首页 > 最新文献

Proceedings of the 16th ACM International Conference on Computing Frontiers最新文献

英文 中文
Towards resilient EU HPC systems: a blueprint 迈向弹性的欧盟高性能计算系统:蓝图
Pub Date : 2019-04-30 DOI: 10.1145/3310273.3323434
Petar Radojkovic
In high-performance computing (HPC) a single tightly-coupled job may execute for days on thousands of servers. Since a server failure typically leads to cascading effects on the whole job, requiring redundancy and/or aggressive checkpointing to prevent the whole job from failing. This has an adverse impact on the system performance and resource usage; which limits the ability to scale to larger systems. System resiliency is therefore one of the most important Exascale requirements and challenges.
在高性能计算(HPC)中,一个紧密耦合的作业可能在数千台服务器上执行数天。由于服务器故障通常会导致整个作业的级联效应,因此需要冗余和/或积极的检查点来防止整个作业失败。这对系统性能和资源使用有不利影响;这限制了扩展到更大系统的能力。因此,系统弹性是Exascale最重要的需求和挑战之一。
{"title":"Towards resilient EU HPC systems: a blueprint","authors":"Petar Radojkovic","doi":"10.1145/3310273.3323434","DOIUrl":"https://doi.org/10.1145/3310273.3323434","url":null,"abstract":"In high-performance computing (HPC) a single tightly-coupled job may execute for days on thousands of servers. Since a server failure typically leads to cascading effects on the whole job, requiring redundancy and/or aggressive checkpointing to prevent the whole job from failing. This has an adverse impact on the system performance and resource usage; which limits the ability to scale to larger systems. System resiliency is therefore one of the most important Exascale requirements and challenges.","PeriodicalId":431860,"journal":{"name":"Proceedings of the 16th ACM International Conference on Computing Frontiers","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125483574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A runtime-adaptive cognitive IoT node for healthcare monitoring 用于医疗监控的运行时自适应认知物联网节点
Pub Date : 2019-04-30 DOI: 10.1145/3310273.3323160
M. A. Scrugli, Daniela Loi, L. Raffo, P. Meloni
Wearable and energy efficient processing nodes, allowing for continuous remote monitoring of patient vital parameters, are mainstream in modern health-care practice. Most recent approaches to the development of such systems combine near-sensor data processing with cognitive computing, to improve at the same time communication efficiency, responsiveness and accuracy of the analysis of the sensed data. In this paper, we present a hardware-software architecture for a connected sensor-processing node that allows the set of in-place processing tasks to be executed to be remotely controllable by an external user. The designed system is capable of dynamically adapting its operating point to the selected computational load, to minimize power consumption. The benefits of the proposed approach are tested on a use-case involving ECG monitoring, that, when selected, performs ECG classification using a lightweigth convolutional neural network. Experimental results show how the proposed approach can provide more than 50% power consumption reduction for common ECG activity, with less than 2% memory footprint overhead and reconfiguring the system in less than 1 ms.
可穿戴和节能处理节点允许对患者重要参数进行持续远程监测,是现代保健实践的主流。最近开发此类系统的方法将近传感器数据处理与认知计算相结合,同时提高了感知数据分析的通信效率、响应能力和准确性。在本文中,我们提出了一种用于连接传感器处理节点的硬件软件架构,该架构允许外部用户远程控制要执行的一组现场处理任务。所设计的系统能够根据所选择的计算负载动态调整其工作点,从而使功耗最小化。在涉及心电监测的用例中测试了所提出方法的优点,当选择时,使用轻量级卷积神经网络执行心电分类。实验结果表明,该方法可以在不到1 ms的时间内将常见ECG活动的功耗降低50%以上,内存占用开销低于2%,并可以重新配置系统。
{"title":"A runtime-adaptive cognitive IoT node for healthcare monitoring","authors":"M. A. Scrugli, Daniela Loi, L. Raffo, P. Meloni","doi":"10.1145/3310273.3323160","DOIUrl":"https://doi.org/10.1145/3310273.3323160","url":null,"abstract":"Wearable and energy efficient processing nodes, allowing for continuous remote monitoring of patient vital parameters, are mainstream in modern health-care practice. Most recent approaches to the development of such systems combine near-sensor data processing with cognitive computing, to improve at the same time communication efficiency, responsiveness and accuracy of the analysis of the sensed data. In this paper, we present a hardware-software architecture for a connected sensor-processing node that allows the set of in-place processing tasks to be executed to be remotely controllable by an external user. The designed system is capable of dynamically adapting its operating point to the selected computational load, to minimize power consumption. The benefits of the proposed approach are tested on a use-case involving ECG monitoring, that, when selected, performs ECG classification using a lightweigth convolutional neural network. Experimental results show how the proposed approach can provide more than 50% power consumption reduction for common ECG activity, with less than 2% memory footprint overhead and reconfiguring the system in less than 1 ms.","PeriodicalId":431860,"journal":{"name":"Proceedings of the 16th ACM International Conference on Computing Frontiers","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130767028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A secure and authenticated host-to-memory communication interface 一个安全且经过身份验证的主机到内存通信接口
Pub Date : 2019-04-30 DOI: 10.1145/3310273.3323401
Niccolò Izzo, Alessandro Barenghi, L. Breveglieri, Gerardo Pelosi, P. Amato
Emerging non-volatile memories (NVMs) have the potential to change the memory-storage hierarchy in computing devices, and even to replace DRAM as main memories. In fact NVMs, beside offering byte-addressability and data persistence, promise better scalability and higher capacity than DRAM. However, from a security point of view, the persistent nature of emerging memories provides a larger time window to exfiltrate data from a device with respect to current DRAM-based main memories, and NVMs have in general lower write endurance than DRAM, thus requiring wear-out conscious encryption schemes. In this work we propose an architectural solution to secure non-volatile emerging memories, providing confidentiality, integrity and authenticity to the entire set of data, addresses and commands. Our solution relies on securing and authenticating the entire information transport between the host controller and the memory, enabling the storage of cleartext data inside the NVM. Such an approach allows to retain the advantage of differential write strategies without forsaking security. We validate our proposed architecture through the simulation of a set of software benchmarks on an embedded architecture, employing the gem5 trace-based architectural simulator.
新兴的非易失性存储器(nvm)有可能改变计算设备中的存储器-存储层次结构,甚至取代DRAM作为主存储器。事实上,nvm除了提供字节寻址能力和数据持久性之外,还承诺比DRAM具有更好的可伸缩性和更高的容量。然而,从安全的角度来看,相对于当前基于DRAM的主存储器,新兴存储器的持久性为从设备中泄漏数据提供了更大的时间窗口,并且nvm通常比DRAM具有更低的写入持久性,因此需要磨损意识加密方案。在这项工作中,我们提出了一种架构解决方案来保护非易失性新兴存储器,为整个数据,地址和命令集提供机密性,完整性和真实性。我们的解决方案依赖于保护和验证主机控制器和内存之间的整个信息传输,从而在NVM中存储明文数据。这种方法允许在不放弃安全性的情况下保留差异写策略的优势。我们使用基于gem5跟踪的体系结构模拟器,通过在嵌入式体系结构上模拟一组软件基准来验证我们提出的体系结构。
{"title":"A secure and authenticated host-to-memory communication interface","authors":"Niccolò Izzo, Alessandro Barenghi, L. Breveglieri, Gerardo Pelosi, P. Amato","doi":"10.1145/3310273.3323401","DOIUrl":"https://doi.org/10.1145/3310273.3323401","url":null,"abstract":"Emerging non-volatile memories (NVMs) have the potential to change the memory-storage hierarchy in computing devices, and even to replace DRAM as main memories. In fact NVMs, beside offering byte-addressability and data persistence, promise better scalability and higher capacity than DRAM. However, from a security point of view, the persistent nature of emerging memories provides a larger time window to exfiltrate data from a device with respect to current DRAM-based main memories, and NVMs have in general lower write endurance than DRAM, thus requiring wear-out conscious encryption schemes. In this work we propose an architectural solution to secure non-volatile emerging memories, providing confidentiality, integrity and authenticity to the entire set of data, addresses and commands. Our solution relies on securing and authenticating the entire information transport between the host controller and the memory, enabling the storage of cleartext data inside the NVM. Such an approach allows to retain the advantage of differential write strategies without forsaking security. We validate our proposed architecture through the simulation of a set of software benchmarks on an embedded architecture, employing the gem5 trace-based architectural simulator.","PeriodicalId":431860,"journal":{"name":"Proceedings of the 16th ACM International Conference on Computing Frontiers","volume":"516 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132967453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An hybrid approach to accelerate a molecular docking application for virtual screening in heterogeneous nodes: POSTER 一种加速异构节点虚拟筛选分子对接应用的混合方法:POSTER
Pub Date : 2019-04-30 DOI: 10.1145/3310273.3323426
E. Vitali, D. Gadioli, A. Beccari, C. Cavazzoni, C. Silvano, G. Palermo
Molecular Docking is a crucial task in the process of Drug Discovery. This task consists in the estimation of the position of a molecule inside the docking site. It is used in the early stages of the drug discovery process to perform a virtual screening of a large library of molecule candidates. This task is usually performed using High Performance Computing platforms, due to sheer number of candidates and due to complexity of the docking problem. In this work we ported and optimized a Molecular Docking Module to an heterogeneous system with one or more GPGPU accelerators, leveraging the directive languages OpenMP and OpenACC. We show that with the proposed approach, we are able to reach a better utilization of the available resources compared to the usual CPU/GPU data splitting, reaching a 25% throughput improvement within the single node.
分子对接是药物发现过程中的一项重要任务。这项任务包括估计分子在对接点内的位置。它用于药物发现过程的早期阶段,对大量候选分子库进行虚拟筛选。由于候选节点的数量和对接问题的复杂性,该任务通常使用高性能计算平台执行。在这项工作中,我们利用指令语言OpenMP和OpenACC,将一个分子对接模块移植并优化到一个具有一个或多个GPGPU加速器的异构系统。我们表明,与通常的CPU/GPU数据分割相比,使用所提出的方法,我们能够更好地利用可用资源,在单个节点内达到25%的吞吐量改进。
{"title":"An hybrid approach to accelerate a molecular docking application for virtual screening in heterogeneous nodes: POSTER","authors":"E. Vitali, D. Gadioli, A. Beccari, C. Cavazzoni, C. Silvano, G. Palermo","doi":"10.1145/3310273.3323426","DOIUrl":"https://doi.org/10.1145/3310273.3323426","url":null,"abstract":"Molecular Docking is a crucial task in the process of Drug Discovery. This task consists in the estimation of the position of a molecule inside the docking site. It is used in the early stages of the drug discovery process to perform a virtual screening of a large library of molecule candidates. This task is usually performed using High Performance Computing platforms, due to sheer number of candidates and due to complexity of the docking problem. In this work we ported and optimized a Molecular Docking Module to an heterogeneous system with one or more GPGPU accelerators, leveraging the directive languages OpenMP and OpenACC. We show that with the proposed approach, we are able to reach a better utilization of the available resources compared to the usual CPU/GPU data splitting, reaching a 25% throughput improvement within the single node.","PeriodicalId":431860,"journal":{"name":"Proceedings of the 16th ACM International Conference on Computing Frontiers","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115505405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quantum computing simulator on a heterogenous HPC system 异构高性能计算系统上的量子计算模拟器
Pub Date : 2019-04-30 DOI: 10.1145/3310273.3323053
J. Doi, Hitomi Takahashi, Raymond H. Putra, T. Imamichi, H. Horii
Quantum computing simulation on a classical computer is difficult due to the exponential runtime and memory overhead. Previous work addresses the difficulty by utilizing multiple Graphical Processing Units (GPUs) and multi-node computers. GPUs are efficient for handling runtime issues but have limited total accessible memory space. Meanwhile, the memory of a multi-node computer can be scaled to the petabytes order, but its bandwidth for access from host computers (CPUs) is narrow. To simultaneously accelerate simulation and enlarge the total memory space, we propose a heterogeneous parallelization approach by combining GPUs and CPUs. Our simulator allocates memory to the GPUs first, and then to the CPUs. It thus accelerates simulation by using the full capabilities of the GPUs if memory for the simulation fits in the GPUs on a cluster. Allocating memory to the CPUs reduces benefits of the GPUs but enlarges the capacity of qubits in the simulation. In such case, it can exploit the memory of the GPUs to add one more qubit in the simulation if the size of memory in a node is the power of two (such as 512GB). We show empirical performance evaluations of our simulator in a distributed environment of POWER9.
由于运行时间和内存开销呈指数级增长,在经典计算机上进行量子计算模拟非常困难。以前的工作通过利用多个图形处理单元(gpu)和多节点计算机解决了这个问题。gpu在处理运行时问题方面效率很高,但总的可访问内存空间有限。同时,多节点计算机的内存可以扩展到pb级,但其用于主机(cpu)访问的带宽很窄。为了同时加速仿真和扩大总内存空间,我们提出了一种将gpu和cpu相结合的异构并行化方法。我们的模拟器首先将内存分配给gpu,然后再分配给cpu。因此,它通过使用gpu的全部功能来加速模拟,如果模拟的内存适合集群上的gpu。将内存分配给cpu降低了gpu的优势,但在模拟中增加了量子位的容量。在这种情况下,如果节点的内存大小是2的幂(例如512GB),则可以利用gpu的内存在模拟中添加一个多量子位。我们在POWER9的分布式环境中展示了模拟器的经验性能评估。
{"title":"Quantum computing simulator on a heterogenous HPC system","authors":"J. Doi, Hitomi Takahashi, Raymond H. Putra, T. Imamichi, H. Horii","doi":"10.1145/3310273.3323053","DOIUrl":"https://doi.org/10.1145/3310273.3323053","url":null,"abstract":"Quantum computing simulation on a classical computer is difficult due to the exponential runtime and memory overhead. Previous work addresses the difficulty by utilizing multiple Graphical Processing Units (GPUs) and multi-node computers. GPUs are efficient for handling runtime issues but have limited total accessible memory space. Meanwhile, the memory of a multi-node computer can be scaled to the petabytes order, but its bandwidth for access from host computers (CPUs) is narrow. To simultaneously accelerate simulation and enlarge the total memory space, we propose a heterogeneous parallelization approach by combining GPUs and CPUs. Our simulator allocates memory to the GPUs first, and then to the CPUs. It thus accelerates simulation by using the full capabilities of the GPUs if memory for the simulation fits in the GPUs on a cluster. Allocating memory to the CPUs reduces benefits of the GPUs but enlarges the capacity of qubits in the simulation. In such case, it can exploit the memory of the GPUs to add one more qubit in the simulation if the size of memory in a node is the power of two (such as 512GB). We show empirical performance evaluations of our simulator in a distributed environment of POWER9.","PeriodicalId":431860,"journal":{"name":"Proceedings of the 16th ACM International Conference on Computing Frontiers","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134407680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Next-generation arithmetic: major performance gains with minimal disruption 下一代算法:主要性能增益与最小的干扰
Pub Date : 2019-04-30 DOI: 10.1145/3310273.3324895
John L. Gustafson
Moore's law made application developers lazy, since they could rely on increases in clock speeds and transistor density to improve the performance of their codes with little or no rewriting required. The frontiers of supercomputing, such as quantum computing, are certainly exciting and promising, but also highly disruptive... even more so than the shift from serial to parallel computing. They require a complete rewrite of millions of lines of software, and the invention of completely different algorithms.
摩尔定律使应用程序开发人员变得懒惰,因为他们可以依靠时钟速度和晶体管密度的增加来提高代码的性能,而几乎不需要重写。超级计算的前沿,如量子计算,当然是令人兴奋和有前途的,但也具有高度的破坏性……甚至比从串行计算到并行计算的转变更重要。它们需要完全重写数百万行软件,并发明完全不同的算法。
{"title":"Next-generation arithmetic: major performance gains with minimal disruption","authors":"John L. Gustafson","doi":"10.1145/3310273.3324895","DOIUrl":"https://doi.org/10.1145/3310273.3324895","url":null,"abstract":"Moore's law made application developers lazy, since they could rely on increases in clock speeds and transistor density to improve the performance of their codes with little or no rewriting required. The frontiers of supercomputing, such as quantum computing, are certainly exciting and promising, but also highly disruptive... even more so than the shift from serial to parallel computing. They require a complete rewrite of millions of lines of software, and the invention of completely different algorithms.","PeriodicalId":431860,"journal":{"name":"Proceedings of the 16th ACM International Conference on Computing Frontiers","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134074650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analyzing the suitability of contemporary 3D-stacked PIM architectures for HPC scientific applications 分析当代3d堆叠PIM架构对高性能计算科学应用的适用性
Pub Date : 2019-04-30 DOI: 10.1145/3310273.3322831
I. Peng, J. Vetter, S. Moore, Joydeep Rakshit, S. Markidis
Scaling off-chip bandwidth is challenging due to fundamental limitations, such as a fixed pin count and plateauing signaling rates. Recently, vendors have turned to 2.5D and 3D stacking to closely integrate system components. Interestingly, these technologies can integrate a logic layer under multiple memory dies, enabling computing capability inside a memory stack. This trend in stacking is making PIM architectures commercially viable. In this work, we investigate the suitability of offloading kernels in scientific applications onto 3D stacked PIM architectures. We evaluate several hardware constraints resulted from the stacked structure. We perform extensive simulation experiments and in-depth analysis to quantify the impact of application locality in TLBs, data caches, and memory stacks. Our results also identify design optimization areas in software and hardware for HPC scientific applications.
由于基本的限制,如固定的引脚数和稳定的信号速率,扩展片外带宽是具有挑战性的。最近,供应商已经转向2.5D和3D堆叠,以紧密集成系统组件。有趣的是,这些技术可以在多个内存芯片下集成逻辑层,从而在内存堆栈内实现计算能力。这种堆叠的趋势使得PIM架构在商业上可行。在这项工作中,我们研究了在科学应用中卸载内核到3D堆叠PIM架构的适用性。我们评估了由堆叠结构引起的几种硬件约束。我们进行了广泛的模拟实验和深入分析,以量化应用程序局部性在tlb、数据缓存和内存堆栈中的影响。我们的研究结果还确定了HPC科学应用软件和硬件的设计优化领域。
{"title":"Analyzing the suitability of contemporary 3D-stacked PIM architectures for HPC scientific applications","authors":"I. Peng, J. Vetter, S. Moore, Joydeep Rakshit, S. Markidis","doi":"10.1145/3310273.3322831","DOIUrl":"https://doi.org/10.1145/3310273.3322831","url":null,"abstract":"Scaling off-chip bandwidth is challenging due to fundamental limitations, such as a fixed pin count and plateauing signaling rates. Recently, vendors have turned to 2.5D and 3D stacking to closely integrate system components. Interestingly, these technologies can integrate a logic layer under multiple memory dies, enabling computing capability inside a memory stack. This trend in stacking is making PIM architectures commercially viable. In this work, we investigate the suitability of offloading kernels in scientific applications onto 3D stacked PIM architectures. We evaluate several hardware constraints resulted from the stacked structure. We perform extensive simulation experiments and in-depth analysis to quantify the impact of application locality in TLBs, data caches, and memory stacks. Our results also identify design optimization areas in software and hardware for HPC scientific applications.","PeriodicalId":431860,"journal":{"name":"Proceedings of the 16th ACM International Conference on Computing Frontiers","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134304614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
SPADA
Pub Date : 2019-04-30 DOI: 10.1145/3310273.3321557
F. B. Moreira, Daniel A. G. Oliveira, P. Navaux
One of the main challenges in system security is the detection of vulnerability exploitation, especially valid control flow exploitation. The specificity of state-of-the-art methods, such as signature-based detection, becomes a limiting factor when detecting the latest exploits and attacks uncovered. We propose the detection of exploit executions by partitioning applications into phases, characterized by their Basic Block activity, and a phase behavior analysis. In contrast to previous works, our technique can detect exploits which use proper application control flows, such as Heartbleed. Moreover, our method identifies instances under attack using simple and statistically relevant phase features to profile control flow.
{"title":"SPADA","authors":"F. B. Moreira, Daniel A. G. Oliveira, P. Navaux","doi":"10.1145/3310273.3321557","DOIUrl":"https://doi.org/10.1145/3310273.3321557","url":null,"abstract":"One of the main challenges in system security is the detection of vulnerability exploitation, especially valid control flow exploitation. The specificity of state-of-the-art methods, such as signature-based detection, becomes a limiting factor when detecting the latest exploits and attacks uncovered. We propose the detection of exploit executions by partitioning applications into phases, characterized by their Basic Block activity, and a phase behavior analysis. In contrast to previous works, our technique can detect exploits which use proper application control flows, such as Heartbleed. Moreover, our method identifies instances under attack using simple and statistically relevant phase features to profile control flow.","PeriodicalId":431860,"journal":{"name":"Proceedings of the 16th ACM International Conference on Computing Frontiers","volume":"448 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123276901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Assessing transferability of adversarial examples against malware detection classifiers 评估针对恶意软件检测分类器的对抗性示例的可转移性
Pub Date : 2019-04-30 DOI: 10.1145/3310273.3323072
Yixiang Wang, Jiqiang Liu, Xiaolin Chang
Machine learning (ML) algorithms provide better performance than traditional algorithms in various applications. However, some unknown flaws in ML classifiers make them sensitive to adversarial examples generated by adding small but fooled purposeful distortions to natural examples. This paper aims to investigate the transferability of adversarial examples generated on a sparse and structured dataset and the ability of adversarial training in resisting adversarial examples. The results demonstrate that adversarial examples generated by DNN can fool a set of ML classifiers such as decision tree, random forest, SVM, CNN and RNN. Also, adversarial training can improve the robustness of DNN in terms of resisting attacks.
机器学习(ML)算法在各种应用中提供比传统算法更好的性能。然而,ML分类器中的一些未知缺陷使它们对通过在自然示例中添加小而有目的的扭曲而生成的对抗性示例敏感。本文旨在研究在稀疏和结构化数据集上生成的对抗性示例的可转移性以及对抗性训练在抵抗对抗性示例中的能力。结果表明,DNN生成的对抗样例可以骗过决策树、随机森林、SVM、CNN和RNN等ML分类器。此外,对抗训练可以提高DNN在抵抗攻击方面的鲁棒性。
{"title":"Assessing transferability of adversarial examples against malware detection classifiers","authors":"Yixiang Wang, Jiqiang Liu, Xiaolin Chang","doi":"10.1145/3310273.3323072","DOIUrl":"https://doi.org/10.1145/3310273.3323072","url":null,"abstract":"Machine learning (ML) algorithms provide better performance than traditional algorithms in various applications. However, some unknown flaws in ML classifiers make them sensitive to adversarial examples generated by adding small but fooled purposeful distortions to natural examples. This paper aims to investigate the transferability of adversarial examples generated on a sparse and structured dataset and the ability of adversarial training in resisting adversarial examples. The results demonstrate that adversarial examples generated by DNN can fool a set of ML classifiers such as decision tree, random forest, SVM, CNN and RNN. Also, adversarial training can improve the robustness of DNN in terms of resisting attacks.","PeriodicalId":431860,"journal":{"name":"Proceedings of the 16th ACM International Conference on Computing Frontiers","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124097337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Capturing source code semantics via tree-based convolution over API-enhanced AST 通过基于树的卷积在api增强的AST上捕获源代码语义
Pub Date : 2019-04-30 DOI: 10.1145/3310273.3321560
Long Chen, Wei Ye, Shikun Zhang
When deep learning meets big code, a key question is how to efficiently learn a distributed representation for source code that can capture its semantics effectively. We propose to use tree-based convolution over API-enhanced AST. To demonstrate the effectiveness of our approach, we apply it to detect semantic clones---code fragments with similar semantics but dissimilar syntax. Experiment results show that our approach outperforms an existing state-of-the-art approach that uses tree-based LSTM, with an increase of 0.39 and 0.12 in F1-score on OJClone and BigCloneBench respectively. We further propose architectures that incorporate our approach for code search and code summarization.
当深度学习遇到大代码时,一个关键问题是如何有效地学习源代码的分布式表示,从而有效地捕获其语义。我们建议在api增强的AST上使用基于树的卷积。为了证明我们方法的有效性,我们将其应用于检测语义克隆——语义相似但语法不同的代码片段。实验结果表明,我们的方法优于现有的基于树的LSTM方法,在OJClone和BigCloneBench上的f1得分分别提高了0.39和0.12。我们进一步提出了包含我们的代码搜索和代码总结方法的架构。
{"title":"Capturing source code semantics via tree-based convolution over API-enhanced AST","authors":"Long Chen, Wei Ye, Shikun Zhang","doi":"10.1145/3310273.3321560","DOIUrl":"https://doi.org/10.1145/3310273.3321560","url":null,"abstract":"When deep learning meets big code, a key question is how to efficiently learn a distributed representation for source code that can capture its semantics effectively. We propose to use tree-based convolution over API-enhanced AST. To demonstrate the effectiveness of our approach, we apply it to detect semantic clones---code fragments with similar semantics but dissimilar syntax. Experiment results show that our approach outperforms an existing state-of-the-art approach that uses tree-based LSTM, with an increase of 0.39 and 0.12 in F1-score on OJClone and BigCloneBench respectively. We further propose architectures that incorporate our approach for code search and code summarization.","PeriodicalId":431860,"journal":{"name":"Proceedings of the 16th ACM International Conference on Computing Frontiers","volume":"20 3 Suppl 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132507084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
期刊
Proceedings of the 16th ACM International Conference on Computing Frontiers
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1