2021 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)最新文献

筛选
英文 中文
MILR: Mathematically Induced Layer Recovery for Plaintext Space Error Correction of CNNs 用于cnn明文空间纠错的数学诱导层恢复
Jonathan Ponader, S. Kundu, Yan Solihin
{"title":"MILR: Mathematically Induced Layer Recovery for Plaintext Space Error Correction of CNNs","authors":"Jonathan Ponader, S. Kundu, Yan Solihin","doi":"10.1109/DSN48987.2021.00024","DOIUrl":"https://doi.org/10.1109/DSN48987.2021.00024","url":null,"abstract":"The increased use of Convolutional Neural Networks (CNN) in mission-critical systems has increased the need for robust and resilient networks in the face of both naturally occurring faults as well as security attacks. The lack of robustness and resiliency can lead to unreliable inference results. Current methods that address CNN robustness require hardware modification, network modification, or network duplication. This paper proposes MILR a software-based CNN error detection and error correction system that enables recovery from single and multi-bit errors. The recovery capabilities are based on mathematical relationships between the inputs, outputs, and parameters(weights) of the layers; exploiting these relationships allows the recovery of erroneous parameters (iveights) throughout a layer and the network. MILR is suitable for plaintext-space error correction (PSEC) given its ability to correct whole-weight and even whole-layer errors in CNNs.","PeriodicalId":222512,"journal":{"name":"2021 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130488291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
External Reviewers 审稿人
Agata Pólrola, A. Lafuente, Aleksandra Jovanovic, Alexander Heußner, Andreas Dahlin, A. Mokhov, A. Alekseyev, Artur Meski, Aurel Randolph, D. Sokolov, D. Lime, Dominic Wist, Egor Derevenetc, F. Tiezzi, F. Pommereau, Georgel Calin, G. Geeraerts, Hakima Ould-Slimane, H. Bruggink, Henning Kerstan, Henri Hansen, Hernán C. Melgratti, I. Poliakov, Jan Křetínský, J. Markovski, Jason Steggles, J. Keiren, J. Gabarró, Johan Ersfolk, J. Cortadella, Jori Dubrovin, L. Yoong, Lukasz Mikulski, Maciej Gazda, M. Koutny, M. Szreter, M. Lawford, M. Hendriks, Mathieu Sassolas, M. Knapik, M. Reniers, M. Loreti, Mike Gemünde, Mikko Tiusanen, N. Bertrand, N. Sznajder, Nikola Benes, O. Gaggi, P. Moreaux, Petr Bauch, Petr Ročkai, Reiner Hüchting, Ricardo J. Rodríguez, R. Sinha, Sandie Balaguer, Sidharta Andalam, Siert Wieringa, Simona Bernardi, S. Georgievska, Stanislavs Golubcovs, Stefan Göller, S. Haar, Stefan Schwoon, Tall Bremehr, T. Massart, T. Willemse, Vera Pantelic, Xiang Gan, Y. Thierry-Mieg, Zdenek Sawa
{"title":"External Reviewers","authors":"Agata Pólrola, A. Lafuente, Aleksandra Jovanovic, Alexander Heußner, Andreas Dahlin, A. Mokhov, A. Alekseyev, Artur Meski, Aurel Randolph, D. Sokolov, D. Lime, Dominic Wist, Egor Derevenetc, F. Tiezzi, F. Pommereau, Georgel Calin, G. Geeraerts, Hakima Ould-Slimane, H. Bruggink, Henning Kerstan, Henri Hansen, Hernán C. Melgratti, I. Poliakov, Jan Křetínský, J. Markovski, Jason Steggles, J. Keiren, J. Gabarró, Johan Ersfolk, J. Cortadella, Jori Dubrovin, L. Yoong, Lukasz Mikulski, Maciej Gazda, M. Koutny, M. Szreter, M. Lawford, M. Hendriks, Mathieu Sassolas, M. Knapik, M. Reniers, M. Loreti, Mike Gemünde, Mikko Tiusanen, N. Bertrand, N. Sznajder, Nikola Benes, O. Gaggi, P. Moreaux, Petr Bauch, Petr Ročkai, Reiner Hüchting, Ricardo J. Rodríguez, R. Sinha, Sandie Balaguer, Sidharta Andalam, Siert Wieringa, Simona Bernardi, S. Georgievska, Stanislavs Golubcovs, Stefan Göller, S. Haar, Stefan Schwoon, Tall Bremehr, T. Massart, T. Willemse, Vera Pantelic, Xiang Gan, Y. Thierry-Mieg, Zdenek Sawa","doi":"10.1109/ANCS.2011.8","DOIUrl":"https://doi.org/10.1109/ANCS.2011.8","url":null,"abstract":"Kubilay Atasu, IBM Research Zurich, Switzerland Robert Birke, IBM Research Zurich, Switzerland Daniel Crisan, IBM Research Zurich, Switzerland Thomas Ebi, Karlsruhe Institute of Technology, Germany Holger Endt, BMW Research & Technology, Germany Kimon Karras, Technische Universität München, Germany Pranay Koka, Oracle, USA Daniel Llorente, Cisco Cyriel Minkenberg, IBM Research Zurich, Switzerland Dongkook Park, Intel, USA Holm Rauchfuss, Technische Universität München, Germany Christian Renner, Technische Universität Hamburg-Harburg, Germany Fulvio Risso, Politecnico di Torino, Italy Germán Rodríguez, IBM Research Zurich, Switzerland Hermann Seuschek, Technische Universität München, Germany Georg Sigl, Technische Universität München, Germany Ioannis Sourdis, Chalmers University of Technology, Sweden Hariharan Thantry, Intel, USA Thomas Zink, University of Konstanz, Germany","PeriodicalId":222512,"journal":{"name":"2021 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125316396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
When Program Analysis Meets Bytecode Search: Targeted and Efficient Inter-procedural Analysis of Modern Android Apps in BackDroid 当程序分析遇到字节码搜索:BackDroid中现代Android应用程序的目标和有效的程序间分析
Daoyuan Wu, Debin Gao, R. Deng, R. Chang
{"title":"When Program Analysis Meets Bytecode Search: Targeted and Efficient Inter-procedural Analysis of Modern Android Apps in BackDroid","authors":"Daoyuan Wu, Debin Gao, R. Deng, R. Chang","doi":"10.1109/DSN48987.2021.00063","DOIUrl":"https://doi.org/10.1109/DSN48987.2021.00063","url":null,"abstract":"Widely-used Android static program analysis tools, e.g., Amandroid and FlowDroid, perform the whole-app inter-procedural analysis that is comprehensive but fundamentally difficult to handle modern (large) apps. The average app size has increased three to four times over five years. In this paper, we explore a new paradigm of targeted inter-procedural analysis that can skip irrelevant code and focus only on the flows of security-sensitive sink APIs. To this end, we propose a technique called on-the-fly bytecode search, which searches the disassembled app bytecode text just in time when a caller needs to be located. In this way, it guides targeted (and backward) inter-procedural analysis step by step until reaching entry points, without relying on a whole-app graph. Such search-based inter-procedural analysis, however, is challenging due to Java polymorphism, callbacks, asynchronous flows, static initializers, and inter-component communication in Android apps. We overcome these unique obstacles in our context by proposing a set of bytecode search mechanisms that utilize flexible searches and forward object taint analysis. Atop this new inter-procedural analysis, we further adjust the traditional backward slicing and forward constant propagation to provide the complete dataflow tracking of sink API calls. We have implemented a prototype called BackDroid and compared it with Amandroid in analyzing 3,178 modern popular apps for crypto and SSL misconfigurations. The evaluation shows that for such sink-based problems, BackDroid is 37 times faster (2.13v.s. 78.15 minutes) and has no timed-out failure (v.s. 35% in Amandroid) while maintaining close or even better detection effectiveness.","PeriodicalId":222512,"journal":{"name":"2021 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127638984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Low-cost Fault Corrector for Deep Neural Networks through Range Restriction 通过范围限制为深度神经网络设计低成本纠错器
Zitao Chen, Guanpeng Li, K. Pattabiraman
{"title":"A Low-cost Fault Corrector for Deep Neural Networks through Range Restriction","authors":"Zitao Chen, Guanpeng Li, K. Pattabiraman","doi":"10.1109/DSN48987.2021.00018","DOIUrl":"https://doi.org/10.1109/DSN48987.2021.00018","url":null,"abstract":"The adoption of deep neural networks (DNNs) in safety-critical domains has engendered serious reliability concerns. A prominent example is hardware transient faults that are growing in frequency due to the progressive technology scaling, and can lead to failures in DNNs. This work proposes Ranger, a low-cost fault corrector, which directly rectifies the faulty output due to transient faults without re-computation. DNNs are inherently resilient to benign faults (which will not cause output corruption), but not to critical faults (which can result in erroneous output). Ranger is an automated transformation to selectively restrict the value ranges in DNNs, which reduces the large deviations caused by critical faults and transforms them to benign faults that can be tolerated by the inherent resilience of the DNNs. Our evaluation on 8 DNNs demonstrates Ranger significantly increases the error resilience of the DNNs (by 3x to 50x), with no loss in accuracy, and with negligible overheads.","PeriodicalId":222512,"journal":{"name":"2021 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":" 1","pages":"1-13"},"PeriodicalIF":0.0,"publicationDate":"2020-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141220123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 57
EncDBDB: Searchable Encrypted, Fast, Compressed, In-Memory Database Using Enclaves EncDBDB:可搜索的加密,快速,压缩,内存数据库使用enclave
Benny Fuhry, A. JayanthJainH, Florian Kerschbaum Sap Security Research, U. Waterloo
{"title":"EncDBDB: Searchable Encrypted, Fast, Compressed, In-Memory Database Using Enclaves","authors":"Benny Fuhry, A. JayanthJainH, Florian Kerschbaum Sap Security Research, U. Waterloo","doi":"10.1109/DSN48987.2021.00054","DOIUrl":"https://doi.org/10.1109/DSN48987.2021.00054","url":null,"abstract":"Data confidentiality is an important requirement for clients when outsourcing databases to the cloud. Trusted execution environments, such as Intel SGX, offer an efficient solution to this confidentiality problem. However, existing TEE-based solutions are not optimized for column-oriented, in-memory databases and pose impractical memory requirements on the enclave. We present EncDBDB, a novel approach for client-controlled encryption of a column-oriented, in-memory databases allowing range searches using an enclave. EncDBDB offers nine encrypted dictionaries, which provide different security, performance, and storage efficiency tradeoffs for the data. It is especially suited for complex, read-oriented, analytic queries as present, e.g., in data warehouses. The computational overhead compared to plaintext processing is within a millisecond even for databases with millions of entries and the leakage is limited. Compressed encrypted data requires less space than a corresponding plaintext column. Furthermore, EncDBDB’s enclave is very small reducing the potential for security-relevant implementation errors and side-channel leakages.","PeriodicalId":222512,"journal":{"name":"2021 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117026935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Title Page iii 第三页标题
Ray Walshe
{"title":"Title Page iii","authors":"Ray Walshe","doi":"10.1109/ihmsc.2018.10099","DOIUrl":"https://doi.org/10.1109/ihmsc.2018.10099","url":null,"abstract":"","PeriodicalId":222512,"journal":{"name":"2021 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134043740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Message from the Programme Chairs 节目主持人的致辞
J. Verner, G. Travassos
{"title":"Message from the Programme Chairs","authors":"J. Verner, G. Travassos","doi":"10.1109/ISESE.2005.1541804","DOIUrl":"https://doi.org/10.1109/ISESE.2005.1541804","url":null,"abstract":"Welcome to the DSN 2020 research track! We have been honored to serve as TPC co-chairs at a special time in DSN’s history, as it celebrates its 50th edition as the premiere research venue for dependable computing on the planet. Since the first edition of DSN’s precursor, the Symposium on Fault Tolerant Computing in March 1971 in Pasadena, society has undergone tremendous technological transformation. As a result, our reliance on dependable computing has never been higher from the smallest IoT sensor implants to the largest planetary scale networks and everything in between. The range of impairments have also grown from early focus on benign errors to today’s large scale malicious attacks.","PeriodicalId":222512,"journal":{"name":"2021 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127094552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信