首页 > 最新文献

2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)最新文献

英文 中文
Where Are You Taking Me? Behavioral Analysis of Open DNS Resolvers 你要带我去哪里?开放DNS解析器的行为分析
Jeman Park, Aminollah Khormali, Manar Mohaisen, Aziz Mohaisen
Open DNS resolvers are resolvers that perform recursive resolution on behalf of any user. They can be exploited by adversaries because they are open to the public and require no authorization to use. Therefore, it is important to understand the state of open resolvers to gauge their potentially negative impact on the security and stability of the Internet. In this study, we conducted a comprehensive probing over the entire IPv4 address space and found that more than 3 million open resolvers still exist in the wild. Moreover, we found that many of them work in a way that deviates from the standard. More importantly, we found that many open resolvers answer queries with the incorrect, even malicious, responses. Contrasting to results obtained in 2013, we found that while the number of open resolvers has decreased significantly, the number of resolvers providing incorrect responses is almost the same, while the number of open resolvers providing malicious responses has increased, highlighting the prevalence of their threat.
开放DNS解析器是代表任何用户执行递归解析的解析器。它们可能被对手利用,因为它们对公众开放,不需要授权就可以使用。因此,了解开放解析器的状态以评估它们对Internet的安全性和稳定性的潜在负面影响是很重要的。在这项研究中,我们对整个IPv4地址空间进行了全面的探测,发现仍然存在超过300万个开放的解析器。此外,我们发现它们中的许多以偏离标准的方式工作。更重要的是,我们发现许多开放解析器用不正确的,甚至是恶意的响应来回答查询。与2013年获得的结果相比,我们发现,虽然开放解析器的数量明显减少,但提供错误响应的解析器数量几乎相同,而提供恶意响应的开放解析器数量却有所增加,突显了其威胁的普遍性。
{"title":"Where Are You Taking Me? Behavioral Analysis of Open DNS Resolvers","authors":"Jeman Park, Aminollah Khormali, Manar Mohaisen, Aziz Mohaisen","doi":"10.1109/DSN.2019.00057","DOIUrl":"https://doi.org/10.1109/DSN.2019.00057","url":null,"abstract":"Open DNS resolvers are resolvers that perform recursive resolution on behalf of any user. They can be exploited by adversaries because they are open to the public and require no authorization to use. Therefore, it is important to understand the state of open resolvers to gauge their potentially negative impact on the security and stability of the Internet. In this study, we conducted a comprehensive probing over the entire IPv4 address space and found that more than 3 million open resolvers still exist in the wild. Moreover, we found that many of them work in a way that deviates from the standard. More importantly, we found that many open resolvers answer queries with the incorrect, even malicious, responses. Contrasting to results obtained in 2013, we found that while the number of open resolvers has decreased significantly, the number of resolvers providing incorrect responses is almost the same, while the number of open resolvers providing malicious responses has increased, highlighting the prevalence of their threat.","PeriodicalId":271955,"journal":{"name":"2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124245880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
POLaR: Per-Allocation Object Layout Randomization POLaR:按分配对象布局随机化
Jonghwan Kim, Daehee Jang, Yunjong Jeong, Brent Byunghoon Kang
Object Layout Randomization (OLR) is a memory randomization approach that makes unpredictable in-object memory layout by shuffling and relocating each member fields of the object. This defense approach has significant security effect for mitigating various types of memory error attacks. However, the current state-of-the-art enforces OLR while compile time. It makes diversified object layout for each binary, but the layout remains equal across the execution. This approach can be effective in case the program binary is hidden from attackers. However, there are several limitations: (i) the security efficacy is built with the premise that the binary is safely undisclosed from adversaries, (ii) the randomized object layout is identical across multiple executions, and (iii) the programmer should manually specify which objects should be affected by OLR. In this paper, we introduce Per-allocation Object Layout Randomization(POLaR): the first dynamic approach of OLR suited for public binaries. The randomization mechanism of POLaR is applied at runtime, and the randomization makes unique object layout even for the same type of instances. As a result, POLaR achieves two previously unmet security primitives. (i) The randomization does not break upon the exposure of the binary. (ii) Repeating the same attack does not result in deterministic behavior. In addition, we also implemented the TaintClass framework based on DFSan project to optimize/automate the target object selection process. To show the efficacy of POLaR, we use several public open-source software and SPEC2006 benchmark suites.
对象布局随机化(OLR)是一种内存随机化方法,它通过对对象的每个成员字段进行洗牌和重定位来实现不可预测的对象内内存布局。这种防御方法对于减轻各种类型的内存错误攻击具有显著的安全效果。然而,当前最先进的技术在编译时强制执行OLR。它使每个二进制文件的对象布局多样化,但在整个执行过程中布局保持不变。在程序二进制文件对攻击者隐藏的情况下,这种方法是有效的。然而,有几个限制:(i)安全有效性是建立在二进制文件对攻击者安全公开的前提下的,(ii)随机对象布局在多次执行中是相同的,(iii)程序员应该手动指定哪些对象应该受到OLR的影响。在本文中,我们介绍了每分配对象布局随机化(POLaR):第一种适用于公共二进制文件的OLR动态方法。POLaR的随机化机制是在运行时应用的,即使是相同类型的实例,随机化也会使对象布局独特。因此,POLaR实现了两个以前未满足的安全原语。(i)随机化不因二进制暴露而中断。重复同样的攻击不会导致确定性行为。此外,我们还实现了基于DFSan项目的TaintClass框架,以优化/自动化目标对象选择过程。为了证明POLaR的有效性,我们使用了几个公共开源软件和SPEC2006基准测试套件。
{"title":"POLaR: Per-Allocation Object Layout Randomization","authors":"Jonghwan Kim, Daehee Jang, Yunjong Jeong, Brent Byunghoon Kang","doi":"10.1109/DSN.2019.00058","DOIUrl":"https://doi.org/10.1109/DSN.2019.00058","url":null,"abstract":"Object Layout Randomization (OLR) is a memory randomization approach that makes unpredictable in-object memory layout by shuffling and relocating each member fields of the object. This defense approach has significant security effect for mitigating various types of memory error attacks. However, the current state-of-the-art enforces OLR while compile time. It makes diversified object layout for each binary, but the layout remains equal across the execution. This approach can be effective in case the program binary is hidden from attackers. However, there are several limitations: (i) the security efficacy is built with the premise that the binary is safely undisclosed from adversaries, (ii) the randomized object layout is identical across multiple executions, and (iii) the programmer should manually specify which objects should be affected by OLR. In this paper, we introduce Per-allocation Object Layout Randomization(POLaR): the first dynamic approach of OLR suited for public binaries. The randomization mechanism of POLaR is applied at runtime, and the randomization makes unique object layout even for the same type of instances. As a result, POLaR achieves two previously unmet security primitives. (i) The randomization does not break upon the exposure of the binary. (ii) Repeating the same attack does not result in deterministic behavior. In addition, we also implemented the TaintClass framework based on DFSan project to optimize/automate the target object selection process. To show the efficacy of POLaR, we use several public open-source software and SPEC2006 benchmark suites.","PeriodicalId":271955,"journal":{"name":"2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122484330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Efficient Treatment of Uncertainty in System Reliability Analysis using Importance Measures 利用重要性测度有效处理系统可靠性分析中的不确定性
H. Aliee, Faramarz Khosravi, J. Teich
The reliability of today's electronic products suffers from a growing variability of failure and ageing effects. In this paper, we investigate a technique for the efficient derivation of uncertainty distributions of system reliability. We assume that a system is composed of unreliable components whose reliabilities are modeled as probability distributions. Existing Monte Carlo (MC) simulation-based techniques, which iteratively select a sample from the probability distributions of the components, often suffer from high execution time and/or poor coverage of the sample space. To avoid the costly re-evaluation of a system reliability during MC simulation, we propose to employ the Taylor expansion of the system reliability function. Moreover, we propose a stratified sampling technique which is based on the fact that the contribution (or importance) of the components on the uncertainty of their system may not be equivalent. This technique finely/coarsely stratifies the probability distribution of the components with high/low contribution. The experimental results show that the proposed technique is more efficient and provides more accurate results compared to previously proposed techniques.
当今电子产品的可靠性受到越来越多的故障和老化影响的影响。本文研究了一种有效推导系统可靠性不确定性分布的方法。我们假设一个系统是由不可靠的组件组成的,这些组件的可靠性被建模为概率分布。现有的基于蒙特卡罗(MC)模拟的技术,迭代地从组件的概率分布中选择样本,通常存在执行时间长和/或样本空间覆盖率低的问题。为了避免在MC仿真过程中对系统可靠性进行昂贵的重新评估,我们建议采用系统可靠性函数的泰勒展开。此外,我们提出了一种分层抽样技术,该技术基于这样一个事实,即组件对其系统不确定性的贡献(或重要性)可能不相等。该技术对高/低贡献分量的概率分布进行精细/粗略的分层。实验结果表明,与已有的方法相比,该方法具有更高的效率和更精确的结果。
{"title":"Efficient Treatment of Uncertainty in System Reliability Analysis using Importance Measures","authors":"H. Aliee, Faramarz Khosravi, J. Teich","doi":"10.1109/DSN.2019.00022","DOIUrl":"https://doi.org/10.1109/DSN.2019.00022","url":null,"abstract":"The reliability of today's electronic products suffers from a growing variability of failure and ageing effects. In this paper, we investigate a technique for the efficient derivation of uncertainty distributions of system reliability. We assume that a system is composed of unreliable components whose reliabilities are modeled as probability distributions. Existing Monte Carlo (MC) simulation-based techniques, which iteratively select a sample from the probability distributions of the components, often suffer from high execution time and/or poor coverage of the sample space. To avoid the costly re-evaluation of a system reliability during MC simulation, we propose to employ the Taylor expansion of the system reliability function. Moreover, we propose a stratified sampling technique which is based on the fact that the contribution (or importance) of the components on the uncertainty of their system may not be equivalent. This technique finely/coarsely stratifies the probability distribution of the components with high/low contribution. The experimental results show that the proposed technique is more efficient and provides more accurate results compared to previously proposed techniques.","PeriodicalId":271955,"journal":{"name":"2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"258 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114421195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
NeXUS: Practical and Secure Access Control on Untrusted Storage Platforms using Client-Side SGX 使用客户端SGX的非可信存储平台上的实用和安全访问控制
J. B. Djoko, Jack Lange, Adam J. Lee
With the rising popularity of file-sharing services such as Google Drive and Dropbox in the workflows of individuals and corporations alike, the protection of client-outsourced data from unauthorized access or tampering remains a major security concern. Existing cryptographic solutions to this problem typically require server-side support, involve non-trivial key management on the part of users, and suffer from severe re-encryption penalties upon access revocations. This combination of performance overheads and management burdens makes this class of solutions undesirable in situations where performant, platform-agnostic, dynamic sharing of user content is required. We present NEXUS, a stackable filesystem that leverages trusted hardware to provide confidentiality and integrity for user files stored on untrusted platforms. NEXUS is explicitly designed to balance security, portability, and performance: it supports dynamic sharing of protected volumes on any platform exposing a file access API without requiring server-side support, enables the use of fine-grained access control policies to allow for selective sharing, and avoids the key revocation and file re-encryption overheads associated with other cryptographic approaches to access control. This combination of features is made possible by the use of a client-side Intel SGX enclave that is used to protect and share NEXUS volumes, ensuring that cryptographic keys never leave enclave memory and obviating the need to reencrypt files upon revocation of access rights. We implemented a NEXUS prototype that runs on top of the AFS filesystem and show that it incurs ×2 overhead for a variety of common file and database operations.
随着Google Drive和Dropbox等文件共享服务在个人和企业工作流程中的日益普及,保护客户外包数据免受未经授权的访问或篡改仍然是一个主要的安全问题。针对此问题的现有加密解决方案通常需要服务器端支持,涉及用户的重要密钥管理,并且在访问撤销时遭受严重的重新加密惩罚。这种性能开销和管理负担的组合使得这类解决方案不适用于需要高性能、与平台无关的动态用户内容共享的情况。我们介绍NEXUS,一个可堆叠的文件系统,它利用可信硬件为存储在不可信平台上的用户文件提供机密性和完整性。NEXUS明确地设计为平衡安全性、可移植性和性能:它支持在任何平台上动态共享受保护的卷,而不需要服务器端支持,公开文件访问API,支持使用细粒度访问控制策略以允许选择性共享,并避免与其他加密访问控制方法相关的密钥撤销和文件重新加密开销。通过使用客户端Intel SGX enclave(用于保护和共享NEXUS卷),这种功能组合成为可能,确保加密密钥永远不会离开enclave内存,并避免在撤销访问权限时重新加密文件的需要。我们实现了一个运行在AFS文件系统之上的NEXUS原型,并表明它会为各种常见的文件和数据库操作带来×2开销。
{"title":"NeXUS: Practical and Secure Access Control on Untrusted Storage Platforms using Client-Side SGX","authors":"J. B. Djoko, Jack Lange, Adam J. Lee","doi":"10.1109/DSN.2019.00049","DOIUrl":"https://doi.org/10.1109/DSN.2019.00049","url":null,"abstract":"With the rising popularity of file-sharing services such as Google Drive and Dropbox in the workflows of individuals and corporations alike, the protection of client-outsourced data from unauthorized access or tampering remains a major security concern. Existing cryptographic solutions to this problem typically require server-side support, involve non-trivial key management on the part of users, and suffer from severe re-encryption penalties upon access revocations. This combination of performance overheads and management burdens makes this class of solutions undesirable in situations where performant, platform-agnostic, dynamic sharing of user content is required. We present NEXUS, a stackable filesystem that leverages trusted hardware to provide confidentiality and integrity for user files stored on untrusted platforms. NEXUS is explicitly designed to balance security, portability, and performance: it supports dynamic sharing of protected volumes on any platform exposing a file access API without requiring server-side support, enables the use of fine-grained access control policies to allow for selective sharing, and avoids the key revocation and file re-encryption overheads associated with other cryptographic approaches to access control. This combination of features is made possible by the use of a client-side Intel SGX enclave that is used to protect and share NEXUS volumes, ensuring that cryptographic keys never leave enclave memory and obviating the need to reencrypt files upon revocation of access rights. We implemented a NEXUS prototype that runs on top of the AFS filesystem and show that it incurs ×2 overhead for a variety of common file and database operations.","PeriodicalId":271955,"journal":{"name":"2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131521218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
FabZK: Supporting Privacy-Preserving, Auditable Smart Contracts in Hyperledger Fabric FabZK:在超级账本结构中支持隐私保护、可审计的智能合约
Hui Kang, Ting Dai, Nerla Jean-Louis, S. Tao, Xiaohui Gu
On a Blockchain network, transaction data are exposed to all participants. To preserve privacy and confidentiality in transactions, while still maintaining data immutability, we design and implement FabZK. FabZK conceals transaction details on a shared ledger by storing only encrypted data from each transaction (e.g., payment amount), and by anonymizing the transactional relationship (e.g., payer and payee) between members in a Blockchain network. It achieves both privacy and auditability by supporting verifiable Pedersen commitments and constructing zero-knowledge proofs. FabZK is implemented as an extension to the open source Hyperledger Fabric. It provides APIs to easily enable data privacy in both client code and chaincode. It also supports on-demand, automated auditing based on encrypted data. Our evaluation shows that FabZK offers strong privacy-preserving capabilities, while delivering reasonable performance for the applications developed based on its framework.
在区块链网络上,交易数据向所有参与者公开。为了保护交易中的隐私和机密性,同时仍然保持数据的不变性,我们设计并实现了FabZK。FabZK通过仅存储每笔交易的加密数据(例如,支付金额),并通过匿名化区块链网络成员之间的交易关系(例如,付款人和收款人),在共享分类账上隐藏交易细节。它通过支持可验证的Pedersen承诺和构建零知识证明来实现隐私和可审计性。FabZK是作为开源Hyperledger Fabric的扩展实现的。它提供了api,可以轻松地在客户端代码和链码中启用数据隐私。它还支持基于加密数据的按需自动审计。我们的评估表明,FabZK提供了强大的隐私保护能力,同时为基于其框架开发的应用程序提供了合理的性能。
{"title":"FabZK: Supporting Privacy-Preserving, Auditable Smart Contracts in Hyperledger Fabric","authors":"Hui Kang, Ting Dai, Nerla Jean-Louis, S. Tao, Xiaohui Gu","doi":"10.1109/DSN.2019.00061","DOIUrl":"https://doi.org/10.1109/DSN.2019.00061","url":null,"abstract":"On a Blockchain network, transaction data are exposed to all participants. To preserve privacy and confidentiality in transactions, while still maintaining data immutability, we design and implement FabZK. FabZK conceals transaction details on a shared ledger by storing only encrypted data from each transaction (e.g., payment amount), and by anonymizing the transactional relationship (e.g., payer and payee) between members in a Blockchain network. It achieves both privacy and auditability by supporting verifiable Pedersen commitments and constructing zero-knowledge proofs. FabZK is implemented as an extension to the open source Hyperledger Fabric. It provides APIs to easily enable data privacy in both client code and chaincode. It also supports on-demand, automated auditing based on encrypted data. Our evaluation shows that FabZK offers strong privacy-preserving capabilities, while delivering reasonable performance for the applications developed based on its framework.","PeriodicalId":271955,"journal":{"name":"2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130961735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
SuDoku: Tolerating High-Rate of Transient Failures for Enabling Scalable STTRAM 数独:为实现可扩展的stram而容忍高速率的瞬态故障
Prashant J. Nair, Bahar Asgari, Moinuddin K. Qureshi
Conventionally, systems have relied on technology scaling to provide smaller cells, which helps in increasing the capacity of on-chip and off-chip structures. Unfortunately, scaling technology to smaller nodes causes increased susceptibility to faults. We study the problem of efficiently tolerating transient failures using scalable Spin-Transfer Torque RAM (STTRAM) as an example. At smaller feature sizes, the energy required to flip a STTRAM cell reduces, which makes these cells more susceptible to random failures caused by thermal noise. Such failures can be tolerated by periodic scrubbing and provisioning each line with Error Correction Code (ECC). However, to tolerate the desired bit-error-rate, the cache needs ECC-6 (six bit error correction) per line, incurring impractical storage overheads. Ideally, we want to tolerate these faults without relying on multi-bit ECC. We propose SuDoku, a design that provisions each line with ECC-1 and a strong error detection code, and relies on a region-based RAID-4 to perform correction of multi-bit errors. Unfortunately, simply having such a RAID-4 based architecture is ineffective at tolerating a high-rate of transient faults and provides an MTTF in the order of only a few seconds. We describe a novel data resurrection scheme that can repair multiple faulty lines in a RAID-4 region to increase the MTTF to several hours. We propose an extension of SuDoku, which hashes a given line into two regions of RAID-4 to significantly enhance reliability and increase the MTTF to trillions of hours. Our evaluations show that SuDoku provides 874x higher reliability than ECC-6, incurs 30% less storage than ECC-6, and performs within 0.1% of an ideal fault-free baseline.
传统上,系统依赖于技术缩放来提供更小的单元,这有助于增加片内和片外结构的容量。不幸的是,将技术扩展到更小的节点会增加对故障的敏感性。本文以可伸缩自旋传递扭矩RAM (STTRAM)为例,研究了有效容限瞬态故障的问题。在较小的特征尺寸下,翻转stram电池所需的能量减少,这使得这些电池更容易受到热噪声引起的随机故障的影响。这种故障可以通过定期清洗和为每条线路提供纠错码(ECC)来容忍。然而,为了容忍期望的误码率,缓存每行需要ECC-6(6位纠错),这会导致不切实际的存储开销。理想情况下,我们希望在不依赖多比特ECC的情况下容忍这些故障。我们提出了SuDoku,这是一种为每行提供ECC-1和强错误检测代码的设计,并依赖于基于区域的RAID-4来执行多比特错误的纠正。不幸的是,仅仅拥有这样一个基于RAID-4的体系结构在容忍高速率的瞬态故障方面是无效的,并且只提供几秒钟的MTTF。我们描述了一种新的数据恢复方案,可以修复RAID-4区域中的多条故障线路,将MTTF增加到几个小时。我们提出了SuDoku的扩展,它将给定的线路散列到RAID-4的两个区域,以显着提高可靠性并将MTTF增加到数万亿小时。我们的评估表明,SuDoku的可靠性比ECC-6高874倍,所需的存储比ECC-6少30%,并且在理想的无故障基线的0.1%以内执行。
{"title":"SuDoku: Tolerating High-Rate of Transient Failures for Enabling Scalable STTRAM","authors":"Prashant J. Nair, Bahar Asgari, Moinuddin K. Qureshi","doi":"10.1109/DSN.2019.00048","DOIUrl":"https://doi.org/10.1109/DSN.2019.00048","url":null,"abstract":"Conventionally, systems have relied on technology scaling to provide smaller cells, which helps in increasing the capacity of on-chip and off-chip structures. Unfortunately, scaling technology to smaller nodes causes increased susceptibility to faults. We study the problem of efficiently tolerating transient failures using scalable Spin-Transfer Torque RAM (STTRAM) as an example. At smaller feature sizes, the energy required to flip a STTRAM cell reduces, which makes these cells more susceptible to random failures caused by thermal noise. Such failures can be tolerated by periodic scrubbing and provisioning each line with Error Correction Code (ECC). However, to tolerate the desired bit-error-rate, the cache needs ECC-6 (six bit error correction) per line, incurring impractical storage overheads. Ideally, we want to tolerate these faults without relying on multi-bit ECC. We propose SuDoku, a design that provisions each line with ECC-1 and a strong error detection code, and relies on a region-based RAID-4 to perform correction of multi-bit errors. Unfortunately, simply having such a RAID-4 based architecture is ineffective at tolerating a high-rate of transient faults and provides an MTTF in the order of only a few seconds. We describe a novel data resurrection scheme that can repair multiple faulty lines in a RAID-4 region to increase the MTTF to several hours. We propose an extension of SuDoku, which hashes a given line into two regions of RAID-4 to significantly enhance reliability and increase the MTTF to trillions of hours. Our evaluations show that SuDoku provides 874x higher reliability than ECC-6, incurs 30% less storage than ECC-6, and performs within 0.1% of an ideal fault-free baseline.","PeriodicalId":271955,"journal":{"name":"2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133389280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Deep Validation: Toward Detecting Real-World Corner Cases for Deep Neural Networks 深度验证:为深度神经网络检测真实世界的角落案例
Weibin Wu, Hui Xu, Sanqiang Zhong, Michael R. Lyu, Irwin King
The exceptional performance of Deep neural networks (DNNs) encourages their deployment in safety-and dependability-critical systems. However, DNNs often demonstrate erroneous behaviors in real-world corner cases. Existing countermeasures center on improving the testing and bug-fixing practice. Unfortunately, building a bug-free DNN-based system is almost impossible currently due to its black-box nature, so anomaly detection is imperative in practice. Motivated by the idea of data validation in a traditional program, we propose and implement Deep Validation, a novel framework for detecting real-world error-inducing corner cases in a DNN-based system during runtime. We model the specifications of DNNs by resorting to their training data and cast checking input validity of DNNs as the problem of discrepancy estimation. Deep Validation achieves excellent detection results against various corner case scenarios across three popular datasets. Consequently, Deep Validation greatly complements existing efforts and is a crucial step toward building safe and dependable DNN-based systems.
深度神经网络(dnn)的卓越性能鼓励其在安全性和可靠性关键系统中的部署。然而,dnn在现实世界的极端情况下经常表现出错误的行为。现有的对策集中在改进测试和bug修复实践上。不幸的是,由于其黑箱性质,目前构建无缺陷的基于dnn的系统几乎是不可能的,因此异常检测在实践中是必不可少的。受传统程序中数据验证思想的启发,我们提出并实现了深度验证,这是一种用于在运行时检测基于dnn的系统中现实世界中诱发错误的边缘案例的新框架。我们利用深度神经网络的训练数据对其规格进行建模,并将检查深度神经网络的输入有效性作为差异估计问题。深度验证在三个流行的数据集上针对各种极端情况场景实现了出色的检测结果。因此,深度验证极大地补充了现有的努力,是构建安全可靠的基于dnn的系统的关键一步。
{"title":"Deep Validation: Toward Detecting Real-World Corner Cases for Deep Neural Networks","authors":"Weibin Wu, Hui Xu, Sanqiang Zhong, Michael R. Lyu, Irwin King","doi":"10.1109/DSN.2019.00026","DOIUrl":"https://doi.org/10.1109/DSN.2019.00026","url":null,"abstract":"The exceptional performance of Deep neural networks (DNNs) encourages their deployment in safety-and dependability-critical systems. However, DNNs often demonstrate erroneous behaviors in real-world corner cases. Existing countermeasures center on improving the testing and bug-fixing practice. Unfortunately, building a bug-free DNN-based system is almost impossible currently due to its black-box nature, so anomaly detection is imperative in practice. Motivated by the idea of data validation in a traditional program, we propose and implement Deep Validation, a novel framework for detecting real-world error-inducing corner cases in a DNN-based system during runtime. We model the specifications of DNNs by resorting to their training data and cast checking input validity of DNNs as the problem of discrepancy estimation. Deep Validation achieves excellent detection results against various corner case scenarios across three popular datasets. Consequently, Deep Validation greatly complements existing efforts and is a crucial step toward building safe and dependable DNN-based systems.","PeriodicalId":271955,"journal":{"name":"2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122275333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
ML-Based Fault Injection for Autonomous Vehicles: A Case for Bayesian Fault Injection 基于ml的自动驾驶汽车故障注入:以贝叶斯故障注入为例
Saurabh Jha, Subho Sankar Banerjee, Timothy Tsai, S. Hari, Michael B. Sullivan, Z. Kalbarczyk, S. Keckler, R. Iyer
The safety and resilience of fully autonomous vehicles (AVs) are of significant concern, as exemplified by several headline-making accidents. While AV development today involves verification, validation, and testing, end-to-end assessment of AV systems under accidental faults in realistic driving scenarios has been largely unexplored. This paper presents DriveFI, a machine learning-based fault injection engine, which can mine situations and faults that maximally impact AV safety, as demonstrated on two industry-grade AV technology stacks (from NVIDIA and Baidu). For example, DriveFI found 561 safety-critical faults in less than 4 hours. In comparison, random injection experiments executed over several weeks could not find any safety-critical faults.
完全自动驾驶汽车(av)的安全性和弹性是人们非常关注的问题,几起上了头条的事故就是一个例子。虽然目前的自动驾驶汽车开发涉及验证、验证和测试,但在现实驾驶场景中,自动驾驶系统在意外故障下的端到端评估在很大程度上尚未得到探索。本文介绍了DriveFI,一种基于机器学习的故障注入引擎,可以挖掘最大程度影响自动驾驶安全的情况和故障,并在两个工业级自动驾驶技术堆栈(来自NVIDIA和百度)上进行了演示。例如,DriveFI在不到4小时的时间内发现了561个安全关键故障。相比之下,在几周内进行的随机注射实验没有发现任何严重的安全缺陷。
{"title":"ML-Based Fault Injection for Autonomous Vehicles: A Case for Bayesian Fault Injection","authors":"Saurabh Jha, Subho Sankar Banerjee, Timothy Tsai, S. Hari, Michael B. Sullivan, Z. Kalbarczyk, S. Keckler, R. Iyer","doi":"10.1109/DSN.2019.00025","DOIUrl":"https://doi.org/10.1109/DSN.2019.00025","url":null,"abstract":"The safety and resilience of fully autonomous vehicles (AVs) are of significant concern, as exemplified by several headline-making accidents. While AV development today involves verification, validation, and testing, end-to-end assessment of AV systems under accidental faults in realistic driving scenarios has been largely unexplored. This paper presents DriveFI, a machine learning-based fault injection engine, which can mine situations and faults that maximally impact AV safety, as demonstrated on two industry-grade AV technology stacks (from NVIDIA and Baidu). For example, DriveFI found 561 safety-critical faults in less than 4 hours. In comparison, random injection experiments executed over several weeks could not find any safety-critical faults.","PeriodicalId":271955,"journal":{"name":"2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121652849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 85
Message from the Research Track Chairs 来自研究轨道主席的信息
{"title":"Message from the Research Track Chairs","authors":"","doi":"10.1109/dsn.2019.00006","DOIUrl":"https://doi.org/10.1109/dsn.2019.00006","url":null,"abstract":"","PeriodicalId":271955,"journal":{"name":"2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131374368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
[Title page iii] [标题页iii]
{"title":"[Title page iii]","authors":"","doi":"10.1109/dsn.2019.00002","DOIUrl":"https://doi.org/10.1109/dsn.2019.00002","url":null,"abstract":"","PeriodicalId":271955,"journal":{"name":"2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125433458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1