度电压缩放
Chao Yan, R. Joseph
Voltage scaling is one of the most effective techniques for providing power savings on a chip-wide basis. However, reducing supply voltage in the presence of process variation introduces significant reliability challenges for large SRAM arrays. In this work, we demonstrate that the emergence of SRAM failures in delay sensitive L1 caches presents significant impediments to voltage scaling. We show that increases in the L1 cache latency would have a detrimental impact on a processor's performance and power consumption at aggressively scaled voltages. We propose techniques for L1 instruction/data caches to enable deep voltage scaling without compromising the L1 cache latency. For the data cache, we employ fault-free windows to adaptively hold the likely accessed data using the fault-free words within each cache line. For the instruction cache, we avoid the addresses that map to defective words by relocating basic blocks. During high voltage operation, both L1 caches have full capability to support high-performance. During low voltage operation, our schemes reduce Vccmin below 400mV. Compared to a conventional cache with a Vccmin of 760mV, we reduce the energy per instruction by 64%.
电压缩放是在芯片范围内提供节能的最有效技术之一。然而,在存在工艺变化的情况下降低电源电压会给大型SRAM阵列带来重大的可靠性挑战。在这项工作中,我们证明了延迟敏感L1缓存中SRAM故障的出现对电压缩放产生了重大阻碍。我们表明,L1缓存延迟的增加将对处理器的性能和在大幅缩放电压下的功耗产生不利影响。我们提出L1指令/数据缓存技术,在不影响L1缓存延迟的情况下实现深度电压缩放。对于数据缓存,我们采用无故障窗口来自适应地保存可能访问的数据,使用每个缓存线路中的无故障字。对于指令缓存,我们通过重新定位基本块来避免映射到有缺陷的字的地址。在高压操作期间,两个L1缓存都具有支持高性能的全部能力。在低压运行时,我们的方案将Vccmin降低到400mV以下。与Vccmin为760mV的传统缓存相比,我们将每条指令的能量降低了64%。
{"title":"Enabling Deep Voltage Scaling in Delay Sensitive L1 Caches","authors":"Chao Yan, R. Joseph","doi":"10.1109/DSN.2016.26","DOIUrl":"https://doi.org/10.1109/DSN.2016.26","url":null,"abstract":"Voltage scaling is one of the most effective techniques for providing power savings on a chip-wide basis. However, reducing supply voltage in the presence of process variation introduces significant reliability challenges for large SRAM arrays. In this work, we demonstrate that the emergence of SRAM failures in delay sensitive L1 caches presents significant impediments to voltage scaling. We show that increases in the L1 cache latency would have a detrimental impact on a processor's performance and power consumption at aggressively scaled voltages. We propose techniques for L1 instruction/data caches to enable deep voltage scaling without compromising the L1 cache latency. For the data cache, we employ fault-free windows to adaptively hold the likely accessed data using the fault-free words within each cache line. For the instruction cache, we avoid the addresses that map to defective words by relocating basic blocks. During high voltage operation, both L1 caches have full capability to support high-performance. During low voltage operation, our schemes reduce Vccmin below 400mV. Compared to a conventional cache with a Vccmin of 760mV, we reduce the energy per instruction by 64%.","PeriodicalId":102292,"journal":{"name":"2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129880891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Can't Touch This: Consistent Network Updates for Multiple Policies 不能碰这个:多个策略的一致网络更新
S. Dudycz, Arne Ludwig, S. Schmid
Computer networks such as the Internet or datacenter networks have become a a crucial infrastructure for many criticial services. Accordingly, it is important that such networks preserve correctness criteria, even during transitions from one correct configuration to a new correct configuration. This paper initiates the study of how to simultaneously update multiple routes in a Software-Defined Network (SDN) in a transiently consistent and efficient manner. In particular, we study the problem of minimizing the number of switch interactions, in this paper also called "touches". Our main result is a negative one: we rigorously prove that jointly optimizing multiple route updates in a consistent and efficient manner is NP-hard, alreadyfor two routing policies. However, we also present an efficient, polynomial-time algorithm that, given correct update schedules for individual policies, computes an optimal global schedule with minimal touches.
计算机网络,如因特网或数据中心网络,已经成为许多关键服务的关键基础设施。因此,这样的网络保持正确性标准是很重要的,即使在从一个正确的配置到一个新的正确配置的转换过程中也是如此。本文开始研究如何在软件定义网络(SDN)中以瞬时一致和高效的方式同时更新多条路由。特别地,我们研究了最小化开关相互作用数量的问题,在本文中也称为“触点”。我们的主要结果是否定的:我们严格证明了以一致和有效的方式联合优化多条路由更新是np困难的,已经有两个路由策略。然而,我们也提出了一种高效的多项式时间算法,该算法在给定单个策略的正确更新计划的情况下,以最小的接触计算出最优的全局计划。
{"title":"Can't Touch This: Consistent Network Updates for Multiple Policies","authors":"S. Dudycz, Arne Ludwig, S. Schmid","doi":"10.1109/DSN.2016.21","DOIUrl":"https://doi.org/10.1109/DSN.2016.21","url":null,"abstract":"Computer networks such as the Internet or datacenter networks have become a a crucial infrastructure for many criticial services. Accordingly, it is important that such networks preserve correctness criteria, even during transitions from one correct configuration to a new correct configuration. This paper initiates the study of how to simultaneously update multiple routes in a Software-Defined Network (SDN) in a transiently consistent and efficient manner. In particular, we study the problem of minimizing the number of switch interactions, in this paper also called \"touches\". Our main result is a negative one: we rigorously prove that jointly optimizing multiple route updates in a consistent and efficient manner is NP-hard, alreadyfor two routing policies. However, we also present an efficient, polynomial-time algorithm that, given correct update schedules for individual policies, computes an optimal global schedule with minimal touches.","PeriodicalId":102292,"journal":{"name":"2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129956271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
On False Data Injection Attacks Against Railway Traction Power Systems 铁路牵引电力系统虚假数据注入攻击研究
S. Lakshminarayana, Zhan-Teng Teo, Rui Tan, David K. Y. Yau, P. Arboleya
Modern urban railways extensively use computerized-sensing and control technologies to achieve safe, reliable, and well-timed operations. However, the use of these technologies may provide a convenient leverage to cyber-attackers who have bypassed the air gaps and aim at causing safety incidents and service disruptions. In this paper, we study false data injection (FDI) attacks against railways' traction power systems (TPSes). Specifically, we analyze two types of FDI attacks on the train-borne voltage, current, and position sensor measurements -- which we call efficiency attack and safety attack -- that (i) maximize the system's total power consumption and (ii) mislead trains' local voltages to exceed given safety-critical thresholds, respectively. To counteract, we develop a global attack detection system that serializes a bad data detector anda novel secondary attack detector designed based on unique TPS characteristics. With intact position data of trains, our detection system can effectively detect the FDI attacks ontrains' voltage and current measurements even if the attacker has full and accurate knowledge of the TPS, attack detection, and real-time system state. Extensive simulations driven by realistic running profiles of trains verify that a TPS setup isvulnerable to the FDI attacks, but these attacks can be detected effectively by the proposed global monitoring.
现代城市铁路广泛采用计算机传感和控制技术,实现安全、可靠、准时运行。然而,这些技术的使用可能为网络攻击者提供了一个方便的杠杆,这些攻击者绕过了空气间隙,旨在造成安全事故和服务中断。本文研究了针对铁路牵引电力系统的虚假数据注入(FDI)攻击。具体来说,我们分析了两种对列车载电压、电流和位置传感器测量的FDI攻击——我们称之为效率攻击和安全攻击——它们分别(i)最大化系统的总功耗和(ii)误导列车的局部电压超过给定的安全临界阈值。为此,我们开发了一个全局攻击检测系统,该系统序列化了一个坏数据检测器和基于独特TPS特征设计的新型辅助攻击检测器。我们的检测系统具有完整的列车位置数据,即使攻击者对TPS、攻击检测和实时系统状态有充分准确的了解,也可以有效地检测到FDI攻击控制列车的电压和电流测量。由真实列车运行概况驱动的大量模拟验证了TPS设置容易受到FDI攻击,但这些攻击可以通过提议的全局监控有效地检测到。
{"title":"On False Data Injection Attacks Against Railway Traction Power Systems","authors":"S. Lakshminarayana, Zhan-Teng Teo, Rui Tan, David K. Y. Yau, P. Arboleya","doi":"10.1109/DSN.2016.42","DOIUrl":"https://doi.org/10.1109/DSN.2016.42","url":null,"abstract":"Modern urban railways extensively use computerized-sensing and control technologies to achieve safe, reliable, and well-timed operations. However, the use of these technologies may provide a convenient leverage to cyber-attackers who have bypassed the air gaps and aim at causing safety incidents and service disruptions. In this paper, we study false data injection (FDI) attacks against railways' traction power systems (TPSes). Specifically, we analyze two types of FDI attacks on the train-borne voltage, current, and position sensor measurements -- which we call efficiency attack and safety attack -- that (i) maximize the system's total power consumption and (ii) mislead trains' local voltages to exceed given safety-critical thresholds, respectively. To counteract, we develop a global attack detection system that serializes a bad data detector anda novel secondary attack detector designed based on unique TPS characteristics. With intact position data of trains, our detection system can effectively detect the FDI attacks ontrains' voltage and current measurements even if the attacker has full and accurate knowledge of the TPS, attack detection, and real-time system state. Extensive simulations driven by realistic running profiles of trains verify that a TPS setup isvulnerable to the FDI attacks, but these attacks can be detected effectively by the proposed global monitoring.","PeriodicalId":102292,"journal":{"name":"2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128319136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Formal Analysis for Dependable Supervisory Control and Data Acquisition in Smart Grids 智能电网可靠监控与数据采集的形式化分析
M. Rahman, A. Jakaria, E. Al-Shaer
Smart grids provide innovative and efficient energy management services that offer operational reliability. The Supervisory Control and Data Acquisition (SCADA) system is a core component of a smart grid. Unlike the traditional cyber networks, these components consist of heterogeneous devices, such as intelligent electronic devices, programmable logic controllers, remote terminal units, control servers, routing and security devices, etc. SCADA devices communicate with one another under various communication protocols, physical media, and security properties. Failures or attacks on such networks have the potential of data unavailability and false data injection causing incorrect system estimations and control decisions leading to critical damages including power outages and destruction of equipment. In this work, we develop an automated security and resiliency analysis framework for SCADA in smart grids. This framework takes smart grid configurations and organizational security and resiliency requirements as inputs, formally models configurations and various security constraints, and verifies the dependability of the system under potential contingencies. We demonstrate the execution of this framework on an example problem. We also evaluate the scalability of the framework on synthetic SCADA systems.
智能电网提供创新和高效的能源管理服务,提供运行可靠性。监控与数据采集(SCADA)系统是智能电网的核心组成部分。与传统的网络网络不同,这些组件由异构设备组成,如智能电子设备、可编程逻辑控制器、远程终端单元、控制服务器、路由和安全设备等。SCADA设备在各种通信协议、物理介质和安全属性下相互通信。对此类网络的故障或攻击有可能导致数据不可用和错误数据注入,从而导致错误的系统估计和控制决策,从而导致包括停电和设备破坏在内的重大损害。在这项工作中,我们为智能电网中的SCADA开发了一个自动化的安全和弹性分析框架。该框架以智能电网配置和组织安全与弹性需求为输入,对配置和各种安全约束进行形式化建模,并验证系统在潜在突发事件下的可靠性。我们将在一个示例问题上演示该框架的执行。我们还评估了该框架在综合SCADA系统上的可扩展性。
{"title":"Formal Analysis for Dependable Supervisory Control and Data Acquisition in Smart Grids","authors":"M. Rahman, A. Jakaria, E. Al-Shaer","doi":"10.1109/DSN.2016.32","DOIUrl":"https://doi.org/10.1109/DSN.2016.32","url":null,"abstract":"Smart grids provide innovative and efficient energy management services that offer operational reliability. The Supervisory Control and Data Acquisition (SCADA) system is a core component of a smart grid. Unlike the traditional cyber networks, these components consist of heterogeneous devices, such as intelligent electronic devices, programmable logic controllers, remote terminal units, control servers, routing and security devices, etc. SCADA devices communicate with one another under various communication protocols, physical media, and security properties. Failures or attacks on such networks have the potential of data unavailability and false data injection causing incorrect system estimations and control decisions leading to critical damages including power outages and destruction of equipment. In this work, we develop an automated security and resiliency analysis framework for SCADA in smart grids. This framework takes smart grid configurations and organizational security and resiliency requirements as inputs, formally models configurations and various security constraints, and verifies the dependability of the system under potential contingencies. We demonstrate the execution of this framework on an example problem. We also evaluate the scalability of the framework on synthetic SCADA systems.","PeriodicalId":102292,"journal":{"name":"2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128624425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Can We Trust the Privacy Policies of Android Apps? 我们能信任Android应用程序的隐私政策吗?
Le Yu, Xiapu Luo, Xule Liu, Zhang Tao
Recent years have witnessed the sharp increase of malicious apps that steal users' personal information. To address users' concerns about privacy risks, more and more apps are accompanied with privacy policies written in natural language because it is difficult for users to infer an app's behaviors according to the required permissions. However, little is known whether these privacy policies are trustworthy or not. It is worth noting that a questionable privacy policy may result from careless preparation by an app developer or intentional deception by an attacker. In this paper, we conduct the first systematic study on privacy policy by proposing a novel approach to automatically identify three kinds of problems in privacy policy. After tackling several challenging issues, we realize our approach in a system, named PPChecker, and evaluate it with real apps and privacy policies. The experimental results show that PPChecker can effectively identify questionable privacy policies with high precision. Moreover, applying PPChecker to 1,197 popular apps, we found that 282 apps (i.e., 23.6%) have at least one kind of problems. This study sheds light on the research of improving and regulating apps' privacy policies.
近年来,窃取用户个人信息的恶意应用急剧增加。为了解决用户对隐私风险的担忧,越来越多的应用程序都附有以自然语言编写的隐私政策,因为用户很难根据所需的权限推断应用程序的行为。然而,很少有人知道这些隐私政策是否值得信赖。值得注意的是,有问题的隐私政策可能是由于应用程序开发人员的粗心准备或攻击者的故意欺骗造成的。本文首次对隐私政策进行了系统研究,提出了一种自动识别隐私政策中三种问题的新方法。在解决了几个具有挑战性的问题之后,我们在一个名为PPChecker的系统中实现了我们的方法,并使用真实的应用程序和隐私政策对其进行了评估。实验结果表明,PPChecker能够有效地识别出有问题的隐私策略,且准确率较高。此外,将PPChecker应用于1197个流行应用程序,我们发现282个应用程序(即23.6%)至少存在一种问题。这项研究为改进和规范应用程序隐私政策的研究提供了启示。
{"title":"Can We Trust the Privacy Policies of Android Apps?","authors":"Le Yu, Xiapu Luo, Xule Liu, Zhang Tao","doi":"10.1109/DSN.2016.55","DOIUrl":"https://doi.org/10.1109/DSN.2016.55","url":null,"abstract":"Recent years have witnessed the sharp increase of malicious apps that steal users' personal information. To address users' concerns about privacy risks, more and more apps are accompanied with privacy policies written in natural language because it is difficult for users to infer an app's behaviors according to the required permissions. However, little is known whether these privacy policies are trustworthy or not. It is worth noting that a questionable privacy policy may result from careless preparation by an app developer or intentional deception by an attacker. In this paper, we conduct the first systematic study on privacy policy by proposing a novel approach to automatically identify three kinds of problems in privacy policy. After tackling several challenging issues, we realize our approach in a system, named PPChecker, and evaluate it with real apps and privacy policies. The experimental results show that PPChecker can effectively identify questionable privacy policies with high precision. Moreover, applying PPChecker to 1,197 popular apps, we found that 282 apps (i.e., 23.6%) have at least one kind of problems. This study sheds light on the research of improving and regulating apps' privacy policies.","PeriodicalId":102292,"journal":{"name":"2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131061091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 78
Efficient Algorithm-Based Fault Tolerance for Sparse Matrix Operations 稀疏矩阵运算的高效算法容错
A. Schöll, Claus Braun, M. Kochte, H. Wunderlich
We propose a fault tolerance approach for sparse matrix operations that detects and implicitly locates errors in the results for efficient local correction. This approach reduces the runtime overhead for fault tolerance and provides high error coverage. Existing algorithm-based fault tolerance approaches for sparse matrix operations detect and correct errors, but they often rely on expensive error localization steps. General checkpointing schemes can induce large recovery cost for high error rates. For sparse matrix-vector multiplications, experimental results show an average reduction in runtime overhead of 43.8%, while the error coverage is on average improved by 52.2% compared to related work. The practical applicability is demonstrated in a case study using the iterative Preconditioned Conjugate Gradient solver. When scaling the error rate by four orders of magnitude, the average runtime overhead increases only by 31.3% compared to low error rates.
我们提出了一种稀疏矩阵运算的容错方法,该方法可以检测并隐式定位结果中的错误,从而实现有效的局部校正。这种方法减少了容错的运行时开销,并提供了较高的错误覆盖率。现有的基于算法的稀疏矩阵容错方法可以检测和纠正错误,但它们往往依赖于昂贵的错误定位步骤。一般的检查点方案由于错误率高,恢复成本高。对于稀疏矩阵-向量乘法,实验结果表明,与相关工作相比,该方法平均减少了43.8%的运行时开销,平均提高了52.2%的错误覆盖率。应用迭代预条件共轭梯度解算器进行了实例分析,证明了该方法的实用性。当错误率增加4个数量级时,与低错误率相比,平均运行时开销仅增加31.3%。
{"title":"Efficient Algorithm-Based Fault Tolerance for Sparse Matrix Operations","authors":"A. Schöll, Claus Braun, M. Kochte, H. Wunderlich","doi":"10.1109/DSN.2016.31","DOIUrl":"https://doi.org/10.1109/DSN.2016.31","url":null,"abstract":"We propose a fault tolerance approach for sparse matrix operations that detects and implicitly locates errors in the results for efficient local correction. This approach reduces the runtime overhead for fault tolerance and provides high error coverage. Existing algorithm-based fault tolerance approaches for sparse matrix operations detect and correct errors, but they often rely on expensive error localization steps. General checkpointing schemes can induce large recovery cost for high error rates. For sparse matrix-vector multiplications, experimental results show an average reduction in runtime overhead of 43.8%, while the error coverage is on average improved by 52.2% compared to related work. The practical applicability is demonstrated in a case study using the iterative Preconditioned Conjugate Gradient solver. When scaling the error rate by four orders of magnitude, the average runtime overhead increases only by 31.3% compared to low error rates.","PeriodicalId":102292,"journal":{"name":"2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128516795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Making Fast Consensus Generally Faster 快速达成共识通常更快
Sebastiano Peluso, Alexandru Turcu, R. Palmieri, Giuliano Losa, B. Ravindran
New multi-leader consensus protocols leverage the Generalized Consensus specification to enable low latency, even load balancing, and high parallelism. However, these protocols introduce inherent costs with significant performance impact: they need quorums bigger than the minimum required to solve consensus and need to track dependency relations among proposals. In this paper we present M2PAXOS, an implementation of Generalized Consensus that provides fast decisions (i.e., delivery of a command in two communication delays) by leveraging quorums composed of a majority of nodes and by exploiting workload locality. M2PAXOS does not establish command dependencies based on conflicts, instead mapping nodes to accessed objects and enforcing that commands accessing the same objects be ordered by the same node. Our experimental evaluation confirms the effectiveness of M2PAXOS, gaining up to 7X over state-of-the-art Consensus and Generalized Consensus algorithms under partitioned data accesses and up to 5.5× using the TPC-C workload.
新的多领导者共识协议利用广义共识规范来实现低延迟、均匀负载平衡和高并行性。然而,这些协议引入了具有显著性能影响的固有成本:它们需要的法定人数大于解决共识所需的最小人数,并且需要跟踪提案之间的依赖关系。在本文中,我们提出了M2PAXOS,这是一种广义共识的实现,通过利用由大多数节点组成的仲裁群体和利用工作负载局域性来提供快速决策(即,在两个通信延迟中交付命令)。M2PAXOS不基于冲突建立命令依赖关系,而是将节点映射到被访问的对象,并强制访问相同对象的命令由同一节点排序。我们的实验评估证实了M2PAXOS的有效性,在分区数据访问下,比最先进的共识和广义共识算法获得高达7倍的效率,在TPC-C工作负载下获得高达5.5倍的效率。
{"title":"Making Fast Consensus Generally Faster","authors":"Sebastiano Peluso, Alexandru Turcu, R. Palmieri, Giuliano Losa, B. Ravindran","doi":"10.1109/DSN.2016.23","DOIUrl":"https://doi.org/10.1109/DSN.2016.23","url":null,"abstract":"New multi-leader consensus protocols leverage the Generalized Consensus specification to enable low latency, even load balancing, and high parallelism. However, these protocols introduce inherent costs with significant performance impact: they need quorums bigger than the minimum required to solve consensus and need to track dependency relations among proposals. In this paper we present M2PAXOS, an implementation of Generalized Consensus that provides fast decisions (i.e., delivery of a command in two communication delays) by leveraging quorums composed of a majority of nodes and by exploiting workload locality. M2PAXOS does not establish command dependencies based on conflicts, instead mapping nodes to accessed objects and enforcing that commands accessing the same objects be ordered by the same node. Our experimental evaluation confirms the effectiveness of M2PAXOS, gaining up to 7X over state-of-the-art Consensus and Generalized Consensus algorithms under partitioned data accesses and up to 5.5× using the TPC-C workload.","PeriodicalId":102292,"journal":{"name":"2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114815500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
Don't Just BYOD, Bring-Your-Own-App Too! Protection via Virtual Micro Security Perimeters 不要只自带设备,也带上你自己的应用程序!通过虚拟微安全周界进行保护
Gabriel Salles-Loustau, Luis Garcia, Kaustubh R. Joshi, S. Zonouz
Mobile devices are increasingly becoming a melting pot of different types of data ranging from sensitive corporate documents to commercial media to personal content produced and shared via online social networks. While it is desirable for such diverse content to be accessible from the same device via a unified user experience and through a rich plethora of mobile apps, ensuring that this data remains protected has become challenging. Even though different data types have very different security and privacy needs and accidental instances of data leakage are common, today's mobile operating systems include few, if any, facilities for fine-grained data protection and isolation. In this paper, we present SWIRLS, an Android-based mobile OS that provides a rich policy-based information-flow data protection abstraction for mobile apps to support BYOD (bring-your-own-device) use cases. SWIRLS allows security and privacy policies to be attached to individual pieces of data contained in signed and encrypted capsules, and enforces these policies as the data flows through the device. Unlike current BYOD solutions like VMs and containers that create duplication and cognitive overload, SWIRLS provides a single environment that allows users to access content belonging to different security contexts using the same applications without fear of inadverdant or malicious data leakage. SWIRLS also unburdens app developers from having to worry about security policies, and provides APIs through which they can create seamless multi-security-context user interfaces. To implement it's abstractions, SWIRLS develops a cryptographically protected capsule distribution and installation scheme, enhances Taintdroid-based taint-tracking mechanisms to support efficient kernel and user-space security policy enforcement, implements techniques for persisting security context along with data, and provides transparent security-context switching mechanisms. Using our Android-based prototype (>25K LOC), we show a number of data protection use-cases such as isolation of personal and work data, limiting document sharing and preventing leakage based on document classification, and security policies based on geo-and time-fencing. Our experiments show that SWIRLS imposes a very minimal overhead in both battery consumption and performance.
移动设备正日益成为不同类型数据的大熔炉,从敏感的公司文件到商业媒体,再到通过在线社交网络制作和分享的个人内容。虽然通过统一的用户体验和丰富的移动应用程序从同一设备访问如此多样化的内容是可取的,但确保这些数据受到保护已成为一项挑战。尽管不同的数据类型具有非常不同的安全和隐私需求,并且数据泄漏的意外情况很常见,但今天的移动操作系统很少(如果有的话)包含用于细粒度数据保护和隔离的设施。在本文中,我们介绍了swils,一个基于android的移动操作系统,它为移动应用程序提供了一个丰富的基于策略的信息流数据保护抽象,以支持BYOD(自带设备)用例。swils允许将安全和隐私策略附加到包含在签名和加密胶囊中的单个数据块上,并在数据流经设备时强制执行这些策略。与当前的BYOD解决方案(如虚拟机和容器)不同,这些解决方案会造成重复和认知过载,swils提供了一个单一的环境,允许用户使用相同的应用程序访问属于不同安全上下文的内容,而不必担心无意或恶意的数据泄露。swils还使应用程序开发人员不必担心安全策略,并提供api,通过这些api,他们可以创建无缝的多安全上下文用户界面。为了实现它的抽象,SWIRLS开发了一个加密保护的胶囊分发和安装方案,增强了基于taintdroid的污染跟踪机制,以支持有效的内核和用户空间安全策略实施,实现了与数据一起持久保存安全上下文的技术,并提供透明的安全上下文切换机制。使用我们基于android的原型(>25K LOC),我们展示了许多数据保护用例,例如隔离个人和工作数据,限制文档共享和防止基于文档分类的泄漏,以及基于地理和时间隔离的安全策略。我们的实验表明,涡流在电池消耗和性能方面的开销都非常小。
{"title":"Don't Just BYOD, Bring-Your-Own-App Too! Protection via Virtual Micro Security Perimeters","authors":"Gabriel Salles-Loustau, Luis Garcia, Kaustubh R. Joshi, S. Zonouz","doi":"10.1109/DSN.2016.54","DOIUrl":"https://doi.org/10.1109/DSN.2016.54","url":null,"abstract":"Mobile devices are increasingly becoming a melting pot of different types of data ranging from sensitive corporate documents to commercial media to personal content produced and shared via online social networks. While it is desirable for such diverse content to be accessible from the same device via a unified user experience and through a rich plethora of mobile apps, ensuring that this data remains protected has become challenging. Even though different data types have very different security and privacy needs and accidental instances of data leakage are common, today's mobile operating systems include few, if any, facilities for fine-grained data protection and isolation. In this paper, we present SWIRLS, an Android-based mobile OS that provides a rich policy-based information-flow data protection abstraction for mobile apps to support BYOD (bring-your-own-device) use cases. SWIRLS allows security and privacy policies to be attached to individual pieces of data contained in signed and encrypted capsules, and enforces these policies as the data flows through the device. Unlike current BYOD solutions like VMs and containers that create duplication and cognitive overload, SWIRLS provides a single environment that allows users to access content belonging to different security contexts using the same applications without fear of inadverdant or malicious data leakage. SWIRLS also unburdens app developers from having to worry about security policies, and provides APIs through which they can create seamless multi-security-context user interfaces. To implement it's abstractions, SWIRLS develops a cryptographically protected capsule distribution and installation scheme, enhances Taintdroid-based taint-tracking mechanisms to support efficient kernel and user-space security policy enforcement, implements techniques for persisting security context along with data, and provides transparent security-context switching mechanisms. Using our Android-based prototype (>25K LOC), we show a number of data protection use-cases such as isolation of personal and work data, limiting document sharing and preventing leakage based on document classification, and security policies based on geo-and time-fencing. Our experiments show that SWIRLS imposes a very minimal overhead in both battery consumption and performance.","PeriodicalId":102292,"journal":{"name":"2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"163 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123468845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A Privacy Analysis of Google and Yandex Safe Browsing 谷歌和Yandex安全浏览的隐私分析
Thomas Gerbet, Amrit Kumar, C. Lauradoux
Google and Yandex Safe Browsing are popular services included in many web browsers to prevent users from visiting phishing or malware websites. If these services protect their users from losing private information, they also require that their servers receive browsing information on the very same users. In this paper, we analyze Google and Yandex Safe Browsing services from a privacy perspective. We quantify the privacy provided by these services by analyzing the possibility of re-identifying URLs visited by a client. We thereby challenge Google's privacy policy which claims thatGoogle cannot recover URLs visited by its users. Our analysis and experimental results show that Google and Yandex Safe Browsing canpotentially be used as a tool to track specific classes of individuals. Additionally, our investigations on the data currently included in Google and Yandex Safe Browsing provides a concrete set of URLs/domains that can be re-identified without much effort.
b谷歌和Yandex安全浏览是许多浏览器中包含的流行服务,以防止用户访问网络钓鱼或恶意软件网站。如果这些服务保护它们的用户不丢失私人信息,它们也要求它们的服务器接收同一用户的浏览信息。本文从隐私的角度分析谷歌和Yandex安全浏览服务。我们通过分析重新识别客户端访问的url的可能性来量化这些服务提供的隐私。我们因此挑战b谷歌的隐私政策,该政策声称谷歌无法恢复其用户访问的url。我们的分析和实验结果表明,谷歌和Yandex安全浏览可以作为一种工具来跟踪特定类别的个人。此外,我们对b谷歌和Yandex安全浏览中当前包含的数据的调查提供了一组可以轻松重新识别的具体url /域。
{"title":"A Privacy Analysis of Google and Yandex Safe Browsing","authors":"Thomas Gerbet, Amrit Kumar, C. Lauradoux","doi":"10.1109/DSN.2016.39","DOIUrl":"https://doi.org/10.1109/DSN.2016.39","url":null,"abstract":"Google and Yandex Safe Browsing are popular services included in many web browsers to prevent users from visiting phishing or malware websites. If these services protect their users from losing private information, they also require that their servers receive browsing information on the very same users. In this paper, we analyze Google and Yandex Safe Browsing services from a privacy perspective. We quantify the privacy provided by these services by analyzing the possibility of re-identifying URLs visited by a client. We thereby challenge Google's privacy policy which claims thatGoogle cannot recover URLs visited by its users. Our analysis and experimental results show that Google and Yandex Safe Browsing canpotentially be used as a tool to track specific classes of individuals. Additionally, our investigations on the data currently included in Google and Yandex Safe Browsing provides a concrete set of URLs/domains that can be re-identified without much effort.","PeriodicalId":102292,"journal":{"name":"2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121110577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
期刊
2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1