首页 > 最新文献

Operating Systems Review (ACM)最新文献

英文 中文
Towards Provable Timing-Channel Prevention 可证明时信道预防
Q3 Computer Science Pub Date : 2020-08-31 DOI: 10.1145/3421473.3421475
G. Heiser, Toby C. Murray, G. Klein
We describe our ongoing research that aims to eliminate microarchitectural timing channels through time protection, which eliminates the root cause of these channels, competition for capacity-limited hardware resources. A proof-ofconcept implementation of time protection demonstrated the approach can be effective a nd l ow o verhead, b ut also that present hardware fails to support the approach in some aspects and that we need an improved hardXare-software contract to achieve real security. We have demonstrated that these mechanisms are not hard to provide, and are working on their inclusion in the RISC-V ISA. Assuming compliant hardware, we outline how we think we can then formally prove that timing channels are eliminated.
我们描述了我们正在进行的研究,旨在通过时间保护消除微架构定时通道,这消除了这些通道的根本原因,即对容量有限的硬件资源的竞争。时间保护的概念验证实现表明该方法可以有效且开销低,但也表明当前的硬件在某些方面无法支持该方法,并且我们需要改进硬件-软件合同以实现真正的安全性。我们已经证明,这些机制并不难提供,并且正在努力将其纳入RISC-V ISA。假设硬件兼容,我们概述了我们认为如何正式证明时序通道被消除。
{"title":"Towards Provable Timing-Channel Prevention","authors":"G. Heiser, Toby C. Murray, G. Klein","doi":"10.1145/3421473.3421475","DOIUrl":"https://doi.org/10.1145/3421473.3421475","url":null,"abstract":"We describe our ongoing research that aims to eliminate microarchitectural timing channels through time protection, which eliminates the root cause of these channels, competition for capacity-limited hardware resources. A proof-ofconcept implementation of time protection demonstrated the approach can be effective a nd l ow o verhead, b ut also that present hardware fails to support the approach in some aspects and that we need an improved hardXare-software contract to achieve real security. We have demonstrated that these mechanisms are not hard to provide, and are working on their inclusion in the RISC-V ISA. Assuming compliant hardware, we outline how we think we can then formally prove that timing channels are eliminated.","PeriodicalId":38935,"journal":{"name":"Operating Systems Review (ACM)","volume":"54 1","pages":"1 - 7"},"PeriodicalIF":0.0,"publicationDate":"2020-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1145/3421473.3421475","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47151735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Verifiable state machines 可验证状态机
Q3 Computer Science Pub Date : 2020-08-31 DOI: 10.1145/3421473.3421479
Srinath T. V. Setty, Sebastian Angel, Jonathan Lee
This article describes recent progress in realizing verifiable state machines, a primitive that enables untrusted services to provide cryptographic proofs that they operate correctly. Applications of this primitive range from proving the correct operation of distributed and concurrent cloud services to reducing blockchain transaction costs by leveraging inexpensive off-chain computation without trust.
本文描述了在实现可验证状态机方面的最新进展,这是一种使不受信任的服务能够提供其正确操作的加密证明的原语。该原语的应用范围从证明分布式和并发云服务的正确操作到通过在不信任的情况下利用廉价的链下计算来降低区块链交易成本。
{"title":"Verifiable state machines","authors":"Srinath T. V. Setty, Sebastian Angel, Jonathan Lee","doi":"10.1145/3421473.3421479","DOIUrl":"https://doi.org/10.1145/3421473.3421479","url":null,"abstract":"This article describes recent progress in realizing verifiable state machines, a primitive that enables untrusted services to provide cryptographic proofs that they operate correctly. Applications of this primitive range from proving the correct operation of distributed and concurrent cloud services to reducing blockchain transaction costs by leveraging inexpensive off-chain computation without trust.","PeriodicalId":38935,"journal":{"name":"Operating Systems Review (ACM)","volume":"54 1","pages":"40 - 46"},"PeriodicalIF":0.0,"publicationDate":"2020-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1145/3421473.3421479","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46931109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
überSpark: Practical, Provable, End-to-End Guarantees on Commodity Heterogenous Interconnected Computing Platforms 实用的,可证明的,对商品异构互联计算平台的端到端保证
Q3 Computer Science Pub Date : 2020-08-31 DOI: 10.1145/3421473.3421476
Amit Vasudevan, Petros Maniatis, R. Martins
Today’s computing ecosystem, comprising commodity heterogeneous interconnected computing (CHIC) platforms, is increasingly being employed for critical applications, consequently demanding fairly strong end-to-end assurances. However, the generality and system complexity of today’s CHIC stack seem to outpace existing tools and methodologies towards provable end-to-end guarantees. This paper describes our on-going research, and presents überSpark†, a system architecture that argues for structuring the CHIC stack around Universal Object Abstractions (üobjects), a fundamental system abstraction and building block towards practical and provable end-to-end guarantees. überSpark is designed to be realizable on heterogeneous hardware platforms with disparate capabilities, and facilitates compositional end-to-end reasoning and efficient implementation. überSpark also supports the use of multiple verification techniques towards properties of different flavors, for development compatible, incremental verification, co-existing and meshing with unverified components, at a fine granularity, and wide applicability to all layers of the CHIC stack. We discuss the CHIC stack challenges, illustrate our design decisions, describe the überSpark architecture, present our foundational steps, and outline on-going and future research activities. We anticipate überSpark to retrofit and unlock a wide range of unprecedented end-to-end provable guarantees on today’s continuously evolving CHIC stack.
今天的计算生态系统,包括商品异构互联计算(CHIC)平台,越来越多地被用于关键应用程序,因此需要相当强大的端到端保证。然而,当今CHIC堆栈的通用性和系统复杂性似乎超过了现有的工具和方法,以实现可证明的端到端保证。本文描述了我们正在进行的研究,并介绍了 berspark†,一个系统架构,它争论围绕通用对象抽象(对象)构建CHIC堆栈,这是一个基本的系统抽象和构建块,用于实用和可证明的端到端保证。 berspark设计为可在具有不同功能的异构硬件平台上实现,并促进组合端到端推理和高效实现。 berspark还支持对不同风格的属性使用多种验证技术,以实现开发兼容,增量验证,与未验证的组件共存和网格化,具有精细的粒度,并且广泛适用于CHIC堆栈的所有层。我们讨论了CHIC栈的挑战,说明了我们的设计决策,描述了 berspark架构,介绍了我们的基本步骤,并概述了正在进行和未来的研究活动。我们预计 berspark将在当今不断发展的CHIC堆栈上改造并解锁一系列前所未有的端到端可证明的保证。
{"title":"überSpark: Practical, Provable, End-to-End Guarantees on Commodity Heterogenous Interconnected Computing Platforms","authors":"Amit Vasudevan, Petros Maniatis, R. Martins","doi":"10.1145/3421473.3421476","DOIUrl":"https://doi.org/10.1145/3421473.3421476","url":null,"abstract":"Today’s computing ecosystem, comprising commodity heterogeneous interconnected computing (CHIC) platforms, is increasingly being employed for critical applications, consequently demanding fairly strong end-to-end assurances. However, the generality and system complexity of today’s CHIC stack seem to outpace existing tools and methodologies towards provable end-to-end guarantees. This paper describes our on-going research, and presents überSpark†, a system architecture that argues for structuring the CHIC stack around Universal Object Abstractions (üobjects), a fundamental system abstraction and building block towards practical and provable end-to-end guarantees. überSpark is designed to be realizable on heterogeneous hardware platforms with disparate capabilities, and facilitates compositional end-to-end reasoning and efficient implementation. überSpark also supports the use of multiple verification techniques towards properties of different flavors, for development compatible, incremental verification, co-existing and meshing with unverified components, at a fine granularity, and wide applicability to all layers of the CHIC stack. We discuss the CHIC stack challenges, illustrate our design decisions, describe the überSpark architecture, present our foundational steps, and outline on-going and future research activities. We anticipate überSpark to retrofit and unlock a wide range of unprecedented end-to-end provable guarantees on today’s continuously evolving CHIC stack.","PeriodicalId":38935,"journal":{"name":"Operating Systems Review (ACM)","volume":"54 1","pages":"8-22"},"PeriodicalIF":0.0,"publicationDate":"2020-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1145/3421473.3421476","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"64034127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Noninterference specifications for secure systems 安全系统的抗干扰规范
Q3 Computer Science Pub Date : 2020-08-31 DOI: 10.1145/3421473.3421478
Luke Nelson, James Bornholt, A. Krishnamurthy, E. Torlak, Xi Wang
This paper presents an analysis of noninterference specifications used in a range of formally verified systems. The main findings are that these systems use distinct specifications and that they often employ small variations, both complicating their security implications. We categorize these specifications and discuss their trade-offs for reasoning about information flows in systems.
本文分析了一系列正式验证系统中使用的非干扰规范。主要发现是,这些系统使用不同的规范,并且经常使用小的变化,这两种情况都使其安全影响复杂化。我们对这些规范进行了分类,并讨论了它们在系统中信息流推理中的权衡。
{"title":"Noninterference specifications for secure systems","authors":"Luke Nelson, James Bornholt, A. Krishnamurthy, E. Torlak, Xi Wang","doi":"10.1145/3421473.3421478","DOIUrl":"https://doi.org/10.1145/3421473.3421478","url":null,"abstract":"This paper presents an analysis of noninterference specifications used in a range of formally verified systems. The main findings are that these systems use distinct specifications and that they often employ small variations, both complicating their security implications. We categorize these specifications and discuss their trade-offs for reasoning about information flows in systems.","PeriodicalId":38935,"journal":{"name":"Operating Systems Review (ACM)","volume":"54 1","pages":"31 - 39"},"PeriodicalIF":0.0,"publicationDate":"2020-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1145/3421473.3421478","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47621083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
RCU Usage In the Linux Kernel Linux内核中的RCU使用情况
Q3 Computer Science Pub Date : 2020-08-31 DOI: 10.1145/3421473.3421481
P. McKenney, Joel Fernandes, Silas Boyd-Wickizer, J. Walpole
Read-copy update (RCU) is a scalable high-performance synchronization mechanism implemented in the Linux kernel. RCU's novel properties include support for concurrent forward progress for readers and writers as well as highly optimized inter-CPU synchronization. RCU was introduced into the Linux kernel eighteen years ago and most subsystems now use RCU. This paper discusses the requirements that drove the development of RCU, the design and API of the Linux RCU implementation, and how kernel developers apply RCU.
读拷贝更新(RCU)是在Linux内核中实现的一种可扩展的高性能同步机制。RCU的新颖特性包括支持读写器的并发前向进程,以及高度优化的CPU间同步。RCU在18年前被引入Linux内核,现在大多数子系统都使用RCU。本文讨论了驱动RCU开发的需求,Linux RCU实现的设计和API,以及内核开发人员如何应用RCU。
{"title":"RCU Usage In the Linux Kernel","authors":"P. McKenney, Joel Fernandes, Silas Boyd-Wickizer, J. Walpole","doi":"10.1145/3421473.3421481","DOIUrl":"https://doi.org/10.1145/3421473.3421481","url":null,"abstract":"Read-copy update (RCU) is a scalable high-performance synchronization mechanism implemented in the Linux kernel. RCU's novel properties include support for concurrent forward progress for readers and writers as well as highly optimized inter-CPU synchronization. RCU was introduced into the Linux kernel eighteen years ago and most subsystems now use RCU. This paper discusses the requirements that drove the development of RCU, the design and API of the Linux RCU implementation, and how kernel developers apply RCU.","PeriodicalId":38935,"journal":{"name":"Operating Systems Review (ACM)","volume":"54 1","pages":"47 - 63"},"PeriodicalIF":0.0,"publicationDate":"2020-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1145/3421473.3421481","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43259733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Symbolic Reasoning for Automatic Signal Placement 用于信号自动放置的符号推理
Q3 Computer Science Pub Date : 2020-08-31 DOI: 10.1145/3421473.3421482
Kostas Ferles, Jacob Van Geffen, Işıl Dillig, Y. Smaragdakis
Explicit signaling between threads is a perennial cause of bugs in concurrent programs. While there are several runtime techniques to automatically notify threads upon the availability of some shared resource, such techniques are not widely-adopted due to their run-time overhead. This paper proposes a new solution based on static analysis for automatically generating a performant explicit-signal program from its corresponding implicit-signal implementation. The key idea is to generate verification conditions that allow us to minimize the number of required signals and unnecessary context switches, while guaranteeing semantic equivalence between the source and target programs. We have implemented our method in a tool called Expresso and evaluate it on challenging benchmarks from prior papers and open-source software. Expresso-generated code significantly outperforms past automatic signaling mechanisms (avg. 1.56x speedup) and closely matches the performance of hand-optimized explicit-signal code.
线程之间的显式信号是并发程序中bug的长期原因。虽然有几种运行时技术可以在某些共享资源可用时自动通知线程,但由于它们的运行时开销,这些技术并没有被广泛采用。本文提出了一种基于静态分析的方法,从相应的隐式信号实现自动生成高性能的显式信号程序。关键思想是生成验证条件,使我们能够最小化所需信号和不必要的上下文切换的数量,同时保证源程序和目标程序之间的语义等价。我们在一个名为Expresso的工具中实现了我们的方法,并在以前的论文和开源软件的挑战性基准上对其进行了评估。expresso生成的代码明显优于过去的自动信号机制(平均加速1.56倍),并且与手动优化的显式信号代码的性能非常接近。
{"title":"Symbolic Reasoning for Automatic Signal Placement","authors":"Kostas Ferles, Jacob Van Geffen, Işıl Dillig, Y. Smaragdakis","doi":"10.1145/3421473.3421482","DOIUrl":"https://doi.org/10.1145/3421473.3421482","url":null,"abstract":"Explicit signaling between threads is a perennial cause of bugs in concurrent programs. While there are several runtime techniques to automatically notify threads upon the availability of some shared resource, such techniques are not widely-adopted due to their run-time overhead. This paper proposes a new solution based on static analysis for automatically generating a performant explicit-signal program from its corresponding implicit-signal implementation. The key idea is to generate verification conditions that allow us to minimize the number of required signals and unnecessary context switches, while guaranteeing semantic equivalence between the source and target programs. We have implemented our method in a tool called Expresso and evaluate it on challenging benchmarks from prior papers and open-source software. Expresso-generated code significantly outperforms past automatic signaling mechanisms (avg. 1.56x speedup) and closely matches the performance of hand-optimized explicit-signal code.","PeriodicalId":38935,"journal":{"name":"Operating Systems Review (ACM)","volume":"54 1","pages":"64 - 76"},"PeriodicalIF":0.0,"publicationDate":"2020-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1145/3421473.3421482","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42996801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
CuSP 尖端
Q3 Computer Science Pub Date : 2020-02-07 DOI: 10.1145/3469379.3469385
Loc Hoang, Roshan Dathathri, G. Gill, K. Pingali
Graph analytics systems must analyze graphs with billions of vertices and edges which require several terabytes of storage. Distributed-memory clusters are often used for analyzing such large graphs since the main memory of a single machine is usually restricted to a few hundreds of gigabytes. This requires partitioning the graph among the machines in the cluster. Existing graph analytics systems use a built-in partitioner that incorporates a particular partitioning policy, but the best policy is dependent on the algorithm, input graph, and platform. Therefore, built-in partitioners are not sufficiently flexible. Stand-alone graph partitioners are available, but they too implement only a few policies. CuSP is a fast streaming edge partitioning framework which permits users to specify the desired partitioning policy at a high level of abstraction and quickly generates highquality graph partitions. For example, it can partition wdc12, the largest publicly available web-crawl graph with 4 billion vertices and 129 billion edges, in under 2 minutes for clusters with 128 machines. Our experiments show that it can produce quality partitions 6× faster on average than the state-of-theart stand-alone partitioner in the literature while supporting a wider range of partitioning policies.
图形分析系统必须分析具有数十亿个顶点和边的图形,这需要数tb的存储空间。分布式内存集群通常用于分析如此大的图,因为单个机器的主内存通常限制在几百gb。这需要在集群中的机器之间划分图。现有的图分析系统使用内置的分区器,该分区器包含特定的分区策略,但最佳策略取决于算法、输入图和平台。因此,内置分区程序不够灵活。独立的图分区器是可用的,但是它们也只实现少数策略。CuSP是一个快速流边缘分区框架,它允许用户在高抽象级别指定所需的分区策略,并快速生成高质量的图分区。例如,对于拥有128台机器的集群,它可以在2分钟内对wdc12(拥有40亿个顶点和1290亿个边的最大的公开网络爬行图)进行分区。我们的实验表明,它可以生成高质量的分区,平均速度比文献中最先进的独立分区器快6倍,同时支持更广泛的分区策略。
{"title":"CuSP","authors":"Loc Hoang, Roshan Dathathri, G. Gill, K. Pingali","doi":"10.1145/3469379.3469385","DOIUrl":"https://doi.org/10.1145/3469379.3469385","url":null,"abstract":"Graph analytics systems must analyze graphs with billions of vertices and edges which require several terabytes of storage. Distributed-memory clusters are often used for analyzing such large graphs since the main memory of a single machine is usually restricted to a few hundreds of gigabytes. This requires partitioning the graph among the machines in the cluster. Existing graph analytics systems use a built-in partitioner that incorporates a particular partitioning policy, but the best policy is dependent on the algorithm, input graph, and platform. Therefore, built-in partitioners are not sufficiently flexible. Stand-alone graph partitioners are available, but they too implement only a few policies. CuSP is a fast streaming edge partitioning framework which permits users to specify the desired partitioning policy at a high level of abstraction and quickly generates highquality graph partitions. For example, it can partition wdc12, the largest publicly available web-crawl graph with 4 billion vertices and 129 billion edges, in under 2 minutes for clusters with 128 machines. Our experiments show that it can produce quality partitions 6× faster on average than the state-of-theart stand-alone partitioner in the literature while supporting a wider range of partitioning policies.","PeriodicalId":38935,"journal":{"name":"Operating Systems Review (ACM)","volume":"55 1","pages":"47 - 60"},"PeriodicalIF":0.0,"publicationDate":"2020-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1145/3469379.3469385","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43337964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Machine Learning Approach to Recommending Files in a Collaborative Work Environment 协同工作环境中推荐文件的机器学习方法
Q3 Computer Science Pub Date : 2019-07-25 DOI: 10.1145/3352020.3352028
D. Vengerov, Sesh Jalagam
Recommendation of items to users is a problem faced by many companies in a wide spectrum of industries. This problem was traditionally approached in a one-shot manner, such as recommending movies to users based on all the movie ratings observed so far. The evolution of user activity over time was relatively unexplored. This paper presents a Machine Learning approach developed at Box Inc. for making repeated recommendations of files to users in a collaborative work environment. Our results on historical data show that this approach noticeably outperforms the approach currently implemented at Box and also the traditional Matrix Factorization approach.
向用户推荐产品是各行各业的许多公司都面临的问题。这个问题传统上是用一次性的方式来解决的,比如根据迄今为止观察到的所有电影评级向用户推荐电影。用户活动随着时间的推移而演变,这方面的研究相对较少。本文介绍了Box公司开发的一种机器学习方法,用于在协作工作环境中向用户重复推荐文件。我们在历史数据上的结果表明,这种方法明显优于目前在Box实现的方法和传统的矩阵分解方法。
{"title":"A Machine Learning Approach to Recommending Files in a Collaborative Work Environment","authors":"D. Vengerov, Sesh Jalagam","doi":"10.1145/3352020.3352028","DOIUrl":"https://doi.org/10.1145/3352020.3352028","url":null,"abstract":"Recommendation of items to users is a problem faced by many companies in a wide spectrum of industries. This problem was traditionally approached in a one-shot manner, such as recommending movies to users based on all the movie ratings observed so far. The evolution of user activity over time was relatively unexplored. This paper presents a Machine Learning approach developed at Box Inc. for making repeated recommendations of files to users in a collaborative work environment. Our results on historical data show that this approach noticeably outperforms the approach currently implemented at Box and also the traditional Matrix Factorization approach.","PeriodicalId":38935,"journal":{"name":"Operating Systems Review (ACM)","volume":"53 1","pages":"46 - 51"},"PeriodicalIF":0.0,"publicationDate":"2019-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1145/3352020.3352028","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43291677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy Accounting and Quality Control in the Sage Differentially Private ML Platform Sage差异私有ML平台中的隐私会计与质量控制
Q3 Computer Science Pub Date : 2019-07-25 DOI: 10.1145/3352020.3352032
Mathias Lécuyer, Riley Spahn, Kiran Vodrahalli, Roxana Geambasu, Daniel J. Hsu
We present Sage, the first ML platform that enforces a global differential privacy (DP) guarantee across all models produced from a sensitive data stream. Sage extends the Tensorflow-Extended ML platform with novel mechanisms and DP theory to address operational challenges that arise from incorporating DP into ML training processes. First, to avoid the typical problem with DP systems of "running out of privacy budget" after a pre-established number of training processes, we develop block composition. It is a new DP composition theory that leverages the time-bounded structure of training processes to keep training models endlessly on a sensitive data stream while enforcing event-level DP on the stream. Second, to control the quality of ML models produced by Sage, we develop a novel iterative training process that trains a model on increasing amounts of data from a stream until, with high probability, the model meets developer-configured quality criteria.
Sage是第一个在敏感数据流生成的所有模型中强制执行全局差分隐私(DP)保证的ML平台。Sage通过新颖的机制和DP理论扩展了Tensorflow-Extended ML平台,以解决将DP纳入ML训练过程中出现的操作挑战。首先,为了避免DP系统在预先设定的训练过程数量后“耗尽隐私预算”的典型问题,我们开发了块组合。这是一种新的DP组合理论,它利用训练过程的时间限制结构,使训练模型在敏感数据流上无休止地进行训练,同时在流上执行事件级DP。其次,为了控制Sage生成的机器学习模型的质量,我们开发了一种新的迭代训练过程,该过程可以根据来自流的越来越多的数据量来训练模型,直到模型有很大可能满足开发人员配置的质量标准。
{"title":"Privacy Accounting and Quality Control in the Sage Differentially Private ML Platform","authors":"Mathias Lécuyer, Riley Spahn, Kiran Vodrahalli, Roxana Geambasu, Daniel J. Hsu","doi":"10.1145/3352020.3352032","DOIUrl":"https://doi.org/10.1145/3352020.3352032","url":null,"abstract":"We present Sage, the first ML platform that enforces a global differential privacy (DP) guarantee across all models produced from a sensitive data stream. Sage extends the Tensorflow-Extended ML platform with novel mechanisms and DP theory to address operational challenges that arise from incorporating DP into ML training processes. First, to avoid the typical problem with DP systems of \"running out of privacy budget\" after a pre-established number of training processes, we develop block composition. It is a new DP composition theory that leverages the time-bounded structure of training processes to keep training models endlessly on a sensitive data stream while enforcing event-level DP on the stream. Second, to control the quality of ML models produced by Sage, we develop a novel iterative training process that trains a model on increasing amounts of data from a stream until, with high probability, the model meets developer-configured quality criteria.","PeriodicalId":38935,"journal":{"name":"Operating Systems Review (ACM)","volume":"53 1","pages":"75 - 84"},"PeriodicalIF":0.0,"publicationDate":"2019-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1145/3352020.3352032","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41458896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
The Case for Learning-and-System Co-design 学习与系统协同设计的案例
Q3 Computer Science Pub Date : 2019-07-25 DOI: 10.1145/3352020.3352031
C. Liang, Hui Xue, Mao Yang, Lidong Zhou
While decision-makings in systems are commonly solved with explicit rules and heuristics, machine learning (ML) and deep learning (DL) have been driving a paradigm shift in modern system design. Based on our decade of experience in operationalizing a large production cloud system, Web Search, learning fills the gap in comprehending and taming the system design and operation complexity. However, rather than just improving specific ML/DL algorithms or system features, we posit that the key to unlocking the full potential of learning-augmented systems is a principled methodology promoting learning-and-system co-design. On this basis, we present the AutoSys, a common framework for the development of learning-augmented systems.
虽然系统中的决策通常用显式规则和启发式方法来解决,但机器学习(ML)和深度学习(DL)一直在推动现代系统设计的范式转变。基于我们十年来操作大型生产云系统Web Search的经验,学习填补了理解和驯服系统设计和操作复杂性的空白。然而,我们认为,释放学习增强系统全部潜力的关键是一种促进学习和系统协同设计的原则性方法,而不仅仅是改进特定的ML/DL算法或系统特征。在此基础上,我们提出了AutoSys,这是一个用于开发学习增强系统的通用框架。
{"title":"The Case for Learning-and-System Co-design","authors":"C. Liang, Hui Xue, Mao Yang, Lidong Zhou","doi":"10.1145/3352020.3352031","DOIUrl":"https://doi.org/10.1145/3352020.3352031","url":null,"abstract":"While decision-makings in systems are commonly solved with explicit rules and heuristics, machine learning (ML) and deep learning (DL) have been driving a paradigm shift in modern system design. Based on our decade of experience in operationalizing a large production cloud system, Web Search, learning fills the gap in comprehending and taming the system design and operation complexity. However, rather than just improving specific ML/DL algorithms or system features, we posit that the key to unlocking the full potential of learning-augmented systems is a principled methodology promoting learning-and-system co-design. On this basis, we present the AutoSys, a common framework for the development of learning-augmented systems.","PeriodicalId":38935,"journal":{"name":"Operating Systems Review (ACM)","volume":"53 1","pages":"68 - 74"},"PeriodicalIF":0.0,"publicationDate":"2019-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1145/3352020.3352031","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45412227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
Operating Systems Review (ACM)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1