首页 > 最新文献

IEEE Transactions on Emerging Topics in Computing最新文献

英文 中文
Fully Parallel, One-Cycle Random Shuffling for Efficient Countermeasure Against Side Channel Attack and Its Complexity Verification 一种有效对抗侧信道攻击的全并行单周期随机洗牌算法及其复杂度验证
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-10-17 DOI: 10.1109/TETC.2024.3478228
Jong-Yeon Park;Dongsoo Lee;Seonggyeom Kim;Wonil Lee;Bo Gyeong Kang;Kouichi Sakurai
Hiding countermeasures are the most widely utilized techniques for thwarting side-channel attacks. Commonly, the Fisher-Yates algorithm is adopted in hiding countermeasures with permuted operation for its security and efficiency in implementation, yet the inherently sequential nature of the algorithm imposes limitations on hardware acceleration. In this work, we propose a novel method named Addition Round Rotation ($mathsf {ARR}$), which can introduce a time-area trade-off with block-based permutation. Our findings indicate that this approach can achieve a permutation brute force complexity level ranging from $2^{128}$, with the modified version achieving up to $2^{288}$ in a single clock cycle, while maintaining substantial resistance against second-order analysis. To substantiate the security of our proposed method, we introduce a new validation technique – Identity Verification. This technique allows theoretical validation of the proposed algorithm’s security and is consistent with the experimental results. Finally, we introduce an actual hardware design and provide the implementation results on Application-Specific Integrated Circuit (ASIC). The measured performance demonstrates that our proposal fully supports the practical applicability.
隐藏对抗是最广泛使用的技术,以挫败侧信道攻击。通常采用Fisher-Yates算法来隐藏具有排列操作的对抗措施,以提高其安全性和实现效率,但该算法固有的顺序性对硬件加速施加了限制。在这项工作中,我们提出了一种名为Addition Round Rotation ($mathsf {ARR}$)的新方法,该方法可以与基于块的排列引入时区权衡。我们的研究结果表明,这种方法可以实现从$2^{128}$的排列蛮力复杂度水平,修改后的版本在单个时钟周期内达到$2^{288}$,同时保持对二阶分析的显著抵抗。为了验证所提出方法的安全性,我们引入了一种新的验证技术——身份验证。该技术可以从理论上验证所提出算法的安全性,并与实验结果相一致。最后介绍了一个实际的硬件设计,并给出了在专用集成电路(ASIC)上的实现结果。实测性能表明,我们的方案完全支持实际应用。
{"title":"Fully Parallel, One-Cycle Random Shuffling for Efficient Countermeasure Against Side Channel Attack and Its Complexity Verification","authors":"Jong-Yeon Park;Dongsoo Lee;Seonggyeom Kim;Wonil Lee;Bo Gyeong Kang;Kouichi Sakurai","doi":"10.1109/TETC.2024.3478228","DOIUrl":"https://doi.org/10.1109/TETC.2024.3478228","url":null,"abstract":"Hiding countermeasures are the most widely utilized techniques for thwarting side-channel attacks. Commonly, the Fisher-Yates algorithm is adopted in hiding countermeasures with permuted operation for its security and efficiency in implementation, yet the inherently sequential nature of the algorithm imposes limitations on hardware acceleration. In this work, we propose a novel method named Addition Round Rotation (<inline-formula><tex-math>$mathsf {ARR}$</tex-math></inline-formula>), which can introduce a time-area trade-off with block-based permutation. Our findings indicate that this approach can achieve a permutation brute force complexity level ranging from <inline-formula><tex-math>$2^{128}$</tex-math></inline-formula>, with the modified version achieving up to <inline-formula><tex-math>$2^{288}$</tex-math></inline-formula> in a single clock cycle, while maintaining substantial resistance against second-order analysis. To substantiate the security of our proposed method, we introduce a new validation technique – <i>Identity Verification</i>. This technique allows theoretical validation of the proposed algorithm’s security and is consistent with the experimental results. Finally, we introduce an actual hardware design and provide the implementation results on Application-Specific Integrated Circuit (ASIC). The measured performance demonstrates that our proposal fully supports the practical applicability.","PeriodicalId":13156,"journal":{"name":"IEEE Transactions on Emerging Topics in Computing","volume":"13 3","pages":"669-685"},"PeriodicalIF":5.4,"publicationDate":"2024-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145050804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Edge-Based Live Learning for Robot Survival 基于边缘的机器人生存实时学习
IF 5.1 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-10-17 DOI: 10.1109/TETC.2024.3479082
Eric Sturzinger;Jan Harkes;Padmanabhan Pillai;Mahadev Satyanarayanan
We introduce survival-critical machine learning (SCML), in which a robot encounters dynamically evolving threats that it recognizes via machine learning (ML), and then neutralizes. We model survivability in SCML, and show the value of the recently developed approach of Live Learning. This edge-based ML technique embodies an iterative human-in-the-loop workflow that concurrently enlarges the training set, trains the next model in a sequence of “best-so-far” models, and performs inferencing for both threat detection and pseudo-labeling. We present experimental results using datasets from the domains of drone surveillance, planetary exploration, and underwater sensing to quantify the effectiveness of Live Learning as a mechanism for SCML.
我们介绍了生存关键机器学习(SCML),其中机器人遇到动态发展的威胁,它通过机器学习(ML)识别,然后消除。我们对SCML中的生存能力进行了建模,并展示了最近开发的实时学习方法的价值。这种基于边缘的机器学习技术体现了一个迭代的人在循环工作流,它同时扩大了训练集,在一系列“迄今为止最好”的模型中训练下一个模型,并对威胁检测和伪标记进行推理。我们使用无人机监视、行星探测和水下传感领域的数据集来展示实验结果,以量化现场学习作为SCML机制的有效性。
{"title":"Edge-Based Live Learning for Robot Survival","authors":"Eric Sturzinger;Jan Harkes;Padmanabhan Pillai;Mahadev Satyanarayanan","doi":"10.1109/TETC.2024.3479082","DOIUrl":"https://doi.org/10.1109/TETC.2024.3479082","url":null,"abstract":"We introduce <italic>survival-critical machine learning (SCML),</i> in which a robot encounters dynamically evolving threats that it recognizes via machine learning (ML), and then neutralizes. We model survivability in SCML, and show the value of the recently developed approach of <italic>Live Learning.</i> This edge-based ML technique embodies an iterative human-in-the-loop workflow that concurrently enlarges the training set, trains the next model in a sequence of “best-so-far” models, and performs inferencing for both threat detection and pseudo-labeling. We present experimental results using datasets from the domains of drone surveillance, planetary exploration, and underwater sensing to quantify the effectiveness of Live Learning as a mechanism for SCML.","PeriodicalId":13156,"journal":{"name":"IEEE Transactions on Emerging Topics in Computing","volume":"13 1","pages":"34-47"},"PeriodicalIF":5.1,"publicationDate":"2024-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10721342","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143570674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
X-RAFT: Improve RAFT Consensus to Make Blockchain Better Secure EdgeAI-Human-IoT Data X-RAFT:改进RAFT共识,使区块链更安全的edge - ai - human - iot数据
IF 5.1 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-10-16 DOI: 10.1109/TETC.2024.3472059
Fengqi Li;Jiaheng Wang;Weilin Xie;Ning Tong;Deguang Wang
The proliferation of IoT devices, advancements in edge computing, and innovations in AI technology have created an ideal environment for the birth and growth of Edge AI. With the trend towards the Internet of Everything (IoE), the EdgeAI- Human-IoT architectural framework highlights the necessity for efficient data exchange interconnectivity. Ensuring secure data sharing and efficient data storage are pivotal challenges in achieving seamless data interconnection. Owing to its simplicity, ease of deployment, and consensus-reaching capabilities, the RAFT consensus algorithm, which is commonly used in distributed storage, faces limitations as the IoT scale expands. The computational, communication, and storage capabilities of nodes are constraints, and the security of data remains a concern. To address these complex challenges, we introduce the X-RAFT consensus algorithm, which is tailored for blockchain technology. This algorithm enhances system performance and robustness, mitigates the impact of system load, enhances system sustainability, and increases Byzantine fault tolerance. Through analysis and simulations, our proposed solution has been evidenced to provide reliable security and efficient performance.
物联网设备的激增、边缘计算的进步以及人工智能技术的创新为边缘人工智能的诞生和发展创造了理想的环境。随着万物互联(IoE)的发展趋势,EdgeAI- Human-IoT架构框架强调了高效数据交换互联的必要性。确保安全的数据共享和高效的数据存储是实现数据无缝互联的关键挑战。通常用于分布式存储的RAFT共识算法由于其简单、易于部署和达成共识的能力,随着物联网规模的扩大而面临限制。节点的计算、通信和存储能力受到限制,数据的安全性仍然是一个问题。为了解决这些复杂的挑战,我们引入了为区块链技术量身定制的X-RAFT共识算法。该算法提高了系统的性能和鲁棒性,减轻了系统负载的影响,增强了系统的可持续性,增加了拜占庭容错性。通过分析和仿真,证明了该方案具有可靠的安全性和高效的性能。
{"title":"X-RAFT: Improve RAFT Consensus to Make Blockchain Better Secure EdgeAI-Human-IoT Data","authors":"Fengqi Li;Jiaheng Wang;Weilin Xie;Ning Tong;Deguang Wang","doi":"10.1109/TETC.2024.3472059","DOIUrl":"https://doi.org/10.1109/TETC.2024.3472059","url":null,"abstract":"The proliferation of IoT devices, advancements in edge computing, and innovations in AI technology have created an ideal environment for the birth and growth of Edge AI. With the trend towards the Internet of Everything (IoE), the EdgeAI- Human-IoT architectural framework highlights the necessity for efficient data exchange interconnectivity. Ensuring secure data sharing and efficient data storage are pivotal challenges in achieving seamless data interconnection. Owing to its simplicity, ease of deployment, and consensus-reaching capabilities, the RAFT consensus algorithm, which is commonly used in distributed storage, faces limitations as the IoT scale expands. The computational, communication, and storage capabilities of nodes are constraints, and the security of data remains a concern. To address these complex challenges, we introduce the X-RAFT consensus algorithm, which is tailored for blockchain technology. This algorithm enhances system performance and robustness, mitigates the impact of system load, enhances system sustainability, and increases Byzantine fault tolerance. Through analysis and simulations, our proposed solution has been evidenced to provide reliable security and efficient performance.","PeriodicalId":13156,"journal":{"name":"IEEE Transactions on Emerging Topics in Computing","volume":"13 1","pages":"22-33"},"PeriodicalIF":5.1,"publicationDate":"2024-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143570701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
QuripfeNet: Quantum-Resistant IPFE-Based Neural Network QuripfeNet:量子抗ipfe神经网络
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-10-14 DOI: 10.1109/TETC.2024.3479193
KyungHyun Han;Wai-Kong Lee;Angshuman Karmakar;Myung-Kyu Yi;Seong Oun Hwang
In order to protect the sensitive information in many applications involving neural networks, several privacy-preserving neural networks that operate on encrypted data have been developed. Unfortunately, existing encryption-based privacy-preserving neural networks are mainly built on classical cryptography primitives, which are not secure from the threat of quantum computing. In this paper, we propose the first quantum-resistant solution to protect neural network inferences based on an inner-product functional encryption scheme. The selected state-of-the-art functional encryption scheme based on lattice-based cryptography works with integer-type inputs, which is not directly compatible with neural network computations that operate in the floating point domain. We propose a polynomial-based secure convolution layer to allow a neural network to resolve this problem, along with a technique that reduces memory consumption. The proposed solution, named QuripfeNet, was applied in LeNet-5 and evaluated using the MNIST dataset. In a single-threaded implementation (CPU), QuripfeNet took 107.4 seconds for an inference to classify one image, achieving accuracy of 97.85%, which is very close to the unencrypted version. Additionally, the GPU-optimized QuripfeNet took 25.9 seconds to complete the same task, which is improved by 4.15× compared to the CPU version.
为了在许多涉及神经网络的应用中保护敏感信息,人们开发了几种基于加密数据的隐私保护神经网络。不幸的是,现有的基于加密的隐私保护神经网络主要建立在经典的密码原语上,这在量子计算的威胁下是不安全的。在本文中,我们提出了第一个基于内积函数加密方案的保护神经网络推理的抗量子解决方案。选择最先进的功能加密方案基于基于格的加密工作与整数型输入,这是不直接兼容的神经网络计算,操作在浮点域。我们提出了一个基于多项式的安全卷积层,允许神经网络解决这个问题,以及一种减少内存消耗的技术。提出的解决方案名为QuripfeNet,已在LeNet-5中应用,并使用MNIST数据集进行了评估。在单线程实现(CPU)中,QuripfeNet对一个图像进行分类的推理耗时107.4秒,准确率达到97.85%,非常接近未加密的版本。此外,gpu优化的QuripfeNet完成同样的任务需要25.9秒,比CPU版本提高了4.15倍。
{"title":"QuripfeNet: Quantum-Resistant IPFE-Based Neural Network","authors":"KyungHyun Han;Wai-Kong Lee;Angshuman Karmakar;Myung-Kyu Yi;Seong Oun Hwang","doi":"10.1109/TETC.2024.3479193","DOIUrl":"https://doi.org/10.1109/TETC.2024.3479193","url":null,"abstract":"In order to protect the sensitive information in many applications involving neural networks, several privacy-preserving neural networks that operate on encrypted data have been developed. Unfortunately, existing encryption-based privacy-preserving neural networks are mainly built on classical cryptography primitives, which are not secure from the threat of quantum computing. In this paper, we propose the first quantum-resistant solution to protect neural network inferences based on an inner-product functional encryption scheme. The selected state-of-the-art functional encryption scheme based on lattice-based cryptography works with integer-type inputs, which is not directly compatible with neural network computations that operate in the floating point domain. We propose a polynomial-based secure convolution layer to allow a neural network to resolve this problem, along with a technique that reduces memory consumption. The proposed solution, named QuripfeNet, was applied in LeNet-5 and evaluated using the MNIST dataset. In a single-threaded implementation (CPU), QuripfeNet took 107.4 seconds for an inference to classify one image, achieving accuracy of 97.85%, which is very close to the unencrypted version. Additionally, the GPU-optimized QuripfeNet took 25.9 seconds to complete the same task, which is improved by 4.15× compared to the CPU version.","PeriodicalId":13156,"journal":{"name":"IEEE Transactions on Emerging Topics in Computing","volume":"13 3","pages":"640-653"},"PeriodicalIF":5.4,"publicationDate":"2024-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145051084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Pip-SW: Pipeline Architectures for Accelerating Smith-Waterman Algorithm on FPGA Platforms Pip-SW: FPGA平台上加速Smith-Waterman算法的流水线架构
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-10-11 DOI: 10.1109/TETC.2024.3472649
Mahmood Kalemati;Ali Dehghan Nayeri;Somayyeh Koohi
The Smith-Waterman algorithm, which is founded on a dynamic programming approach, serves as a precise tool for aligning biological sequences. Despite its utility, the algorithm grapples with computational complexity and resource demands. Various implementations across multi-core, GPU, and FPGA platforms have sought to expedite the algorithm, yet frequently encounter issues such as suboptimal speedup, heightened reliance on external memory resources, and an exclusive focus on the forward step of the algorithm. To tackle these challenges, this study introduces an architecture aimed at accelerating the Smith-Waterman algorithm on FPGA platforms. Our architecture capitalizes on a pipeline structure that integrates optimized circuitry for parallel computations and employs memory allocation techniques, thus delivering an efficient, low power and cost-effective implementation for biological sequence alignment. Our assessments, coupled with comparisons against alternative FPGA implementations supporting protein sequence alignment, reveal a 17% increase in operating frequency and a 17% enhancement in Giga cell updates per second. Moreover, our approach competes with GPU-based solutions, showcasing comparable performance metrics alongside superior energy efficiency, with a 35% improvement. We substantiate the utility and performance of our pipeline architecture on FPGA platforms using four benchmark datasets. The validation results demonstrate a speedup ranging from 10 to 45 times for alignment score computation compared to the CPU platform.
史密斯-沃特曼算法建立在动态规划方法的基础上,是一种精确的生物序列比对工具。尽管它很实用,但该算法与计算复杂性和资源需求有关。跨多核、GPU和FPGA平台的各种实现都试图加快算法的速度,但经常遇到诸如次优加速、对外部内存资源的高度依赖以及只关注算法的前进步骤等问题。为了应对这些挑战,本研究引入了一种旨在加速FPGA平台上Smith-Waterman算法的架构。我们的架构利用管道结构,集成了并行计算的优化电路,并采用内存分配技术,从而为生物序列比对提供高效,低功耗和经济高效的实现。我们的评估,再加上与支持蛋白质序列比对的其他FPGA实现的比较,显示工作频率提高了17%,每秒千兆细胞更新速度提高了17%。此外,我们的方法与基于gpu的解决方案竞争,展示了可比的性能指标和卓越的能源效率,提高了35%。我们使用四个基准数据集在FPGA平台上证实了我们的管道架构的实用性和性能。验证结果表明,与CPU平台相比,校准分数计算的速度提高了10到45倍。
{"title":"Pip-SW: Pipeline Architectures for Accelerating Smith-Waterman Algorithm on FPGA Platforms","authors":"Mahmood Kalemati;Ali Dehghan Nayeri;Somayyeh Koohi","doi":"10.1109/TETC.2024.3472649","DOIUrl":"https://doi.org/10.1109/TETC.2024.3472649","url":null,"abstract":"The Smith-Waterman algorithm, which is founded on a dynamic programming approach, serves as a precise tool for aligning biological sequences. Despite its utility, the algorithm grapples with computational complexity and resource demands. Various implementations across multi-core, GPU, and FPGA platforms have sought to expedite the algorithm, yet frequently encounter issues such as suboptimal speedup, heightened reliance on external memory resources, and an exclusive focus on the forward step of the algorithm. To tackle these challenges, this study introduces an architecture aimed at accelerating the Smith-Waterman algorithm on FPGA platforms. Our architecture capitalizes on a pipeline structure that integrates optimized circuitry for parallel computations and employs memory allocation techniques, thus delivering an efficient, low power and cost-effective implementation for biological sequence alignment. Our assessments, coupled with comparisons against alternative FPGA implementations supporting protein sequence alignment, reveal a 17% increase in operating frequency and a 17% enhancement in Giga cell updates per second. Moreover, our approach competes with GPU-based solutions, showcasing comparable performance metrics alongside superior energy efficiency, with a 35% improvement. We substantiate the utility and performance of our pipeline architecture on FPGA platforms using four benchmark datasets. The validation results demonstrate a speedup ranging from 10 to 45 times for alignment score computation compared to the CPU platform.","PeriodicalId":13156,"journal":{"name":"IEEE Transactions on Emerging Topics in Computing","volume":"13 3","pages":"628-639"},"PeriodicalIF":5.4,"publicationDate":"2024-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145050811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
(In)security of Stream Ciphers Against Quantum Annealing Attacks on the Example of the Grain 128 and Grain 128a Ciphers 流密码抗量子退火攻击的安全性——以128粒和128a粒密码为例
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-10-11 DOI: 10.1109/TETC.2024.3474856
Michał Wroński;Elżbieta Burek;Mateusz Leśniak
The security level of a cipher is a key parameter. While general-purpose quantum computers significantly threaten modern symmetric ciphers, other quantum approaches like quantum annealing have been less concerning. However, this paper argues that a quantum annealer specifically designed to attack Grain 128 and Grain 128a ciphers could soon be technologically feasible. Such an annealer would require 5,751 (6,761) qubits and 77,496 (94,865) couplers, with a qubit connectivity of 225 (245). This work also shows that modern stream ciphers like Grain 128 and Grain 128a may be vulnerable to quantum annealing attacks. Although the exact complexity of quantum annealing is unknown, heuristic estimates suggest that for many problems with $N$ variables, a $sqrt{N}$ exponential advantage over simulated annealing may hold. We detail how to transform algebraic attacks on Grain ciphers into the QUBO problem, making our attack potentially more efficient than classical brute-force methods. We demonstrate that applying our attack to rescaled Grain cipher versions, Grain $l$ and Grain $la$, overtakes brute-force and Grover’s attacks for sufficiently large $l$, assuming quantum annealing’s exponential benefit over simulated annealing.
密码的安全级别是一个关键参数。虽然通用量子计算机严重威胁到现代对称密码,但量子退火等其他量子方法却不那么引人关注。然而,本文认为,专门设计用于攻击Grain 128和Grain 128a密码的量子退火器在技术上可能很快就会实现。这样的退火炉需要5751(6761)个量子比特和77496(94865)个耦合器,量子比特连接性为225(245)个。这项工作还表明,像Grain 128和Grain 128a这样的现代流密码可能容易受到量子退火攻击。虽然量子退火的确切复杂性是未知的,启发式估计表明,对于许多具有$N$变量的问题,$sqrt{N}$指数优势可能优于模拟退火。我们详细介绍了如何将对颗粒密码的代数攻击转换为QUBO问题,使我们的攻击可能比经典的暴力破解方法更有效。我们证明,将我们的攻击应用于重新缩放的Grain密码版本,Grain $l$和Grain $la$,可以在足够大的$l$上超越蛮力和Grover的攻击,假设量子退火比模拟退火具有指数级的优势。
{"title":"(In)security of Stream Ciphers Against Quantum Annealing Attacks on the Example of the Grain 128 and Grain 128a Ciphers","authors":"Michał Wroński;Elżbieta Burek;Mateusz Leśniak","doi":"10.1109/TETC.2024.3474856","DOIUrl":"https://doi.org/10.1109/TETC.2024.3474856","url":null,"abstract":"The security level of a cipher is a key parameter. While general-purpose quantum computers significantly threaten modern symmetric ciphers, other quantum approaches like quantum annealing have been less concerning. However, this paper argues that a quantum annealer specifically designed to attack Grain 128 and Grain 128a ciphers could soon be technologically feasible. Such an annealer would require 5,751 (6,761) qubits and 77,496 (94,865) couplers, with a qubit connectivity of 225 (245). This work also shows that modern stream ciphers like Grain 128 and Grain 128a may be vulnerable to quantum annealing attacks. Although the exact complexity of quantum annealing is unknown, heuristic estimates suggest that for many problems with <inline-formula><tex-math>$N$</tex-math></inline-formula> variables, a <inline-formula><tex-math>$sqrt{N}$</tex-math></inline-formula> exponential advantage over simulated annealing may hold. We detail how to transform algebraic attacks on Grain ciphers into the QUBO problem, making our attack potentially more efficient than classical brute-force methods. We demonstrate that applying our attack to rescaled Grain cipher versions, Grain <inline-formula><tex-math>$l$</tex-math></inline-formula> and Grain <inline-formula><tex-math>$la$</tex-math></inline-formula>, overtakes brute-force and Grover’s attacks for sufficiently large <inline-formula><tex-math>$l$</tex-math></inline-formula>, assuming quantum annealing’s exponential benefit over simulated annealing.","PeriodicalId":13156,"journal":{"name":"IEEE Transactions on Emerging Topics in Computing","volume":"13 3","pages":"614-627"},"PeriodicalIF":5.4,"publicationDate":"2024-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145051023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cost-Effective Software Rejuvenation Combining Time-Based and Inspection-Based Policies 结合基于时间和基于检查策略的高性价比软件复兴
IF 5.1 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-10-11 DOI: 10.1109/TETC.2024.3475214
Laura Carnevali;Marco Paolieri;Riccardo Reali;Leonardo Scommegna;Enrico Vicario
Software rejuvenation is a proactive maintenance technique that counteracts software aging by restarting a system, making selection of rejuvenation times critical to improve reliability without incurring excessive downtime costs. Various stochastic models of Software Aging and Rejuvenation (SAR) have been developed, mostly having an underlying stochastic process in the class of Continuous Time Markov Chains (CTMCs), Semi-Markov Processes (SMPs), and Markov Regenerative Processes (MRGPs) under the enabling restriction, requiring that at most one general (GEN), i.e., non-Exponential, timer be enabled in each state. We present a SAR model with an underlying MRGP under the bounded regeneration restriction, allowing for multiple GEN timers to be concurrently enabled in each state. This expressivity gain not only supports more accurate fitting of duration distributions from observed statistics, but also enables the definition of mixed rejuvenation strategies combining time-based and inspection-based policies, where the time to the next inspection or rejuvenation depends on the outcomes of diagnostic tests. Experimental results show that replacing GEN timers with Exponential timers with the same mean (to satisfy the enabling restriction) yields inaccurate rejuvenation policies, and that mixed rejuvenation outperforms time-based rejuvenation in maximizing reliability, though at the cost of an acceptable decrease in availability.
软件恢复是一种主动维护技术,通过重新启动系统来抵消软件老化,使恢复时间的选择至关重要,以提高可靠性,而不会产生过多的停机成本。软件老化与再生(SAR)的各种随机模型已经被开发出来,大多数在使能限制下具有连续时间马尔可夫链(ctmc),半马尔可夫过程(SMPs)和马尔可夫再生过程(MRGPs)类的潜在随机过程,要求在每个状态下最多启用一个通用(GEN),即非指数定时器。在有限再生限制下,我们提出了一个具有底层MRGP的SAR模型,允许在每个状态下并发启用多个GEN计时器。这种表达性增益不仅支持从观察到的统计数据中更准确地拟合持续时间分布,而且还可以定义结合基于时间和基于检查的策略的混合恢复策略,其中下一次检查或恢复的时间取决于诊断测试的结果。实验结果表明,将GEN定时器替换为具有相同平均值的指数定时器(以满足使能限制)会产生不准确的恢复策略,混合恢复在最大化可靠性方面优于基于时间的恢复,尽管代价是可用性的可接受降低。
{"title":"Cost-Effective Software Rejuvenation Combining Time-Based and Inspection-Based Policies","authors":"Laura Carnevali;Marco Paolieri;Riccardo Reali;Leonardo Scommegna;Enrico Vicario","doi":"10.1109/TETC.2024.3475214","DOIUrl":"https://doi.org/10.1109/TETC.2024.3475214","url":null,"abstract":"Software rejuvenation is a proactive maintenance technique that counteracts software aging by restarting a system, making selection of rejuvenation times critical to improve reliability without incurring excessive downtime costs. Various stochastic models of Software Aging and Rejuvenation (SAR) have been developed, mostly having an underlying stochastic process in the class of Continuous Time Markov Chains (CTMCs), Semi-Markov Processes (SMPs), and Markov Regenerative Processes (MRGPs) under the enabling restriction, requiring that at most one general (GEN), i.e., non-Exponential, timer be enabled in each state. We present a SAR model with an underlying MRGP under the bounded regeneration restriction, allowing for multiple GEN timers to be concurrently enabled in each state. This expressivity gain not only supports more accurate fitting of duration distributions from observed statistics, but also enables the definition of mixed rejuvenation strategies combining time-based and inspection-based policies, where the time to the next inspection or rejuvenation depends on the outcomes of diagnostic tests. Experimental results show that replacing GEN timers with Exponential timers with the same mean (to satisfy the enabling restriction) yields inaccurate rejuvenation policies, and that mixed rejuvenation outperforms time-based rejuvenation in maximizing reliability, though at the cost of an acceptable decrease in availability.","PeriodicalId":13156,"journal":{"name":"IEEE Transactions on Emerging Topics in Computing","volume":"13 2","pages":"354-369"},"PeriodicalIF":5.1,"publicationDate":"2024-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10715525","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144323147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Prediction Technique for Federated Learning 一种新的联邦学习预测技术
IF 5.1 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-10-10 DOI: 10.1109/TETC.2024.3471458
Cláudio G. S. Capanema;Allan M. de Souza;Joahannes B. D. da Costa;Fabrício A. Silva;Leandro A. Villas;Antonio A. F. Loureiro
Researchers have studied how to improve Federated Learning (FL) in various areas, such as statistical and system heterogeneity, communication cost, and privacy. So far, most of the proposed solutions are either very tied to the application context or complex to be broadly reproduced in real-life applications involving humans. Developing modular solutions that can be leveraged by the vast majority of FL structures and are independent of the application people use is the new research direction opened by this paper. In this work, we propose a plugin (named FedPredict) to address three problems simultaneously: data heterogeneity, low performance of new/untrained and/or outdated clients, and communication cost. We do so mainly by combining global and local parameters (which brings generalization and personalization) in the inference step while adapting layer selection and matrix factorization techniques to reduce the downlink communication cost (server to client). Due to its simplicity, it can be applied to federated learning of different number of topologies. Results show that adding the proposed plugin to a given FL solution can significantly reduce the downlink communication cost by up to 83.3% and improve accuracy by up to 304% compared to the original solution.
研究人员已经研究了如何在统计和系统异质性、通信成本和隐私等各个领域改进联邦学习(FL)。到目前为止,大多数建议的解决方案要么与应用程序上下文密切相关,要么复杂到无法在涉及人类的实际应用程序中广泛复制。开发可被绝大多数FL结构所利用并且独立于人们使用的应用程序的模块化解决方案是本文开辟的新的研究方向。在这项工作中,我们提出了一个插件(名为FedPredict)来同时解决三个问题:数据异构,新/未经培训和/或过时客户端的低性能,以及通信成本。我们主要通过在推理步骤中结合全局和局部参数(这带来了泛化和个性化)来实现这一目标,同时采用层选择和矩阵分解技术来降低下行通信成本(服务器到客户端)。由于其简单性,它可以应用于不同数量拓扑的联合学习。结果表明,将所提出的插件添加到给定的FL解决方案中,与原始解决方案相比,可以显着降低高达83.3%的下行通信成本,并提高高达304%的精度。
{"title":"A Novel Prediction Technique for Federated Learning","authors":"Cláudio G. S. Capanema;Allan M. de Souza;Joahannes B. D. da Costa;Fabrício A. Silva;Leandro A. Villas;Antonio A. F. Loureiro","doi":"10.1109/TETC.2024.3471458","DOIUrl":"https://doi.org/10.1109/TETC.2024.3471458","url":null,"abstract":"Researchers have studied how to improve Federated Learning (FL) in various areas, such as statistical and system heterogeneity, communication cost, and privacy. So far, most of the proposed solutions are either very tied to the application context or complex to be broadly reproduced in real-life applications involving humans. Developing modular solutions that can be leveraged by the vast majority of FL structures and are independent of the application people use is the new research direction opened by this paper. In this work, we propose a plugin (named FedPredict) to address three problems simultaneously: data heterogeneity, low performance of new/untrained and/or outdated clients, and communication cost. We do so mainly by combining global and local parameters (which brings generalization and personalization) in the inference step while adapting layer selection and matrix factorization techniques to reduce the downlink communication cost (server to client). Due to its simplicity, it can be applied to federated learning of different number of topologies. Results show that adding the proposed plugin to a given FL solution can significantly reduce the downlink communication cost by up to 83.3% and improve accuracy by up to 304% compared to the original solution.","PeriodicalId":13156,"journal":{"name":"IEEE Transactions on Emerging Topics in Computing","volume":"13 1","pages":"5-21"},"PeriodicalIF":5.1,"publicationDate":"2024-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143570650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FedRDF: A Robust and Dynamic Aggregation Function Against Poisoning Attacks in Federated Learning FedRDF:联盟学习中抵御中毒攻击的稳健动态聚合函数
IF 5.1 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-10-10 DOI: 10.1109/TETC.2024.3474484
Enrique Mármol Campos;Aurora Gonzalez-Vidal;José L. Hernández-Ramos;Antonio Skarmeta
Federated Learning (FL) represents a promising approach to typical privacy concerns associated with centralized Machine Learning (ML) deployments. Despite its well-known advantages, FL is vulnerable to security attacks such as Byzantine behaviors and poisoning attacks, which can significantly degrade model performance and hinder convergence. The effectiveness of existing approaches to mitigate complex attacks, such as median, trimmed mean, or Krum aggregation functions, has been only partially demonstrated in the case of specific attacks. Our study introduces a novel robust aggregation mechanism utilizing the Fourier Transform (FT), which is able to effectively handle sophisticated attacks without prior knowledge of the number of attackers. Employing this data technique, weights generated by FL clients are projected into the frequency domain to ascertain their density function, selecting the one exhibiting the highest frequency. Consequently, malicious clients’ weights are excluded. Our proposed approach was tested against various model poisoning attacks, demonstrating superior performance over state-of-the-art aggregation methods.
联邦学习(FL)代表了一种很有前途的方法,可以解决与集中式机器学习(ML)部署相关的典型隐私问题。尽管具有众所周知的优势,但FL很容易受到拜占庭行为和中毒攻击等安全攻击,这可能会大大降低模型的性能并阻碍收敛。现有方法的有效性,以减轻复杂的攻击,如中值,修剪平均,或克鲁姆聚集函数,只在特定的攻击的情况下部分证明。我们的研究引入了一种利用傅里叶变换(FT)的新型鲁棒聚合机制,该机制能够有效地处理复杂的攻击,而无需事先了解攻击者的数量。利用这种数据技术,将FL客户端产生的权重投影到频域以确定其密度函数,选择频率最高的权重。因此,排除了恶意客户端的权重。我们提出的方法针对各种模型中毒攻击进行了测试,显示出优于最先进的聚合方法的性能。
{"title":"FedRDF: A Robust and Dynamic Aggregation Function Against Poisoning Attacks in Federated Learning","authors":"Enrique Mármol Campos;Aurora Gonzalez-Vidal;José L. Hernández-Ramos;Antonio Skarmeta","doi":"10.1109/TETC.2024.3474484","DOIUrl":"https://doi.org/10.1109/TETC.2024.3474484","url":null,"abstract":"Federated Learning (FL) represents a promising approach to typical privacy concerns associated with centralized Machine Learning (ML) deployments. Despite its well-known advantages, FL is vulnerable to security attacks such as Byzantine behaviors and poisoning attacks, which can significantly degrade model performance and hinder convergence. The effectiveness of existing approaches to mitigate complex attacks, such as median, trimmed mean, or Krum aggregation functions, has been only partially demonstrated in the case of specific attacks. Our study introduces a novel robust aggregation mechanism utilizing the Fourier Transform (FT), which is able to effectively handle sophisticated attacks without prior knowledge of the number of attackers. Employing this data technique, weights generated by FL clients are projected into the frequency domain to ascertain their density function, selecting the one exhibiting the highest frequency. Consequently, malicious clients’ weights are excluded. Our proposed approach was tested against various model poisoning attacks, demonstrating superior performance over state-of-the-art aggregation methods.","PeriodicalId":13156,"journal":{"name":"IEEE Transactions on Emerging Topics in Computing","volume":"13 1","pages":"48-67"},"PeriodicalIF":5.1,"publicationDate":"2024-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10713851","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143570755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Federated Learning Approach for Collaborative and Secure Smart Healthcare Applications 用于协作和安全智能医疗保健应用程序的联邦学习方法
IF 5.1 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-10-10 DOI: 10.1109/TETC.2024.3473911
Quy Vu Khanh;Abdellah Chehri;Van Anh Dang;Quy Nguyen Minh
Across all periods of human history, the importance attributed to health has remained a fundamental and significant facet. This statement holds greater validity within the present context. The pressing demand for healthcare solutions with real-time capabilities, affordability, and high precision is crucial in medical research and technology progress. In recent times, there has been a significant advancement in emerging technologies such as AI, IoT, blockchain, and edge computing. These breakthrough developments have led to the creation of various intelligent applications. Smart healthcare applications can be realized by combining robust AI detection and prediction capabilities with edge computing architecture, which offers low computing costs and latency. In this paper, we begin by conducting a literature review of AI-assisted EC-based smart healthcare applications from the past three years. Our goal is to identify gaps and barriers in this field. We propose a smart healthcare architecture model that integrates AI technology into the edge. Finally, we summarize the challenges and research directions associated with the proposed model.
在人类历史的各个时期,健康的重要性一直是一个基本和重要的方面。这句话在当前上下文中更有效。对具有实时功能、可负担性和高精度的医疗保健解决方案的迫切需求对医学研究和技术进步至关重要。近年来,人工智能、物联网、区块链、边缘计算等新兴技术取得了重大进展。这些突破性的发展导致了各种智能应用的产生。通过将强大的AI检测和预测功能与边缘计算架构相结合,可以实现智能医疗保健应用,从而降低计算成本和延迟。在本文中,我们首先对过去三年人工智能辅助的基于ec的智能医疗保健应用进行了文献综述。我们的目标是确定这一领域的差距和障碍。我们提出了一个将人工智能技术集成到边缘的智能医疗架构模型。最后,总结了该模型面临的挑战和研究方向。
{"title":"Federated Learning Approach for Collaborative and Secure Smart Healthcare Applications","authors":"Quy Vu Khanh;Abdellah Chehri;Van Anh Dang;Quy Nguyen Minh","doi":"10.1109/TETC.2024.3473911","DOIUrl":"https://doi.org/10.1109/TETC.2024.3473911","url":null,"abstract":"Across all periods of human history, the importance attributed to health has remained a fundamental and significant facet. This statement holds greater validity within the present context. The pressing demand for healthcare solutions with real-time capabilities, affordability, and high precision is crucial in medical research and technology progress. In recent times, there has been a significant advancement in emerging technologies such as AI, IoT, blockchain, and edge computing. These breakthrough developments have led to the creation of various intelligent applications. Smart healthcare applications can be realized by combining robust AI detection and prediction capabilities with edge computing architecture, which offers low computing costs and latency. In this paper, we begin by conducting a literature review of AI-assisted EC-based smart healthcare applications from the past three years. Our goal is to identify gaps and barriers in this field. We propose a smart healthcare architecture model that integrates AI technology into the edge. Finally, we summarize the challenges and research directions associated with the proposed model.","PeriodicalId":13156,"journal":{"name":"IEEE Transactions on Emerging Topics in Computing","volume":"13 1","pages":"68-79"},"PeriodicalIF":5.1,"publicationDate":"2024-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143570756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Transactions on Emerging Topics in Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1