首页 > 最新文献

2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)最新文献

英文 中文
Message from the General Chair 主席致辞
Contie
This event is for a huge and indispensable task: an educational, inclusive, innovative and cultural IberoAmerican project towards which we want to move forward together, for a better future. The digital transformation is changing from everyday and social life, so far not only has technology and the world of work changed, but education is also changing. That is why incorporating technology into education brings a number of benefits that help improve efficiency and productivity in the classroom, as well as increase the interest of children and adolescents in academic activities.
这次活动是为了一个巨大而不可或缺的任务:一个教育、包容、创新和文化的伊比利亚美洲项目,我们希望共同前进,共创更美好的未来。数字化转型正在改变日常生活和社会生活,到目前为止,不仅技术和工作世界发生了变化,教育也在发生变化。这就是为什么将技术纳入教育带来了许多好处,有助于提高课堂效率和生产力,并增加儿童和青少年对学术活动的兴趣。
{"title":"Message from the General Chair","authors":"Contie","doi":"10.1109/dsn.2019.00005","DOIUrl":"https://doi.org/10.1109/dsn.2019.00005","url":null,"abstract":"This event is for a huge and indispensable task: an educational, inclusive, innovative and cultural IberoAmerican project towards which we want to move forward together, for a better future. The digital transformation is changing from everyday and social life, so far not only has technology and the world of work changed, but education is also changing. That is why incorporating technology into education brings a number of benefits that help improve efficiency and productivity in the classroom, as well as increase the interest of children and adolescents in academic activities.","PeriodicalId":271955,"journal":{"name":"2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115368402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Understanding and Modeling On-Die Error Correction in Modern DRAM: An Experimental Study Using Real Devices 现代DRAM晶片上纠错的理解与建模:使用真实装置的实验研究
Minesh Patel, Jeremie S. Kim, Hasan Hassan, O. Mutlu
Experimental characterization of DRAM errors is a powerful technique for understanding DRAM behavior and provides valuable insights for improving overall system performance, energy efficiency, and reliability. Unfortunately, recent DRAM technology scaling issues are forcing manufacturers to adopt on-die error-correction codes (ECC), which pose a significant challenge for DRAM error characterization studies by obfuscating raw error distributions using undocumented, proprietary, and opaque error-correction hardware. As we show in this work, errors observed in devices with on-die ECC no longer follow expected, well-studied distributions (e.g., lognormal retention times) but rather depend on the particular ECC scheme used.
DRAM错误的实验表征是理解DRAM行为的强大技术,并为提高整体系统性能、能源效率和可靠性提供了有价值的见解。不幸的是,最近的DRAM技术扩展问题迫使制造商采用片内纠错码(ECC),这对DRAM错误表征研究构成了重大挑战,因为使用未记录的、专有的和不透明的纠错硬件混淆了原始错误分布。正如我们在这项工作中所展示的,在片上ECC的设备中观察到的错误不再遵循预期的、经过充分研究的分布(例如,对数正态保持时间),而是取决于所使用的特定ECC方案。
{"title":"Understanding and Modeling On-Die Error Correction in Modern DRAM: An Experimental Study Using Real Devices","authors":"Minesh Patel, Jeremie S. Kim, Hasan Hassan, O. Mutlu","doi":"10.1109/DSN.2019.00017","DOIUrl":"https://doi.org/10.1109/DSN.2019.00017","url":null,"abstract":"Experimental characterization of DRAM errors is a powerful technique for understanding DRAM behavior and provides valuable insights for improving overall system performance, energy efficiency, and reliability. Unfortunately, recent DRAM technology scaling issues are forcing manufacturers to adopt on-die error-correction codes (ECC), which pose a significant challenge for DRAM error characterization studies by obfuscating raw error distributions using undocumented, proprietary, and opaque error-correction hardware. As we show in this work, errors observed in devices with on-die ECC no longer follow expected, well-studied distributions (e.g., lognormal retention times) but rather depend on the particular ECC scheme used.","PeriodicalId":271955,"journal":{"name":"2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124211873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 42
OneFile: A Wait-Free Persistent Transactional Memory OneFile:一个无等待的持久事务性内存
P. Ramalhete, Andreia Correia, P. Felber, Nachshon Cohen
A persistent transactional memory (PTM) library provides an easy-to-use interface to programmers for using byte-addressable non-volatile memory (NVM). Previously proposed PTMs have, so far, been blocking. We present OneFile, the first wait-free PTM with integrated wait-free memory reclamation. We have designed and implemented two variants of the OneFile, one with lock-free progress and the other with bounded wait-free progress. We additionally present software transactional memory (STM) implementations of the lock-free and wait-free algorithms targeting volatile memory. Each of our PTMs and STMs is implemented as a single C++ file with ~1,000 lines of code, making them versatile to use. Equipped with these PTMs and STMs, non-expert developers can design and implement their own lock-free and wait-free data structures on NVM, thus making lock-free programming accessible to common software developers.
持久事务性内存(PTM)库为程序员提供了一个易于使用的接口,用于使用可字节寻址的非易失性内存(NVM)。到目前为止,之前提出的ptm一直受阻。我们提出了OneFile,这是第一个集成了无等待内存回收的无等待PTM。我们设计并实现了OneFile的两种变体,一种是无锁进程,另一种是有界无等待进程。我们还提出了针对易失性存储器的无锁和无等待算法的软件事务性存储器(STM)实现。我们的每个ptm和stm都是作为一个单独的c++文件实现的,其中包含大约1000行代码,这使得它们的用途非常广泛。配备了这些ptm和stm,非专业开发人员可以在NVM上设计和实现他们自己的无锁和无等待数据结构,从而使普通软件开发人员可以使用无锁编程。
{"title":"OneFile: A Wait-Free Persistent Transactional Memory","authors":"P. Ramalhete, Andreia Correia, P. Felber, Nachshon Cohen","doi":"10.1109/DSN.2019.00028","DOIUrl":"https://doi.org/10.1109/DSN.2019.00028","url":null,"abstract":"A persistent transactional memory (PTM) library provides an easy-to-use interface to programmers for using byte-addressable non-volatile memory (NVM). Previously proposed PTMs have, so far, been blocking. We present OneFile, the first wait-free PTM with integrated wait-free memory reclamation. We have designed and implemented two variants of the OneFile, one with lock-free progress and the other with bounded wait-free progress. We additionally present software transactional memory (STM) implementations of the lock-free and wait-free algorithms targeting volatile memory. Each of our PTMs and STMs is implemented as a single C++ file with ~1,000 lines of code, making them versatile to use. Equipped with these PTMs and STMs, non-expert developers can design and implement their own lock-free and wait-free data structures on NVM, thus making lock-free programming accessible to common software developers.","PeriodicalId":271955,"journal":{"name":"2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129869355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 42
Publisher's Information 出版商的信息
{"title":"Publisher's Information","authors":"","doi":"10.1109/dsn.2019.00071","DOIUrl":"https://doi.org/10.1109/dsn.2019.00071","url":null,"abstract":"","PeriodicalId":271955,"journal":{"name":"2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124298028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research Track Program Committee 研究跟踪计划委员会
Alberto Bacchelli, Andrew Begel
Giuliano Antoniol, Polytechnique Montréal, Montréal, Canada Venera Arnaoudova, Washington State University, Pullman, USA Alberto Bacchelli, University of Zurich, Zürich, Switzerland Gabriele Bavota, Università della Svizzera Italiana, Lugano, Switzerland Andrew Begel, Microsoft, Redmond, USA John Businge, Mbarara University of Science and Technology, Mbarara, Uganda Tse-Hsun Pete Chen, Concordia University, Montréal, Canada Eun-jong Choi, Nara Institute of Science and Technology, Ikoma, Japan Andrea De Lucia, University of Salerno, Fisciano, Italy Anne Etien, University of Lille, Lille, France Dror Feitelson, Hebrew University, Jerusalem, Israel Thomas Fritz, University of Zurich, Zürich, Switzerland Carmine Gravino, University of Salerno, Fisciano, Italy Shinpei Hayashi, Tokyo Institute of Technology, Tokyo, Japan Lingxiao Jiang, Singapore Management University, Singapore Huzefa Kagdi, Wichita State University, Wichita, USA Maria Kechagia, Delft University of Technology, Delft, Netherlands Raula Gaikovina Kula, Nara Institute of Science and Technology Shinji Kusumoto, Osaka University, Osaka, Japan Li Li, Monash University, Melbourne, Australia Shane Mcintosh, McGill University, Montréal, Canada Leon Moonen, Simula Research Laboratory, Oslo, Norway Rodrigo Morales, Concordia University, Montréal, Canada Maleknaz Nayebi, Polytechnique Montréal, Montréal, Canada Christian Newman, Rochester Institute of Technology, Rochester, USA Matheus Paixao, University College London, London, UK Fabio Palomba, University of Zurich, Zürich, Switzerland Mike Papadakis, University of Luxembourg, Luxembourg City, Luxembourg Chris Parnin, North Carolina State University, Raleigh, USA Fabio Petrillo, Université du Québec à Chicoutimi, Chicoutimi, Canada Sebastian Proksch, University of Zurich, Zürich, Switzerland Chaiyong Ragkhitwetsagul, Mahidol University, Salaya, Nakhon Pathom, Thailand Paige Rodeghero, Clemson University, Clemson, USA Chanchal K. Roy, University of Saskatchewan, Saskatoon, USA Hitesh Sajnani, Microsoft, Redmond, USA Giuseppe Scanniello, University of Basilicata, Potenza, Italy Alexander Serebrenik, Eindhoven University of Technology, Eindhoven, Netherlands Janet Siegmund, University of Passau, Passau, Germany Mark Syer, Facebook, California, USA Nikolaos Tsantalis, Concordia University, Montréal, Canada Burak Turhan, Monash University, Melbourne, Australia Yan Wang, The Ohio State University, Columbus, USA Shaowei Wang, Queen’s University, Kingston, Canada Xin Xia, Monash University, Melbourne, Australia Zhenchang Xing, Australian National University, Canberra, Australia
Giuliano Antoniol, Polytechnique montracei, montracei, montracei,美国华盛顿州立大学,Pullman,美国Alberto Bacchelli,苏黎世大学,瑞士z里奇Gabriele Bavota,意大利svizzana大学,瑞士卢加诺Andrew Begel,微软,美国雷德蒙德John Businge,姆巴拉拉科技大学,乌干达姆巴拉拉,tze - hsun, Pete Chen,康考迪亚大学,加拿大蒙特里萨,奈良科学技术研究所,Ikoma,日本Andrea De Lucia,萨勒诺大学,意大利菲斯恰诺安妮·艾蒂恩,法国里尔大学,法国里尔大学,以色列里尔希伯来大学,耶路撒冷,以色列托马斯·弗里茨,苏黎世大学,瑞士z里奇,瑞士,卡迈恩·格拉维诺,萨勒诺大学,菲斯恰诺,意大利,东京工业大学,日本东京,日本凌霄江,新加坡管理大学,新加坡Huzefa Kagdi,美国威奇托州立大学,威奇托,玛丽亚·凯查吉亚,代尔夫特工业大学,荷兰代尔夫特Raula Gaikovina Kula奈良科技研究所Shinji Kusumoto大阪大学日本大阪Li Li澳大利亚墨尔本莫纳什大学Shane Mcintosh加拿大麦吉尔大学模拟研究实验室挪威奥斯陆罗德里戈莫拉莱斯加拿大康考迪亚大学蒙特里萨莫拉莱斯加拿大理工学院蒙特里萨莫拉兹纳伊比加拿大理工学院蒙特里萨莫拉兹纽曼美国罗切斯特理工学院Matheus Paixao伦敦大学学院,英国伦敦法比奥·帕隆巴,瑞士苏黎世大学,卢森堡市,卢森堡大学,迈克·帕帕达基斯,卢森堡大学,卢森堡市,卢森堡,克里斯·帕宁,美国北卡罗来纳州立大学,罗利法比奥·彼得里罗,加拿大,奇库蒂米大学,奇库蒂米,瑞士,苏黎世大学,z里奇,泰国,玛希隆大学,萨拉亚,那空,泰国,佩吉·罗德格罗,克莱姆森大学,克莱姆森,美国Chanchal K. Roy,美国萨斯喀彻温大学萨斯喀彻温大学美国Hitesh Sajnani,微软公司,美国雷德蒙德Giuseppe Scanniello,意大利巴西利卡塔大学,波坦察,意大利埃因霍温理工大学亚历山大·塞雷布雷尼克,荷兰埃因霍温理工大学珍妮特·西格蒙德,帕绍大学,德国帕绍大学Mark Syer, Facebook,加利福尼亚,美国Nikolaos Tsantalis,康考迪亚大学,蒙特里萨,加拿大Burak Turhan,莫纳什大学,墨尔本,澳大利亚王岩,俄亥俄州立大学,哥伦布,美国王少伟,金斯敦女王大学,加拿大夏欣,墨尔本莫纳什大学,澳大利亚邢振昌,澳大利亚堪培拉国立大学
{"title":"Research Track Program Committee","authors":"Alberto Bacchelli, Andrew Begel","doi":"10.1109/issre.2008.5","DOIUrl":"https://doi.org/10.1109/issre.2008.5","url":null,"abstract":"Giuliano Antoniol, Polytechnique Montréal, Montréal, Canada Venera Arnaoudova, Washington State University, Pullman, USA Alberto Bacchelli, University of Zurich, Zürich, Switzerland Gabriele Bavota, Università della Svizzera Italiana, Lugano, Switzerland Andrew Begel, Microsoft, Redmond, USA John Businge, Mbarara University of Science and Technology, Mbarara, Uganda Tse-Hsun Pete Chen, Concordia University, Montréal, Canada Eun-jong Choi, Nara Institute of Science and Technology, Ikoma, Japan Andrea De Lucia, University of Salerno, Fisciano, Italy Anne Etien, University of Lille, Lille, France Dror Feitelson, Hebrew University, Jerusalem, Israel Thomas Fritz, University of Zurich, Zürich, Switzerland Carmine Gravino, University of Salerno, Fisciano, Italy Shinpei Hayashi, Tokyo Institute of Technology, Tokyo, Japan Lingxiao Jiang, Singapore Management University, Singapore Huzefa Kagdi, Wichita State University, Wichita, USA Maria Kechagia, Delft University of Technology, Delft, Netherlands Raula Gaikovina Kula, Nara Institute of Science and Technology Shinji Kusumoto, Osaka University, Osaka, Japan Li Li, Monash University, Melbourne, Australia Shane Mcintosh, McGill University, Montréal, Canada Leon Moonen, Simula Research Laboratory, Oslo, Norway Rodrigo Morales, Concordia University, Montréal, Canada Maleknaz Nayebi, Polytechnique Montréal, Montréal, Canada Christian Newman, Rochester Institute of Technology, Rochester, USA Matheus Paixao, University College London, London, UK Fabio Palomba, University of Zurich, Zürich, Switzerland Mike Papadakis, University of Luxembourg, Luxembourg City, Luxembourg Chris Parnin, North Carolina State University, Raleigh, USA Fabio Petrillo, Université du Québec à Chicoutimi, Chicoutimi, Canada Sebastian Proksch, University of Zurich, Zürich, Switzerland Chaiyong Ragkhitwetsagul, Mahidol University, Salaya, Nakhon Pathom, Thailand Paige Rodeghero, Clemson University, Clemson, USA Chanchal K. Roy, University of Saskatchewan, Saskatoon, USA Hitesh Sajnani, Microsoft, Redmond, USA Giuseppe Scanniello, University of Basilicata, Potenza, Italy Alexander Serebrenik, Eindhoven University of Technology, Eindhoven, Netherlands Janet Siegmund, University of Passau, Passau, Germany Mark Syer, Facebook, California, USA Nikolaos Tsantalis, Concordia University, Montréal, Canada Burak Turhan, Monash University, Melbourne, Australia Yan Wang, The Ohio State University, Columbus, USA Shaowei Wang, Queen’s University, Kingston, Canada Xin Xia, Monash University, Melbourne, Australia Zhenchang Xing, Australian National University, Canberra, Australia","PeriodicalId":271955,"journal":{"name":"2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126684404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ZK-GanDef: A GAN Based Zero Knowledge Adversarial Training Defense for Neural Networks 基于GAN的神经网络零知识对抗训练防御
Guanxiong Liu, Issa M. Khalil, Abdallah Khreishah
Neural Network classifiers have been used successfully in a wide range of applications. However, their underlying assumption of attack free environment has been defied by adversarial examples. Researchers tried to develop defenses; however, existing approaches are still far from providing effective solutions to this evolving problem. In this paper, we design a generative adversarial net (GAN) based zero knowledge adversarial training defense, dubbed ZK-GanDef, which does not consume adversarial examples during training. Therefore, ZK-GanDef is not only efficient in training but also adaptive to new adversarial examples. This advantage comes at the cost of small degradation in test accuracy compared to full knowledge approaches. Our experiments show that ZK-GanDef enhances test accuracy on adversarial examples by up-to 49.17% compared to zero knowledge approaches. More importantly, its test accuracy is close to that of the state-of-the-art full knowledge approaches (maximum degradation of 8.46%), while taking much less training time.
神经网络分类器已经在广泛的应用中得到了成功的应用。然而,他们对无攻击环境的潜在假设已经被敌对的例子所推翻。研究人员试图开发防御措施;然而,现有的方法还远远不能为这一不断发展的问题提供有效的解决办法。在本文中,我们设计了一种基于生成式对抗网络(GAN)的零知识对抗训练防御,称为ZK-GanDef,它在训练过程中不消耗对抗示例。因此,ZK-GanDef不仅在训练中有效,而且对新的对抗示例也具有适应性。与全知识方法相比,这种优势是以测试精度的小下降为代价的。我们的实验表明,与零知识方法相比,ZK-GanDef在对抗样本上的测试准确率提高了49.17%。更重要的是,它的测试精度接近最先进的全知识方法(最大退化率为8.46%),而训练时间却少得多。
{"title":"ZK-GanDef: A GAN Based Zero Knowledge Adversarial Training Defense for Neural Networks","authors":"Guanxiong Liu, Issa M. Khalil, Abdallah Khreishah","doi":"10.1109/DSN.2019.00021","DOIUrl":"https://doi.org/10.1109/DSN.2019.00021","url":null,"abstract":"Neural Network classifiers have been used successfully in a wide range of applications. However, their underlying assumption of attack free environment has been defied by adversarial examples. Researchers tried to develop defenses; however, existing approaches are still far from providing effective solutions to this evolving problem. In this paper, we design a generative adversarial net (GAN) based zero knowledge adversarial training defense, dubbed ZK-GanDef, which does not consume adversarial examples during training. Therefore, ZK-GanDef is not only efficient in training but also adaptive to new adversarial examples. This advantage comes at the cost of small degradation in test accuracy compared to full knowledge approaches. Our experiments show that ZK-GanDef enhances test accuracy on adversarial examples by up-to 49.17% compared to zero knowledge approaches. More importantly, its test accuracy is close to that of the state-of-the-art full knowledge approaches (maximum degradation of 8.46%), while taking much less training time.","PeriodicalId":271955,"journal":{"name":"2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114597962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
White-Box Atomic Multicast 白盒原子组播
Alexey Gotsman, Anatole Lefort, G. Chockler
Atomic multicast is a communication primitive that delivers messages to multiple groups of processes according to some total order, with each group receiving the projection of the total order onto messages addressed to it. To be scalable, atomic multicast needs to be genuine, meaning that only the destination processes of a message should participate in ordering it. In this paper we propose a novel genuine atomic multicast protocol that in the absence of failures takes as low as 3 message delays to deliver a message when no other messages are multicast concurrently to its destination groups, and 5 message delays in the presence of concurrency. This improves the latencies of both the fault-tolerant version of classical Skeen's multicast protocol (6 or 12 message delays, depending on concurrency) and its recent improvement by Coelho et al. (4 or 8 message delays). To achieve such low latencies, we depart from the typical way of guaranteeing fault-tolerance by replicating each group with Paxos. Instead, we weave Paxos and Skeen's protocol together into a single coherent protocol, exploiting opportunities for white-box optimisations. We experimentally demonstrate that the superior theoretical characteristics of our protocol are reflected in practical performance pay-offs.
原子多播是一种通信原语,它根据某种总顺序将消息传递给多个进程组,每个进程组接收总顺序到发送给它的消息的投影。为了具有可伸缩性,原子多播需要是真实的,这意味着只有消息的目标进程应该参与对其排序。在本文中,我们提出了一种新的真正的原子组播协议,在没有故障的情况下,当没有其他消息同时组播到其目标组时,传递消息的延迟低至3个消息,并发存在时传递消息的延迟为5个消息。这提高了经典Skeen多播协议的容错版本(6或12个消息延迟,取决于并发性)和Coelho等人最近改进的延迟(4或8个消息延迟)的延迟。为了实现如此低的延迟,我们使用Paxos复制每个组,从而改变了保证容错性的典型方法。相反,我们将Paxos和Skeen的协议编织成一个单一的一致协议,利用白盒优化的机会。我们的实验证明,我们的协议优越的理论特性反映在实际的性能回报。
{"title":"White-Box Atomic Multicast","authors":"Alexey Gotsman, Anatole Lefort, G. Chockler","doi":"10.1109/DSN.2019.00030","DOIUrl":"https://doi.org/10.1109/DSN.2019.00030","url":null,"abstract":"Atomic multicast is a communication primitive that delivers messages to multiple groups of processes according to some total order, with each group receiving the projection of the total order onto messages addressed to it. To be scalable, atomic multicast needs to be genuine, meaning that only the destination processes of a message should participate in ordering it. In this paper we propose a novel genuine atomic multicast protocol that in the absence of failures takes as low as 3 message delays to deliver a message when no other messages are multicast concurrently to its destination groups, and 5 message delays in the presence of concurrency. This improves the latencies of both the fault-tolerant version of classical Skeen's multicast protocol (6 or 12 message delays, depending on concurrency) and its recent improvement by Coelho et al. (4 or 8 message delays). To achieve such low latencies, we depart from the typical way of guaranteeing fault-tolerance by replicating each group with Paxos. Instead, we weave Paxos and Skeen's protocol together into a single coherent protocol, exploiting opportunities for white-box optimisations. We experimentally demonstrate that the superior theoretical characteristics of our protocol are reflected in practical performance pay-offs.","PeriodicalId":271955,"journal":{"name":"2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121170529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A Multiversion Programming Inspired Approach to Detecting Audio Adversarial Examples 一种多版本编程启发的检测音频对抗性示例的方法
Qiang Zeng, Jianhai Su, Chenglong Fu, Golam Kayas, Lannan Luo
Adversarial examples (AEs) are crafted by adding human-imperceptible perturbations to inputs such that a machine-learning based classifier incorrectly labels them. They have become a severe threat to the trustworthiness of machine learning. While AEs in the image domain have been well studied, audio AEs are less investigated. Recently, multiple techniques are proposed to generate audio AEs, which makes countermeasures against them urgent. Our experiments show that, given an audio AE, the transcription results by Automatic Speech Recognition (ASR) systems differ significantly (that is, poor transferability), as different ASR systems use different architectures, parameters, and training datasets. Based on this fact and inspired by Multiversion Programming, we propose a novel audio AE detection approach MVP-Ears, which utilizes the diverse off-the-shelf ASRs to determine whether an audio is an AE. We build the largest audio AE dataset to our knowledge, and the evaluation shows that the detection accuracy reaches 99.88%. While transferable audio AEs are difficult to generate at this moment, they may become a reality in future. We further adapt the idea above to proactively train the detection system for coping with transferable audio AEs. Thus, the proactive detection system is one giant step ahead of attackers working on transferable AEs.
对抗性示例(ae)是通过在输入中添加人类难以察觉的扰动来制作的,这样基于机器学习的分类器就会错误地标记它们。它们对机器学习的可信度构成了严重威胁。虽然图像域的ae已经得到了很好的研究,但音频域的ae研究较少。近年来,人们提出了多种音频ae生成技术,因此对音频ae的对抗迫在眉睫。我们的实验表明,给定音频AE,自动语音识别(ASR)系统的转录结果差异很大(即可移植性差),因为不同的ASR系统使用不同的架构、参数和训练数据集。基于这一事实,并受到多版本编程的启发,我们提出了一种新的音频AE检测方法MVP-Ears,该方法利用各种现成的asr来确定音频是否为AE。我们建立了目前所知的最大的音频AE数据集,评估结果表明,检测准确率达到99.88%。虽然目前难以生成可转移的音频ae,但将来可能会成为现实。我们进一步采用上述思想来主动训练检测系统以应对可转移的音频ae。因此,主动检测系统比使用可转移AEs的攻击者领先了一大步。
{"title":"A Multiversion Programming Inspired Approach to Detecting Audio Adversarial Examples","authors":"Qiang Zeng, Jianhai Su, Chenglong Fu, Golam Kayas, Lannan Luo","doi":"10.1109/DSN.2019.00019","DOIUrl":"https://doi.org/10.1109/DSN.2019.00019","url":null,"abstract":"Adversarial examples (AEs) are crafted by adding human-imperceptible perturbations to inputs such that a machine-learning based classifier incorrectly labels them. They have become a severe threat to the trustworthiness of machine learning. While AEs in the image domain have been well studied, audio AEs are less investigated. Recently, multiple techniques are proposed to generate audio AEs, which makes countermeasures against them urgent. Our experiments show that, given an audio AE, the transcription results by Automatic Speech Recognition (ASR) systems differ significantly (that is, poor transferability), as different ASR systems use different architectures, parameters, and training datasets. Based on this fact and inspired by Multiversion Programming, we propose a novel audio AE detection approach MVP-Ears, which utilizes the diverse off-the-shelf ASRs to determine whether an audio is an AE. We build the largest audio AE dataset to our knowledge, and the evaluation shows that the detection accuracy reaches 99.88%. While transferable audio AEs are difficult to generate at this moment, they may become a reality in future. We further adapt the idea above to proactively train the detection system for coping with transferable audio AEs. Thus, the proactive detection system is one giant step ahead of attackers working on transferable AEs.","PeriodicalId":271955,"journal":{"name":"2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"384 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123355732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
Reaching Data Confidentiality and Model Accountability on the CalTrain 在加州列车上实现数据保密和模型责任
Zhongshu Gu, H. Jamjoom, D. Su, Heqing Huang, Jialong Zhang, Tengfei Ma, D. Pendarakis, Ian Molloy
Distributed collaborative learning (DCL) paradigms enable building joint machine learning models from distrusted multi-party participants. Data confidentiality is guaranteed by retaining private training data on each participant's local infrastructure. However, this approach makes today's DCL design fundamentally vulnerable to data poisoning and backdoor attacks. It limits DCL's model accountability, which is key to backtracking problematic training data instances and their responsible contributors. In this paper, we introduce CALTRAIN, a centralized collaborative learning system that simultaneously achieves data confidentiality and model accountability. CALTRAIN enforces isolated computation via secure enclaves on centrally aggregated training data to guarantee data confidentiality. To support building accountable learning models, we securely maintain the links between training instances and their contributors. Our evaluation shows that the models generated by CALTRAIN can achieve the same prediction accuracy when compared to the models trained in non-protected environments. We also demonstrate that when malicious training participants tend to implant backdoors during model training, CALTRAIN can accurately and precisely discover the poisoned or mislabeled training data that lead to the runtime mispredictions.
分布式协作学习(DCL)范式能够从不可信的多方参与者中构建联合机器学习模型。通过在每个参与者的本地基础设施上保留私人培训数据来保证数据的机密性。然而,这种方法使得今天的DCL设计从根本上容易受到数据中毒和后门攻击。它限制了DCL的模型问责制,这是回溯有问题的训练数据实例及其负责任的贡献者的关键。本文介绍了一种同时实现数据保密和模型问责的集中式协同学习系统CALTRAIN。CALTRAIN通过集中聚合的训练数据上的安全飞地强制隔离计算,以保证数据的机密性。为了支持建立负责任的学习模型,我们安全地维护训练实例和它们的贡献者之间的链接。我们的评估表明,与在非保护环境中训练的模型相比,CALTRAIN生成的模型可以达到相同的预测精度。我们还证明,当恶意的训练参与者倾向于在模型训练期间植入后门时,CALTRAIN可以准确准确地发现导致运行时错误预测的有毒或错误标记的训练数据。
{"title":"Reaching Data Confidentiality and Model Accountability on the CalTrain","authors":"Zhongshu Gu, H. Jamjoom, D. Su, Heqing Huang, Jialong Zhang, Tengfei Ma, D. Pendarakis, Ian Molloy","doi":"10.1109/DSN.2019.00044","DOIUrl":"https://doi.org/10.1109/DSN.2019.00044","url":null,"abstract":"Distributed collaborative learning (DCL) paradigms enable building joint machine learning models from distrusted multi-party participants. Data confidentiality is guaranteed by retaining private training data on each participant's local infrastructure. However, this approach makes today's DCL design fundamentally vulnerable to data poisoning and backdoor attacks. It limits DCL's model accountability, which is key to backtracking problematic training data instances and their responsible contributors. In this paper, we introduce CALTRAIN, a centralized collaborative learning system that simultaneously achieves data confidentiality and model accountability. CALTRAIN enforces isolated computation via secure enclaves on centrally aggregated training data to guarantee data confidentiality. To support building accountable learning models, we securely maintain the links between training instances and their contributors. Our evaluation shows that the models generated by CALTRAIN can achieve the same prediction accuracy when compared to the models trained in non-protected environments. We also demonstrate that when malicious training participants tend to implant backdoors during model training, CALTRAIN can accurately and precisely discover the poisoned or mislabeled training data that lead to the runtime mispredictions.","PeriodicalId":271955,"journal":{"name":"2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130955523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
SOTER: A Runtime Assurance Framework for Programming Safe Robotics Systems SOTER:编程安全机器人系统的运行时保证框架
Ankush Desai, Shromona Ghosh, S. Seshia, N. Shankar, A. Tiwari
The recent drive towards achieving greater autonomy and intelligence in robotics has led to high levels of complexity. Autonomous robots increasingly depend on third-party off-the-shelf components and complex machine-learning techniques. This trend makes it challenging to provide strong design-time certification of correct operation. To address these challenges, we present SOTER, a robotics programming framework with two key components: (1) a programming language for implementing and testing high-level reactive robotics software, and (2) an integrated runtime assurance (RTA) system that helps enable the use of uncertified components, while still providing safety guarantees. SOTER provides language primitives to declaratively construct a RTA module consisting of an advanced, high-performance controller (uncertified), a safe, lower-performance controller (certified), and the desired safety specification. The framework provides a formal guarantee that a well-formed RTA module always satisfies the safety specification, without completely sacrificing performance by using higher performance uncertified components whenever safe. SOTER allows the complex robotics software stack to be constructed as a composition of RTA modules, where each uncertified component is protected using a RTA module. To demonstrate the efficacy of our framework, we consider a real-world case-study of building a safe drone surveillance system. Our experiments both in simulation and on actual drones show that the SOTER-enabled RTA ensures the safety of the system, including when untrusted third-party components have bugs or deviate from the desired behavior.
最近在机器人技术中实现更大的自主性和智能的努力导致了高度的复杂性。自主机器人越来越依赖于第三方现成的组件和复杂的机器学习技术。这种趋势使得为正确操作提供强有力的设计时认证变得具有挑战性。为了应对这些挑战,我们提出了SOTER,一个机器人编程框架,包含两个关键组件:(1)用于实现和测试高级反应机器人软件的编程语言,以及(2)集成运行时保证(RTA)系统,该系统有助于使用未经认证的组件,同时仍提供安全保证。SOTER提供了语言原语,用于声明性地构建RTA模块,该模块由高级的高性能控制器(未认证)、安全的低性能控制器(已认证)和所需的安全规范组成。该框架提供了一种正式的保证,即格式良好的RTA模块总是满足安全规范,而不会因为在安全的情况下使用性能更高的未经认证的组件而完全牺牲性能。SOTER允许将复杂的机器人软件堆栈构建为RTA模块的组合,其中每个未经认证的组件都使用RTA模块进行保护。为了证明我们的框架的有效性,我们考虑了一个构建安全无人机监视系统的现实案例研究。我们在模拟和实际无人机上的实验表明,启用soter的RTA确保了系统的安全,包括当不受信任的第三方组件有错误或偏离预期行为时。
{"title":"SOTER: A Runtime Assurance Framework for Programming Safe Robotics Systems","authors":"Ankush Desai, Shromona Ghosh, S. Seshia, N. Shankar, A. Tiwari","doi":"10.1109/DSN.2019.00027","DOIUrl":"https://doi.org/10.1109/DSN.2019.00027","url":null,"abstract":"The recent drive towards achieving greater autonomy and intelligence in robotics has led to high levels of complexity. Autonomous robots increasingly depend on third-party off-the-shelf components and complex machine-learning techniques. This trend makes it challenging to provide strong design-time certification of correct operation. To address these challenges, we present SOTER, a robotics programming framework with two key components: (1) a programming language for implementing and testing high-level reactive robotics software, and (2) an integrated runtime assurance (RTA) system that helps enable the use of uncertified components, while still providing safety guarantees. SOTER provides language primitives to declaratively construct a RTA module consisting of an advanced, high-performance controller (uncertified), a safe, lower-performance controller (certified), and the desired safety specification. The framework provides a formal guarantee that a well-formed RTA module always satisfies the safety specification, without completely sacrificing performance by using higher performance uncertified components whenever safe. SOTER allows the complex robotics software stack to be constructed as a composition of RTA modules, where each uncertified component is protected using a RTA module. To demonstrate the efficacy of our framework, we consider a real-world case-study of building a safe drone surveillance system. Our experiments both in simulation and on actual drones show that the SOTER-enabled RTA ensures the safety of the system, including when untrusted third-party components have bugs or deviate from the desired behavior.","PeriodicalId":271955,"journal":{"name":"2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115616444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 56
期刊
2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1