首页 > 最新文献

2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)最新文献

英文 中文
Reducing the “Tax” of Reliability: A Hardware-Aware Method for Agile Data Persistence in Mobile Devices 减少可靠性的“税”:移动设备中敏捷数据持久化的硬件感知方法
M. Wang, Huixiang Chen, Tao Li
Nowadays, mobile devices are pervasively used by almost everyone. The majority of mobile devices use embedded-Multi Media Cards (eMMC) as storage. However, the crash-proof mechanism of existing I/O stack has not fully exploited the features of eMMC. In some real usage scenarios, the legacy data persistence procedure may dramatically degrade performance of the system. In response to this, this paper exploits the hardware features of eMMC to improve the efficiency of data persistence while preserving the reliability of current mobile systems. We characterize the existing data persistence scheme and observe that the hardware-agnostic design generates excessive non-critical data and adds expensive barriers in data persistence paths. We alleviate these overheads by leveraging eMMC features. Based on evaluations on real systems, our optimizations achieve 5%-31% performance improvement across a wide range of mobile apps.
如今,几乎每个人都普遍使用移动设备。大多数移动设备使用嵌入式多媒体卡(eMMC)作为存储。然而,现有的I/O栈防崩溃机制并没有充分利用eMMC的特性。在一些实际使用场景中,遗留数据持久化过程可能会显著降低系统的性能。针对这一点,本文利用eMMC的硬件特性,在保持现有移动系统可靠性的同时,提高数据持久化的效率。我们描述了现有的数据持久化方案,并观察到硬件无关的设计产生了过多的非关键数据,并在数据持久化路径中增加了昂贵的障碍。我们通过利用eMMC特性来减轻这些开销。基于对真实系统的评估,我们的优化在广泛的移动应用程序中实现了5%-31%的性能提升。
{"title":"Reducing the “Tax” of Reliability: A Hardware-Aware Method for Agile Data Persistence in Mobile Devices","authors":"M. Wang, Huixiang Chen, Tao Li","doi":"10.1109/DSN.2017.46","DOIUrl":"https://doi.org/10.1109/DSN.2017.46","url":null,"abstract":"Nowadays, mobile devices are pervasively used by almost everyone. The majority of mobile devices use embedded-Multi Media Cards (eMMC) as storage. However, the crash-proof mechanism of existing I/O stack has not fully exploited the features of eMMC. In some real usage scenarios, the legacy data persistence procedure may dramatically degrade performance of the system. In response to this, this paper exploits the hardware features of eMMC to improve the efficiency of data persistence while preserving the reliability of current mobile systems. We characterize the existing data persistence scheme and observe that the hardware-agnostic design generates excessive non-critical data and adds expensive barriers in data persistence paths. We alleviate these overheads by leveraging eMMC features. Based on evaluations on real systems, our optimizations achieve 5%-31% performance improvement across a wide range of mobile apps.","PeriodicalId":426928,"journal":{"name":"2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"247 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116711882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Statistical Model Checking for Hybrid Petri Nets with Multiple General Transitions 具有多个一般过渡的混合Petri网的统计模型检验
Carina Pilch, Anne Remke
The modeling formalism of hybrid Petri nets allows investigating the dependability of e.g. critical infrastructures with hybrid characteristics. Hybrid Petri nets can model random delays with so-called general transitions. Approaches for analyzing such Petri nets are available for models with one or two general transitions, which change the discrete marking of the system by firing only once. We extend the formalism to more general transitions that possibly fire multiple times. This work provides a definition of the probability space for the evolution of hybrid Petri nets over time and presents an efficient approach to discrete-event simulation. Statistical Model Checking techniques are introduced to verify complex properties on hybrid Petri nets. The presented methods are implemented in Java and we show their feasibility in a case study that also serves to validate our results.
混合Petri网的建模形式允许研究例如具有混合特征的关键基础设施的可靠性。混合Petri网可以模拟具有一般过渡的随机延迟。分析这种Petri网的方法可用于具有一个或两个一般转换的模型,这些模型仅通过触发一次来改变系统的离散标记。我们将形式主义扩展到可能触发多次的更一般的转换。这项工作提供了混合Petri网随时间演化的概率空间的定义,并提出了一种有效的离散事件模拟方法。引入统计模型检验技术来验证混合Petri网的复杂性质。所提出的方法是在Java中实现的,我们在一个案例研究中展示了它们的可行性,也有助于验证我们的结果。
{"title":"Statistical Model Checking for Hybrid Petri Nets with Multiple General Transitions","authors":"Carina Pilch, Anne Remke","doi":"10.1109/DSN.2017.41","DOIUrl":"https://doi.org/10.1109/DSN.2017.41","url":null,"abstract":"The modeling formalism of hybrid Petri nets allows investigating the dependability of e.g. critical infrastructures with hybrid characteristics. Hybrid Petri nets can model random delays with so-called general transitions. Approaches for analyzing such Petri nets are available for models with one or two general transitions, which change the discrete marking of the system by firing only once. We extend the formalism to more general transitions that possibly fire multiple times. This work provides a definition of the probability space for the evolution of hybrid Petri nets over time and presents an efficient approach to discrete-event simulation. Statistical Model Checking techniques are introduced to verify complex properties on hybrid Petri nets. The presented methods are implemented in Java and we show their feasibility in a case study that also serves to validate our results.","PeriodicalId":426928,"journal":{"name":"2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"157 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133876944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Secure Tera-scale Data Crunching with a Small TCB 使用小型TCB安全的太量级数据处理
Bruno Vavala, N. Neves, P. Steenkiste
Outsourcing services to third-party providers comes with a high security cost—to fully trust the providers. Using trusted hardware can help, but current trusted execution environments do not adequately support services that process very large scale datasets. We present LAST-GT, a system that bridges this gap by supporting the execution of self-contained services over a large state, with a small and generic trusted computing base (TCB). LAST-GT uses widely deployed trusted hardware to guarantee integrity and verifiability of the execution on a remote platform, and it securely supplies data to the service through simple techniques based on virtual memory. As a result, LAST-GT is general and applicable to many scenarios such as computational genomics and databases, as we show in our experimental evaluation based on an implementation of LAST-GT on a secure hypervisor. We also describe a possible implementation on Intel SGX.
将服务外包给第三方提供商需要付出很高的安全成本——要完全信任提供商。使用可信硬件会有所帮助,但是当前的可信执行环境不能充分支持处理大规模数据集的服务。我们提出了LAST-GT,这是一个通过支持在大状态上执行自包含服务的系统,它具有小型和通用的可信计算基础(TCB),从而弥合了这一差距。LAST-GT使用广泛部署的可信硬件来保证远程平台上执行的完整性和可验证性,并通过基于虚拟内存的简单技术安全地向服务提供数据。因此,LAST-GT是通用的,适用于许多场景,例如计算基因组学和数据库,正如我们在基于安全管理程序上的LAST-GT实现的实验评估中所示。我们还描述了在Intel SGX上的可能实现。
{"title":"Secure Tera-scale Data Crunching with a Small TCB","authors":"Bruno Vavala, N. Neves, P. Steenkiste","doi":"10.1109/DSN.2017.53","DOIUrl":"https://doi.org/10.1109/DSN.2017.53","url":null,"abstract":"Outsourcing services to third-party providers comes with a high security cost—to fully trust the providers. Using trusted hardware can help, but current trusted execution environments do not adequately support services that process very large scale datasets. We present LAST-GT, a system that bridges this gap by supporting the execution of self-contained services over a large state, with a small and generic trusted computing base (TCB). LAST-GT uses widely deployed trusted hardware to guarantee integrity and verifiability of the execution on a remote platform, and it securely supplies data to the service through simple techniques based on virtual memory. As a result, LAST-GT is general and applicable to many scenarios such as computational genomics and databases, as we show in our experimental evaluation based on an implementation of LAST-GT on a secure hypervisor. We also describe a possible implementation on Intel SGX.","PeriodicalId":426928,"journal":{"name":"2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122128096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Secure Live Migration of SGX Enclaves on Untrusted Cloud SGX飞地在不可信云上的安全实时迁移
Jinyu Gu, Zhichao Hua, Yubin Xia, Haibo Chen, B. Zang, Haibing Guan, Jinming Li
The recent commercial availability of Intel SGX (Software Guard eXtensions) provides a hardware-enabled building block for secure execution of software modules in an untrusted cloud. As an untrusted hypervisor/OS has no access to an enclave's running states, a VM (virtual machine) with enclaves running inside loses the capability of live migration, a key feature of VMs in the cloud. This paper presents the first study on the support for live migration of SGX-capable VMs. We identify the security properties that a secure enclave migration process should meet and propose a software-based solution. We leverage several techniques such as two-phase checkpointing and self-destroy to implement our design on a real SGX machine. Security analysis confirms the security of our proposed design and performance evaluation shows that it incurs negligible performance overhead. Besides, we give suggestions on the future hardware design for supporting transparent enclave migration.
最近的商业可用性Intel SGX (Software Guard eXtensions)提供了一个支持硬件的构建块,用于在不受信任的云中安全执行软件模块。由于不受信任的管理程序/操作系统无法访问enclave的运行状态,因此在内部运行enclave的VM(虚拟机)失去了实时迁移的能力,而实时迁移是云中的VM的一个关键特性。本文首次对支持sgx的虚拟机的实时迁移进行了研究。我们确定了安全飞地迁移过程应该满足的安全属性,并提出了基于软件的解决方案。我们利用了几种技术,如两阶段检查点和自毁来在真正的SGX机器上实现我们的设计。安全性分析证实了我们提出的设计的安全性,性能评估表明它产生的性能开销可以忽略不计。此外,我们还对支持透明飞地迁移的未来硬件设计提出了建议。
{"title":"Secure Live Migration of SGX Enclaves on Untrusted Cloud","authors":"Jinyu Gu, Zhichao Hua, Yubin Xia, Haibo Chen, B. Zang, Haibing Guan, Jinming Li","doi":"10.1109/DSN.2017.37","DOIUrl":"https://doi.org/10.1109/DSN.2017.37","url":null,"abstract":"The recent commercial availability of Intel SGX (Software Guard eXtensions) provides a hardware-enabled building block for secure execution of software modules in an untrusted cloud. As an untrusted hypervisor/OS has no access to an enclave's running states, a VM (virtual machine) with enclaves running inside loses the capability of live migration, a key feature of VMs in the cloud. This paper presents the first study on the support for live migration of SGX-capable VMs. We identify the security properties that a secure enclave migration process should meet and propose a software-based solution. We leverage several techniques such as two-phase checkpointing and self-destroy to implement our design on a real SGX machine. Security analysis confirms the security of our proposed design and performance evaluation shows that it incurs negligible performance overhead. Besides, we give suggestions on the future hardware design for supporting transparent enclave migration.","PeriodicalId":426928,"journal":{"name":"2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127464730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
Exploring the Potential for Collaborative Data Compression and Hard-Error Tolerance in PCM Memories 探索PCM存储器中协同数据压缩和硬错误容忍度的潜力
A. Jadidi, M. Arjomand, Mohammad Khavari Tavana, D. Kaeli, M. Kandemir, C. Das
Limited write endurance is the main obstacle standing in the way of using phase change memory (PCM) in future computing systems. While several wear-leveling and hard-error tolerant techniques have been proposed for improving PCM lifetime, most of these approaches assume that the underlying memory uses a very simple write traffic reduction scheme (e.g., buffering, differential writes). In particular, most PCM prototypes/chips are equipped with an embedded circuit to support differential writes (DW) – on a write, only the bits that differ between the old and new data are updated. With DW, the bit-pattern of updates in a memory block is usually random, which limits the opportunity to exploit the resulting bit pattern for lifetime enhancement at an architecture level (e.g., using techniques such as wear-leveling and hard-error tolerance). This paper focuses on this inefficiency and proposes a solution based on data compression. Employing compression can improve the lifetime of the PCM memory. Using state-of-the-art compression schemes, the size of the compressed data is usually much smaller than the original data written back to memory from the last-level cache on an eviction. By storing data in a compressed format in the target memory block, first, we limit the number of bit flips to fewer memory cells, enabling more efficient intra-line wear-leveling and error recovery, and second, the unused bits in the memory block can be reused as replacements for faulty bits given the reduced size of the (compressed) data. It can also happen that for a portion of the memory blocks, the resulting compressed data is not very small. This can be due to increased data entropy introduced by compression, where the total number of bit flips will be increased over the baseline system. In this paper, we present an approach that provides collaborative operation of data compression, differential writes, wear-leveling and hard-error tolerant techniques targeting PCM memories. We propose approaches that reap the maximum benefits from compression, while also enjoying the benefits of techniques that reduce the number of high-entropy writes. Using an approach that combines different solutions, our mechanism tolerates 2.9× more cell failures per memory line and achieves a 4.3× increase in PCM memory lifetime, relative to our baseline state-of-the-art PCM DIMM memory.
有限的写入持久性是阻碍相变存储器在未来计算系统中应用的主要障碍。虽然已经提出了几种用于改善PCM寿命的损耗均衡和硬容错技术,但这些方法中的大多数都假设底层内存使用非常简单的写流量减少方案(例如,缓冲、差分写)。特别是,大多数PCM原型/芯片都配备了一个嵌入式电路来支持差分写入(DW) -在写入时,只有新旧数据之间不同的位被更新。使用DW,内存块中更新的位模式通常是随机的,这限制了在体系结构级别上利用生成的位模式来增强生命周期的机会(例如,使用诸如损耗均衡和硬错误容忍等技术)。本文针对这种低效率问题,提出了一种基于数据压缩的解决方案。采用压缩技术可以提高PCM存储器的寿命。使用最先进的压缩方案,压缩数据的大小通常比从最后一级缓存回写到内存中的原始数据小得多。通过在目标内存块中以压缩格式存储数据,首先,我们将位翻转的数量限制在更少的内存单元中,从而实现更有效的线内损耗均衡和错误恢复,其次,在内存块中未使用的位可以被重用,作为给定(压缩)数据大小减小的故障位的替代品。对于一部分内存块,也可能发生压缩后的数据不是非常小的情况。这可能是由于压缩引入的数据熵增加,其中比特翻转的总数将比基线系统增加。在本文中,我们提出了一种针对PCM存储器的数据压缩、差分写入、磨损均衡和硬容错技术的协同操作方法。我们提出了从压缩中获得最大好处的方法,同时也享受了减少高熵写入数量的技术的好处。使用结合不同解决方案的方法,我们的机制可以容忍每条存储线多2.9倍的单元故障,并且与我们最先进的PCM DIMM内存相比,PCM内存寿命增加了4.3倍。
{"title":"Exploring the Potential for Collaborative Data Compression and Hard-Error Tolerance in PCM Memories","authors":"A. Jadidi, M. Arjomand, Mohammad Khavari Tavana, D. Kaeli, M. Kandemir, C. Das","doi":"10.1109/DSN.2017.56","DOIUrl":"https://doi.org/10.1109/DSN.2017.56","url":null,"abstract":"Limited write endurance is the main obstacle standing in the way of using phase change memory (PCM) in future computing systems. While several wear-leveling and hard-error tolerant techniques have been proposed for improving PCM lifetime, most of these approaches assume that the underlying memory uses a very simple write traffic reduction scheme (e.g., buffering, differential writes). In particular, most PCM prototypes/chips are equipped with an embedded circuit to support differential writes (DW) – on a write, only the bits that differ between the old and new data are updated. With DW, the bit-pattern of updates in a memory block is usually random, which limits the opportunity to exploit the resulting bit pattern for lifetime enhancement at an architecture level (e.g., using techniques such as wear-leveling and hard-error tolerance). This paper focuses on this inefficiency and proposes a solution based on data compression. Employing compression can improve the lifetime of the PCM memory. Using state-of-the-art compression schemes, the size of the compressed data is usually much smaller than the original data written back to memory from the last-level cache on an eviction. By storing data in a compressed format in the target memory block, first, we limit the number of bit flips to fewer memory cells, enabling more efficient intra-line wear-leveling and error recovery, and second, the unused bits in the memory block can be reused as replacements for faulty bits given the reduced size of the (compressed) data. It can also happen that for a portion of the memory blocks, the resulting compressed data is not very small. This can be due to increased data entropy introduced by compression, where the total number of bit flips will be increased over the baseline system. In this paper, we present an approach that provides collaborative operation of data compression, differential writes, wear-leveling and hard-error tolerant techniques targeting PCM memories. We propose approaches that reap the maximum benefits from compression, while also enjoying the benefits of techniques that reduce the number of high-entropy writes. Using an approach that combines different solutions, our mechanism tolerates 2.9× more cell failures per memory line and achieves a 4.3× increase in PCM memory lifetime, relative to our baseline state-of-the-art PCM DIMM memory.","PeriodicalId":426928,"journal":{"name":"2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121547479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Multimodal Indexable Encryption for Mobile Cloud-Based Applications 移动云应用的多模态可索引加密
Bernardo Ferreira, J. Leitao, H. Domingos
In this paper we propose MIE, a Multimodal Indexable Encryption framework that for the first time allows mobile applications to securely outsource the storage and search of their multimodal data (i.e. data containing multiple media formats) to public clouds with privacy guarantees. MIE is designed as a distributed framework architecture, leveraging on shared cloud repositories that can be accessed simultaneously by multiple users. At its core MIE relies on Distance Preserving Encodings (DPE), a novel family of encoding algorithms with cryptographic properties that we also propose. By applying DPE to multimodal data features, MIE enables high-cost clustering and indexing operations to be handled by cloud servers in a privacy-preserving way. Experiments show that MIE achieves better performance and scalability when compared with the state of art, with measurable impact on mobile resources and battery life.
在本文中,我们提出了MIE,这是一个多模态可索引加密框架,它首次允许移动应用程序安全地将其多模态数据(即包含多种媒体格式的数据)的存储和搜索外包到具有隐私保证的公共云。MIE被设计为分布式框架架构,利用可由多个用户同时访问的共享云存储库。MIE的核心是距离保持编码(DPE),这是我们提出的一种具有密码学特性的新型编码算法。通过将DPE应用于多模态数据特征,MIE使云服务器能够以保护隐私的方式处理高成本的集群和索引操作。实验表明,与现有技术相比,MIE实现了更好的性能和可扩展性,对移动资源和电池寿命产生了可衡量的影响。
{"title":"Multimodal Indexable Encryption for Mobile Cloud-Based Applications","authors":"Bernardo Ferreira, J. Leitao, H. Domingos","doi":"10.1109/DSN.2017.31","DOIUrl":"https://doi.org/10.1109/DSN.2017.31","url":null,"abstract":"In this paper we propose MIE, a Multimodal Indexable Encryption framework that for the first time allows mobile applications to securely outsource the storage and search of their multimodal data (i.e. data containing multiple media formats) to public clouds with privacy guarantees. MIE is designed as a distributed framework architecture, leveraging on shared cloud repositories that can be accessed simultaneously by multiple users. At its core MIE relies on Distance Preserving Encodings (DPE), a novel family of encoding algorithms with cryptographic properties that we also propose. By applying DPE to multimodal data features, MIE enables high-cost clustering and indexing operations to be handled by cloud servers in a privacy-preserving way. Experiments show that MIE achieves better performance and scalability when compared with the state of art, with measurable impact on mobile resources and battery life.","PeriodicalId":426928,"journal":{"name":"2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123552063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
I Know Nothing about You But Here is What You Might Like 我对你一无所知,但这是你可能喜欢的
R. Guerraoui, Anne-Marie Kermarrec, Rhicheek Patra, Mahammad Valiyev, Jingjing Wang
Recommenders widely use collaborative filtering schemes. These schemes, however, threaten privacy as user profiles are made available to the service provider hosting the recommender and can even be guessed by curious users who analyze the recommendations. Users can encrypt their profiles to hide them from the service provider and add noise to make them difficult to guess. These precautionary measures hamper latency and recommendation quality. In this paper, we present a novel recommender, X-REC, enabling an effective collaborative filtering scheme to ensure the privacy of users against the service provider (system-level privacy) or other users (user-level privacy). X-REC builds on two underlying services: X-HE, an encryption scheme designed for recommenders, and X-NN, a neighborhood selection protocol over encrypted profiles. We leverage uniform sampling to ensure differential privacy against curious users. Our extensive evaluation demonstrates that X-REC provides (1) recommendation quality similar to non-private recommenders, and (2) significant latency improvement over privacy-aware alternatives.
推荐器广泛使用协同过滤方案。然而,这些方案会威胁到用户的隐私,因为用户的个人资料可以提供给托管推荐的服务提供商,甚至可以被好奇的用户在分析推荐时猜测出来。用户可以加密他们的个人资料,以隐藏他们的服务提供商,并增加噪音,使他们难以猜测。这些预防措施会影响延迟和推荐质量。在本文中,我们提出了一种新的推荐器X-REC,它实现了一种有效的协同过滤方案,以确保用户的隐私不受服务提供商(系统级隐私)或其他用户(用户级隐私)的侵犯。X-REC建立在两个底层服务之上:X-HE,一个为推荐人设计的加密方案,和X-NN,一个加密配置文件的邻居选择协议。我们利用统一的采样,以确保不同的隐私对好奇的用户。我们的广泛评估表明,X-REC提供了(1)与非私人推荐器相似的推荐质量,(2)与隐私感知替代方案相比,延迟显著改善。
{"title":"I Know Nothing about You But Here is What You Might Like","authors":"R. Guerraoui, Anne-Marie Kermarrec, Rhicheek Patra, Mahammad Valiyev, Jingjing Wang","doi":"10.1109/DSN.2017.22","DOIUrl":"https://doi.org/10.1109/DSN.2017.22","url":null,"abstract":"Recommenders widely use collaborative filtering schemes. These schemes, however, threaten privacy as user profiles are made available to the service provider hosting the recommender and can even be guessed by curious users who analyze the recommendations. Users can encrypt their profiles to hide them from the service provider and add noise to make them difficult to guess. These precautionary measures hamper latency and recommendation quality. In this paper, we present a novel recommender, X-REC, enabling an effective collaborative filtering scheme to ensure the privacy of users against the service provider (system-level privacy) or other users (user-level privacy). X-REC builds on two underlying services: X-HE, an encryption scheme designed for recommenders, and X-NN, a neighborhood selection protocol over encrypted profiles. We leverage uniform sampling to ensure differential privacy against curious users. Our extensive evaluation demonstrates that X-REC provides (1) recommendation quality similar to non-private recommenders, and (2) significant latency improvement over privacy-aware alternatives.","PeriodicalId":426928,"journal":{"name":"2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122889962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Voiceprint: A Novel Sybil Attack Detection Method Based on RSSI for VANETs 声纹:一种新的基于RSSI的vanet女黑客攻击检测方法
Yuan Yao, Bin Xiao, Gaofei Wu, Xue Liu, Zhiwen Yu, Kailong Zhang, Xingshe Zhou
Vehicular Ad Hoc Networks (VANETs) enable vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications that bring many benefits and conveniences to improve the road safety and drive comfort in future transportation systems. Sybil attack is considered one of the most risky threats in VANETs since a Sybil attacker can generate multiple fake identities with false messages to severely impair the normal functions of safety-related applications. In this paper, we propose a novel Sybil attack detection method based on Received Signal Strength Indicator (RSSI), Voiceprint, to conduct a widely applicable, lightweight and full-distributed detection for VANETs. To avoid the inaccurate position estimation according to predefined radio propagation models in previous RSSI-based detection methods, Voiceprint adopts the RSSI time series as the vehicular speech and compares the similarity among all received time series. Voiceprint does not rely on any predefined radio propagation model, and conducts independent detection without the support of the centralized infrastructure. It has more accurate detection rate in different dynamic environments. Extensive simulations and real-world experiments demonstrate that the proposed Voiceprint is an effective method considering the cost, complexity and performance.
车辆自组织网络(VANETs)实现了车辆对车辆(V2V)和车辆对基础设施(V2I)的通信,为提高未来交通系统的道路安全性和驾驶舒适性带来了许多好处和便利。Sybil攻击被认为是vanet中最危险的威胁之一,因为Sybil攻击者可以生成多个带有虚假消息的假身份,严重损害安全相关应用程序的正常功能。本文提出了一种基于RSSI (Received Signal Strength Indicator,接收信号强度指标)声纹的Sybil攻击检测方法,对vanet进行了广泛适用、轻量化、全分布式的检测。为了避免以往基于RSSI的检测方法根据预定义的无线电传播模型进行位置估计不准确,声纹采用RSSI时间序列作为车辆语音,并对接收到的所有时间序列进行相似性比较。声纹不依赖于任何预定义的无线电传播模型,在没有集中基础设施支持的情况下进行独立检测。在不同的动态环境下具有更准确的检测率。大量的仿真和实际实验表明,从成本、复杂度和性能等方面考虑,该方法是一种有效的声纹识别方法。
{"title":"Voiceprint: A Novel Sybil Attack Detection Method Based on RSSI for VANETs","authors":"Yuan Yao, Bin Xiao, Gaofei Wu, Xue Liu, Zhiwen Yu, Kailong Zhang, Xingshe Zhou","doi":"10.1109/DSN.2017.10","DOIUrl":"https://doi.org/10.1109/DSN.2017.10","url":null,"abstract":"Vehicular Ad Hoc Networks (VANETs) enable vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications that bring many benefits and conveniences to improve the road safety and drive comfort in future transportation systems. Sybil attack is considered one of the most risky threats in VANETs since a Sybil attacker can generate multiple fake identities with false messages to severely impair the normal functions of safety-related applications. In this paper, we propose a novel Sybil attack detection method based on Received Signal Strength Indicator (RSSI), Voiceprint, to conduct a widely applicable, lightweight and full-distributed detection for VANETs. To avoid the inaccurate position estimation according to predefined radio propagation models in previous RSSI-based detection methods, Voiceprint adopts the RSSI time series as the vehicular speech and compares the similarity among all received time series. Voiceprint does not rely on any predefined radio propagation model, and conducts independent detection without the support of the centralized infrastructure. It has more accurate detection rate in different dynamic environments. Extensive simulations and real-world experiments demonstrate that the proposed Voiceprint is an effective method considering the cost, complexity and performance.","PeriodicalId":426928,"journal":{"name":"2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125020281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
pbSE: Phase-Based Symbolic Execution 基于阶段的符号执行
Qixue Xiao, Yu Chen, Chengang Wu, Kang Li, Junjie Mao, Shize Guo, Yuanchun Shi
The study of software bugs has long been a key area in software security. Dynamic symbolic execution, in exploring the program's execution paths, finds bugs by analyzing all potential dangerous operations. Due to its high coverage and abilities to generate effective testcases, dynamic symbolic execution has attracted wide attention in the research community. However, the success of dynamic symbolic execution is limited due to complex program logic and its difficulty to handle large symbolic data. In our experiments we found that phase-related features of a program often prevents dynamic symbolic execution from exploring deep paths. On the basis of this discovery, we proposed a novel symbolic execution technology guided by program phase characteristics. Compared to KLEE, the most well-known symbolic execution approach, our method is capable of covering more code and discovering more bugs. We designed and implemented pbSE system, which was used to test several commonly used tools and libraries in Linux. Our results showed that pbSE on average covers code twice as much as what KLEE does, and we discovered 21 previously unknown vulnerabilities by using pbSE, out of which 7 are assigned CVE IDs.
对软件漏洞的研究一直是软件安全的一个关键领域。动态符号执行在探索程序的执行路径时,通过分析所有潜在的危险操作来发现错误。动态符号执行由于其高覆盖率和生成有效测试用例的能力,引起了学术界的广泛关注。然而,由于复杂的程序逻辑和处理大量符号数据的困难,动态符号执行的成功受到限制。在我们的实验中,我们发现程序的相位相关特征通常会阻止动态符号执行探索深度路径。在此基础上,我们提出了一种以程序相位特征为导向的符号执行技术。与最著名的符号执行方法KLEE相比,我们的方法能够覆盖更多的代码并发现更多的错误。我们设计并实现了pbSE系统,用于测试Linux系统中几种常用的工具和库。我们的结果表明,pbSE平均覆盖的代码是KLEE的两倍,我们通过使用pbSE发现了21个以前未知的漏洞,其中7个被分配了CVE id。
{"title":"pbSE: Phase-Based Symbolic Execution","authors":"Qixue Xiao, Yu Chen, Chengang Wu, Kang Li, Junjie Mao, Shize Guo, Yuanchun Shi","doi":"10.1109/DSN.2017.48","DOIUrl":"https://doi.org/10.1109/DSN.2017.48","url":null,"abstract":"The study of software bugs has long been a key area in software security. Dynamic symbolic execution, in exploring the program's execution paths, finds bugs by analyzing all potential dangerous operations. Due to its high coverage and abilities to generate effective testcases, dynamic symbolic execution has attracted wide attention in the research community. However, the success of dynamic symbolic execution is limited due to complex program logic and its difficulty to handle large symbolic data. In our experiments we found that phase-related features of a program often prevents dynamic symbolic execution from exploring deep paths. On the basis of this discovery, we proposed a novel symbolic execution technology guided by program phase characteristics. Compared to KLEE, the most well-known symbolic execution approach, our method is capable of covering more code and discovering more bugs. We designed and implemented pbSE system, which was used to test several commonly used tools and libraries in Linux. Our results showed that pbSE on average covers code twice as much as what KLEE does, and we discovered 21 previously unknown vulnerabilities by using pbSE, out of which 7 are assigned CVE IDs.","PeriodicalId":426928,"journal":{"name":"2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128910479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Ghost Installer in the Shadow: Security Analysis of App Installation on Android 影子中的幽灵安装程序:Android应用程序安装的安全性分析
Yeonjoon Lee, Tongxin Li, N. Zhang, Soteris Demetriou, Mingming Zha, Xiaofeng Wang, Kai Chen, Xiao-yong Zhou, Xinhui Han, M. Grace
Android allows developers to build apps with app installation functionality themselves with minimal restriction and support like any other functionalities. Given the critical importance of app installation, the security implications of the approach can be significant. This paper reports the first systematic study on this issue, focusing on the security guarantees of different steps of the App Installation Transaction (AIT). We demonstrate the serious consequences of leaving AIT development to individual developers: most installers (e.g., Amazon AppStore, DTIgnite, Baidu) are riddled with various security-critical loopholes, which can be exploited by attackers to silently install any apps, acquiring dangerous-level permissions or even unauthorized access to system resources. Surprisingly, vulnerabilities were found in all steps of AIT. The attacks we present, dubbed Ghost Installer Attack (GIA), are found to pose a realistic threat to Android ecosystem. Further, we developed both a user-app-level and a system-level defense that are innovative and practical.
Android允许开发者自己开发带有应用安装功能的应用,而不像其他功能那样受到限制和支持。考虑到应用程序安装的重要性,该方法的安全含义可能非常重要。本文首次对这一问题进行了系统的研究,重点研究了应用程序安装交易(AIT)的不同步骤的安全保障。我们展示了将AIT开发留给个人开发人员的严重后果:大多数安装程序(例如,Amazon AppStore, DTIgnite,百度)充斥着各种安全关键漏洞,攻击者可以利用这些漏洞悄悄地安装任何应用程序,获得危险级别的权限,甚至未经授权访问系统资源。令人惊讶的是,在AIT的所有步骤中都发现了漏洞。我们提出的攻击,被称为幽灵安装程序攻击(GIA),被发现对Android生态系统构成现实威胁。此外,我们开发了用户应用级和系统级防御,既创新又实用。
{"title":"Ghost Installer in the Shadow: Security Analysis of App Installation on Android","authors":"Yeonjoon Lee, Tongxin Li, N. Zhang, Soteris Demetriou, Mingming Zha, Xiaofeng Wang, Kai Chen, Xiao-yong Zhou, Xinhui Han, M. Grace","doi":"10.1109/DSN.2017.33","DOIUrl":"https://doi.org/10.1109/DSN.2017.33","url":null,"abstract":"Android allows developers to build apps with app installation functionality themselves with minimal restriction and support like any other functionalities. Given the critical importance of app installation, the security implications of the approach can be significant. This paper reports the first systematic study on this issue, focusing on the security guarantees of different steps of the App Installation Transaction (AIT). We demonstrate the serious consequences of leaving AIT development to individual developers: most installers (e.g., Amazon AppStore, DTIgnite, Baidu) are riddled with various security-critical loopholes, which can be exploited by attackers to silently install any apps, acquiring dangerous-level permissions or even unauthorized access to system resources. Surprisingly, vulnerabilities were found in all steps of AIT. The attacks we present, dubbed Ghost Installer Attack (GIA), are found to pose a realistic threat to Android ecosystem. Further, we developed both a user-app-level and a system-level defense that are innovative and practical.","PeriodicalId":426928,"journal":{"name":"2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115994864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1