首页 > 最新文献

2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)最新文献

英文 中文
PUPPIES: Transformation-Supported Personalized Privacy Preserving Partial Image Sharing 小狗:转换支持的个性化隐私保护部分图像共享
Jianping He, Bin Liu, Deguang Kong, Xuan Bao, Na Wang, Hongxia Jin, G. Kesidis
Sharing photos through Online Social Networks is an increasingly popular fashion. However, it poses a seriousthreat to end users as private information in the photos maybe inappropriately shared with others without their consent. This paper proposes a design and implementation of a system using a dynamic privacy preserving partial image sharing technique (namely PUPPIES), which allows data owners to stipulate specific private regions (e.g., face, SSN number) in an image and correspondingly set different privacy policies for each user. As a generic technique and system, PUPPIES targets at threats about over-privileged and unauthorized sharing of photos at photo service provider (e.g., Flicker, Facebook, etc) side. To this end, PUPPIES leverages the image perturbation technique to "encrypt" the sensitive areas in the original images, and therefore it can naturally support popular image transformations (such as cropping, rotation) and is well compatible with most image processing libraries. The extensive experiments on 19,000 images demonstrate that PUPPIES is very effective for privacy protection and incurs only a small computational overhead. In addition, PUPPIES offers high flexibility for different privacy settings, and is very robust to different types of privacy attacks.
通过在线社交网络分享照片是一种越来越流行的时尚。然而,这对最终用户构成了严重的威胁,因为照片中的私人信息可能会在未经用户同意的情况下与他人不恰当地分享。本文提出了一种采用动态隐私保护部分图像共享技术(即puppy)的系统设计与实现,该技术允许数据所有者在图像中规定特定的隐私区域(如人脸、社会保险号),并为每个用户设置相应的不同隐私策略。作为一种通用技术和系统,puppy针对照片服务提供商(如Flicker, Facebook等)方面的过度特权和未经授权共享照片的威胁。为此,puppy利用图像扰动技术对原始图像中的敏感区域进行“加密”,因此它可以自然地支持流行的图像转换(如裁剪,旋转),并且与大多数图像处理库兼容。在19,000张图像上进行的大量实验表明,puppy对隐私保护非常有效,并且只产生很小的计算开销。此外,小狗为不同的隐私设置提供了很高的灵活性,并且对不同类型的隐私攻击非常健壮。
{"title":"PUPPIES: Transformation-Supported Personalized Privacy Preserving Partial Image Sharing","authors":"Jianping He, Bin Liu, Deguang Kong, Xuan Bao, Na Wang, Hongxia Jin, G. Kesidis","doi":"10.1109/DSN.2016.40","DOIUrl":"https://doi.org/10.1109/DSN.2016.40","url":null,"abstract":"Sharing photos through Online Social Networks is an increasingly popular fashion. However, it poses a seriousthreat to end users as private information in the photos maybe inappropriately shared with others without their consent. This paper proposes a design and implementation of a system using a dynamic privacy preserving partial image sharing technique (namely PUPPIES), which allows data owners to stipulate specific private regions (e.g., face, SSN number) in an image and correspondingly set different privacy policies for each user. As a generic technique and system, PUPPIES targets at threats about over-privileged and unauthorized sharing of photos at photo service provider (e.g., Flicker, Facebook, etc) side. To this end, PUPPIES leverages the image perturbation technique to \"encrypt\" the sensitive areas in the original images, and therefore it can naturally support popular image transformations (such as cropping, rotation) and is well compatible with most image processing libraries. The extensive experiments on 19,000 images demonstrate that PUPPIES is very effective for privacy protection and incurs only a small computational overhead. In addition, PUPPIES offers high flexibility for different privacy settings, and is very robust to different types of privacy attacks.","PeriodicalId":102292,"journal":{"name":"2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129081281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 46
Malware Slums: Measurement and Analysis of Malware on Traffic Exchanges 恶意软件贫民窟:流量交换中恶意软件的测量与分析
Salman Yousaf, U. Iqbal, Shehroze Farooqi, Raza Ahmad, M. Shafiq, Fareed Zaffar
Auto-surf and manual-surf traffic exchanges are an increasingly popular way of artificially generating website traffic. Previous research in this area has focused on the makeup, usage, and monetization of underground traffic exchanges. In this paper, we analyze the role of traffic exchanges as a vector for malware propagation. We conduct a measurement study of nine auto-surf and manual-surf traffic exchanges over several months. We present a first of its kind analysis of the different types of malware that are propagated through these traffic exchanges. We find that more than 26% of the URLs surfed on traffic exchanges contain malicious content. We further analyze different categories of malware encountered on traffic exchanges, including blacklisted domains, malicious JavaScript, malicious Flash, and malicious shortened URLs.
自动冲浪和手动冲浪流量交换是一种越来越流行的人工产生网站流量的方式。该领域之前的研究主要集中在地下交通交换的构成、使用和货币化上。在本文中,我们分析了流量交换作为恶意软件传播载体的作用。我们在几个月内对9个自动冲浪和手动冲浪流量交换进行了测量研究。我们首次对通过这些流量交换传播的不同类型的恶意软件进行了分析。我们发现流量交换上超过26%的url包含恶意内容。我们进一步分析了流量交换中遇到的不同类型的恶意软件,包括黑名单域名,恶意JavaScript,恶意Flash和恶意缩短url。
{"title":"Malware Slums: Measurement and Analysis of Malware on Traffic Exchanges","authors":"Salman Yousaf, U. Iqbal, Shehroze Farooqi, Raza Ahmad, M. Shafiq, Fareed Zaffar","doi":"10.1109/DSN.2016.58","DOIUrl":"https://doi.org/10.1109/DSN.2016.58","url":null,"abstract":"Auto-surf and manual-surf traffic exchanges are an increasingly popular way of artificially generating website traffic. Previous research in this area has focused on the makeup, usage, and monetization of underground traffic exchanges. In this paper, we analyze the role of traffic exchanges as a vector for malware propagation. We conduct a measurement study of nine auto-surf and manual-surf traffic exchanges over several months. We present a first of its kind analysis of the different types of malware that are propagated through these traffic exchanges. We find that more than 26% of the URLs surfed on traffic exchanges contain malicious content. We further analyze different categories of malware encountered on traffic exchanges, including blacklisted domains, malicious JavaScript, malicious Flash, and malicious shortened URLs.","PeriodicalId":102292,"journal":{"name":"2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128432736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Modeling Privacy and Tradeoffs in Multichannel Secret Sharing Protocols 多通道秘密共享协议中的隐私建模与权衡
Devin J. Pohly, P. Mcdaniel
Privacy is an important aspect of network communications, but privacy protocols require an investment of network resources. For any such protocol to be of use, we need to understand quantitatively how much privacy to expect, as well as the tradeoff between privacy and other network properties, for any given configuration of networks and parameters. We develop a practical privacy measure and protocol model for multichannel secret sharing protocols which integrates privacy and measurable network properties, deriving optimality results for the overall privacy and performance of these protocols. After proving these results, we evaluate the effectiveness of our model by providing a reference implementation and comparing its behavior to the optimality results derived from the model. In our benchmarks, the behavior of this proof-of-concept protocol matched that which is predicted by our model, furthermore, our results demonstrate the feasibility of implementing secret sharing protocols which transmit at a rate within 3-4% of optimal. This model and its results allow us to understand quantitatively the tradeoffs between privacy and network performance in secret-sharing based protocols.
隐私是网络通信的一个重要方面,但隐私协议需要投入网络资源。要使用任何这样的协议,我们需要定量地了解对于任何给定的网络和参数配置,期望有多少隐私,以及隐私和其他网络属性之间的权衡。我们为多通道秘密共享协议开发了一个实用的隐私度量和协议模型,该模型集成了隐私和可测量的网络属性,得出了这些协议的整体隐私和性能的最优结果。在证明了这些结果之后,我们通过提供参考实现并将其行为与模型派生的最优性结果进行比较来评估模型的有效性。在我们的基准测试中,该概念验证协议的行为与我们的模型预测的行为相匹配,此外,我们的结果证明了实现秘密共享协议的可行性,该协议的传输速率在最优速率的3-4%以内。该模型及其结果使我们能够定量地理解基于秘密共享的协议中隐私和网络性能之间的权衡。
{"title":"Modeling Privacy and Tradeoffs in Multichannel Secret Sharing Protocols","authors":"Devin J. Pohly, P. Mcdaniel","doi":"10.1109/DSN.2016.41","DOIUrl":"https://doi.org/10.1109/DSN.2016.41","url":null,"abstract":"Privacy is an important aspect of network communications, but privacy protocols require an investment of network resources. For any such protocol to be of use, we need to understand quantitatively how much privacy to expect, as well as the tradeoff between privacy and other network properties, for any given configuration of networks and parameters. We develop a practical privacy measure and protocol model for multichannel secret sharing protocols which integrates privacy and measurable network properties, deriving optimality results for the overall privacy and performance of these protocols. After proving these results, we evaluate the effectiveness of our model by providing a reference implementation and comparing its behavior to the optimality results derived from the model. In our benchmarks, the behavior of this proof-of-concept protocol matched that which is predicted by our model, furthermore, our results demonstrate the feasibility of implementing secret sharing protocols which transmit at a rate within 3-4% of optimal. This model and its results allow us to understand quantitatively the tradeoffs between privacy and network performance in secret-sharing based protocols.","PeriodicalId":102292,"journal":{"name":"2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128326184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
JURY: Validating Controller Actions in Software-Defined Networks 陪审团:在软件定义网络中验证控制器动作
Kshiteej S. Mahajan, Rishabh Poddar, Mohan Dhawan, V. Mann
Software-defined networks (SDNs) only logically centralize the control plane. In reality, SDN controllers are distributed entities, which may exhibit different behavior on event triggers. We identify several classes of faults that afflict an SDN controller cluster and demonstrate them on two enterprise SDN controllers, ONOS and OpenDaylight. We present JURY, a system to validate controller activities in a clustered SDN deployment, involving topological and forwarding state, without imposing any restrictions on the controller behavior. Our evaluation shows that JURY requires minimal changes to the SDN controllers for deployment, and is capable of validating controller actions in near real time with low performance overheads.
软件定义网络(sdn)仅在逻辑上集中控制平面。实际上,SDN控制器是分布式实体,它们在事件触发器上可能表现出不同的行为。我们确定了影响SDN控制器集群的几类故障,并在两个企业SDN控制器ONOS和OpenDaylight上进行了演示。我们提出了JURY,一个验证集群SDN部署中的控制器活动的系统,涉及拓扑和转发状态,而不对控制器行为施加任何限制。我们的评估表明,JURY只需对SDN控制器进行最小的更改即可进行部署,并且能够以较低的性能开销近乎实时地验证控制器操作。
{"title":"JURY: Validating Controller Actions in Software-Defined Networks","authors":"Kshiteej S. Mahajan, Rishabh Poddar, Mohan Dhawan, V. Mann","doi":"10.1109/DSN.2016.19","DOIUrl":"https://doi.org/10.1109/DSN.2016.19","url":null,"abstract":"Software-defined networks (SDNs) only logically centralize the control plane. In reality, SDN controllers are distributed entities, which may exhibit different behavior on event triggers. We identify several classes of faults that afflict an SDN controller cluster and demonstrate them on two enterprise SDN controllers, ONOS and OpenDaylight. We present JURY, a system to validate controller activities in a clustered SDN deployment, involving topological and forwarding state, without imposing any restrictions on the controller behavior. Our evaluation shows that JURY requires minimal changes to the SDN controllers for deployment, and is capable of validating controller actions in near real time with low performance overheads.","PeriodicalId":102292,"journal":{"name":"2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133420125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Kizzle: A Signature Compiler for Detecting Exploit Kits Kizzle:用于检测漏洞利用套件的签名编译器
Ben Stock, B. Livshits, B. Zorn
In recent years, the drive-by malware space has undergone significant consolidation. Today, the most common source of drive-by downloads are so-called exploit kits (EKs). This paper presents Kizzle, the first prevention technique specifically designed for finding exploit kits. Our analysis shows that while the JavaScript delivered by kits varies greatly, the unpacked code varies much less, due to the kits authors' code reuse between versions. Ironically, this well-regarded software engineering practice allows us to build a scalable and precise detector that is able to quickly respond to superficial but frequent changes in EKs. Kizzle is able to generate anti-virus signatures for detecting EKs, which compare favorably to manually created ones. Kizzle is highly responsive and can generate new signatures within hours. Our experiments show that Kizzle produces high-accuracy signatures. When evaluated over a four-week period, false-positive rates for Kizzle are under 0.03%, while the false-negative rates are under 5%.
近年来,恶意软件领域经历了重大整合。今天,最常见的免费下载来源是所谓的漏洞利用工具包(EKs)。本文介绍了Kizzle,这是第一个专门用于查找漏洞利用工具包的预防技术。我们的分析表明,虽然由工具包交付的JavaScript变化很大,但由于工具包作者在不同版本之间重用代码,解包代码的变化要小得多。具有讽刺意味的是,这种备受推崇的软件工程实践使我们能够构建一个可扩展且精确的检测器,能够快速响应EKs中表面但频繁的变化。Kizzle能够生成用于检测EKs的反病毒签名,这比手动创建的签名更有利。Kizzle反应迅速,可以在几个小时内生成新的签名。我们的实验表明,Kizzle可以产生高精度的签名。在为期四周的评估中,Kizzle的假阳性率低于0.03%,而假阴性率低于5%。
{"title":"Kizzle: A Signature Compiler for Detecting Exploit Kits","authors":"Ben Stock, B. Livshits, B. Zorn","doi":"10.1109/DSN.2016.48","DOIUrl":"https://doi.org/10.1109/DSN.2016.48","url":null,"abstract":"In recent years, the drive-by malware space has undergone significant consolidation. Today, the most common source of drive-by downloads are so-called exploit kits (EKs). This paper presents Kizzle, the first prevention technique specifically designed for finding exploit kits. Our analysis shows that while the JavaScript delivered by kits varies greatly, the unpacked code varies much less, due to the kits authors' code reuse between versions. Ironically, this well-regarded software engineering practice allows us to build a scalable and precise detector that is able to quickly respond to superficial but frequent changes in EKs. Kizzle is able to generate anti-virus signatures for detecting EKs, which compare favorably to manually created ones. Kizzle is highly responsive and can generate new signatures within hours. Our experiments show that Kizzle produces high-accuracy signatures. When evaluated over a four-week period, false-positive rates for Kizzle are under 0.03%, while the false-negative rates are under 5%.","PeriodicalId":102292,"journal":{"name":"2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129123396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Balancing Security and Performance for Agility in Dynamic Threat Environments 在动态威胁环境中平衡安全性和性能以实现敏捷性
M. Winterrose, K. Carter, Neal Wagner, W. Streilein
In cyber security, achieving the desired balance between system security and system performance in dynamic threat environments is a long-standing open challenge for cyber defenders. Typically an increase in system security comes at the price of decreased system performance, and vice versa, easily resulting in systems that are misaligned to operator specified requirements for system security and performance as the threat environment evolves. We develop an online, reinforcement learning based methodology to automatically discover and maintain desired operating postures in security-performance space even as the threat environment changes. We demonstrate the utility of our approach and discover parameters enabling an agile response to a dynamic adversary in a simulated security game involving prototype cyber moving target defenses.
在网络安全中,在动态威胁环境中实现系统安全和系统性能之间的理想平衡是网络防御者长期面临的挑战。通常,系统安全性的提高是以降低系统性能为代价的,反之亦然,随着威胁环境的发展,很容易导致系统与操作员指定的系统安全性和性能需求不一致。我们开发了一种基于在线强化学习的方法,即使在威胁环境发生变化的情况下,也能自动发现和维持安全性能空间中所需的操作姿势。我们展示了我们的方法的实用性,并发现了在涉及原型网络移动目标防御的模拟安全游戏中能够对动态对手做出敏捷响应的参数。
{"title":"Balancing Security and Performance for Agility in Dynamic Threat Environments","authors":"M. Winterrose, K. Carter, Neal Wagner, W. Streilein","doi":"10.1109/DSN.2016.61","DOIUrl":"https://doi.org/10.1109/DSN.2016.61","url":null,"abstract":"In cyber security, achieving the desired balance between system security and system performance in dynamic threat environments is a long-standing open challenge for cyber defenders. Typically an increase in system security comes at the price of decreased system performance, and vice versa, easily resulting in systems that are misaligned to operator specified requirements for system security and performance as the threat environment evolves. We develop an online, reinforcement learning based methodology to automatically discover and maintain desired operating postures in security-performance space even as the threat environment changes. We demonstrate the utility of our approach and discover parameters enabling an agile response to a dynamic adversary in a simulated security game involving prototype cyber moving target defenses.","PeriodicalId":102292,"journal":{"name":"2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132153100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Dynamic Scalable State Machine Replication 动态可伸缩状态机复制
Long Hoang Le, Carlos Eduardo Benevides Bezerra, F. Pedone
State machine replication (SMR) is a well-known technique that guarantees strong consistency (i.e., linearizability) to online services. In SMR, client commands are executed in the same order on all server replicas: after executing each command, every replica reaches the same state. However, SMR lacks scalability: every replica executes all commands, so adding servers does not increase the maximum throughput. Scalable SMR (S-SMR) addresses this problem by partitioning the service state, allowing commands to execute only in some replicas, providing scalability while still ensuring linearizability. One problem is that ssmr quickly saturates when executing multi-partition commands, as partitions must communicate. Dynamic S-SMR (DS-SMR) solves this issue by repartitioning the state dynamically, based on the workload. Variables that are usually accessed together are moved to the same partition, which significantly improves scalability. We evaluate the performance of DS-SMR with a scalable social network application.
状态机复制(SMR)是一种众所周知的技术,它保证了在线服务的强一致性(即线性化)。在SMR中,客户端命令在所有服务器副本上以相同的顺序执行:执行每个命令后,每个副本都达到相同的状态。但是,SMR缺乏可伸缩性:每个副本执行所有命令,因此添加服务器不会增加最大吞吐量。可伸缩SMR (S-SMR)通过对服务状态进行分区来解决这个问题,允许命令仅在某些副本中执行,在提供可伸缩性的同时仍然确保线性化。一个问题是,在执行多分区命令时,ssmr很快饱和,因为分区必须通信。动态S-SMR (DS-SMR)通过基于工作负载动态地重新划分状态来解决这个问题。通常一起访问的变量被移动到同一个分区,这大大提高了可伸缩性。我们用一个可扩展的社交网络应用来评估DS-SMR的性能。
{"title":"Dynamic Scalable State Machine Replication","authors":"Long Hoang Le, Carlos Eduardo Benevides Bezerra, F. Pedone","doi":"10.1109/DSN.2016.11","DOIUrl":"https://doi.org/10.1109/DSN.2016.11","url":null,"abstract":"State machine replication (SMR) is a well-known technique that guarantees strong consistency (i.e., linearizability) to online services. In SMR, client commands are executed in the same order on all server replicas: after executing each command, every replica reaches the same state. However, SMR lacks scalability: every replica executes all commands, so adding servers does not increase the maximum throughput. Scalable SMR (S-SMR) addresses this problem by partitioning the service state, allowing commands to execute only in some replicas, providing scalability while still ensuring linearizability. One problem is that ssmr quickly saturates when executing multi-partition commands, as partitions must communicate. Dynamic S-SMR (DS-SMR) solves this issue by repartitioning the state dynamically, based on the workload. Variables that are usually accessed together are moved to the same partition, which significantly improves scalability. We evaluate the performance of DS-SMR with a scalable social network application.","PeriodicalId":102292,"journal":{"name":"2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129250059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Power-Capping Aware Checkpointing: On the Interplay Among Power-Capping, Temperature, Reliability, Performance, and Energy 功率封顶感知检查点:功率封顶、温度、可靠性、性能和能量之间的相互作用
Kun Tang, Devesh Tiwari, Saurabh Gupta, Ping Huang, Q. Lu, C. Engelmann, Xubin He
Checkpoint and restart mechanisms have been widely used in large scientific simulation applications to make forward progress in case of failures. However, none of the prior works have considered the interaction of power-constraint with temperature, reliability, performance, and checkpointing interval. It is not clear how power-capping may affect optimal checkpointing interval. What are the involved reliability, performance, and energy trade-offs? In this paper, we develop a deep understanding about the interaction between power-capping and scientific applications using checkpoint/restart as resilience mechanism, and propose a new model for the optimal checkpointing interval (OCI) under power-capping. Our study reveals several interesting, and previously unknown, insights about how power-capping affects the reliability, energy consumption, performance.
检查点和重启机制已广泛应用于大型科学模拟应用中,以在故障情况下继续前进。然而,之前的研究都没有考虑功率约束与温度、可靠性、性能和检查点间隔的相互作用。目前尚不清楚功率封顶如何影响最佳检查点间隔。涉及到的可靠性、性能和能源权衡是什么?本文以检查点/重新启动作为弹性机制,深入理解了功率封顶与科学应用之间的相互作用,并提出了功率封顶下最优检查点间隔(OCI)的新模型。我们的研究揭示了一些有趣的、以前不为人知的关于功率上限如何影响可靠性、能耗和性能的见解。
{"title":"Power-Capping Aware Checkpointing: On the Interplay Among Power-Capping, Temperature, Reliability, Performance, and Energy","authors":"Kun Tang, Devesh Tiwari, Saurabh Gupta, Ping Huang, Q. Lu, C. Engelmann, Xubin He","doi":"10.1109/DSN.2016.36","DOIUrl":"https://doi.org/10.1109/DSN.2016.36","url":null,"abstract":"Checkpoint and restart mechanisms have been widely used in large scientific simulation applications to make forward progress in case of failures. However, none of the prior works have considered the interaction of power-constraint with temperature, reliability, performance, and checkpointing interval. It is not clear how power-capping may affect optimal checkpointing interval. What are the involved reliability, performance, and energy trade-offs? In this paper, we develop a deep understanding about the interaction between power-capping and scientific applications using checkpoint/restart as resilience mechanism, and propose a new model for the optimal checkpointing interval (OCI) under power-capping. Our study reveals several interesting, and previously unknown, insights about how power-capping affects the reliability, energy consumption, performance.","PeriodicalId":102292,"journal":{"name":"2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134350679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
期刊
2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1