{"title":"Design Alternatives for Performance Monitoring Counter based Malware Detection","authors":"Jordan Pattee, Byeong Kil Lee","doi":"10.1109/IPCCC50635.2020.9391559","DOIUrl":"https://doi.org/10.1109/IPCCC50635.2020.9391559","url":null,"abstract":"Hardware-based malware detection is becoming increasingly important as software-based solutions can be easily compromised by attackers. Many of the existing hardware solutions are based on statistical learning blocks with processor behavioral information, which can be captured from the PMC (performance monitoring counters). The performance of the learning techniques relies primarily on the quality of data. However, due to the limited number of PMCs in a processor, only a few behavioral events can be monitored simultaneously. In this paper, we focus on multiple steps to investigate critical issues of PMC based malware detection: (i) statistical characterization of malware; (ii) distribution-based feature selection; (iii) trade-off analysis of complexity and accuracy; and (iv) design alternatives for PMC-based malware detection. Our experimental results show that the proposed detection scheme can provide highly accurate malware detection. As architectural implications, hardware acceleration as well as additional PMC registers are discussed for more accurate malware detection in real-time.","PeriodicalId":226034,"journal":{"name":"2020 IEEE 39th International Performance Computing and Communications Conference (IPCCC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116918055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"P4SFC: Service Function Chain Offloading with Programmable Switches","authors":"Junte Ma, Sihao Xie, Jin Zhao","doi":"10.1109/IPCCC50635.2020.9391530","DOIUrl":"https://doi.org/10.1109/IPCCC50635.2020.9391530","url":null,"abstract":"A Service Function Chain (SFC) is an ordered sequence of network functions (NFs). Software-based NFs in Network Function Virtualization (NFV) could introduce significant performance overhead. In this paper, we present P4SFC, a high-performance SFC system that leverages P4-capable switches to accelerate packet processing by offloading proper NFs to the switches. First, considering the current limitations of P4, we analyze the offloadability of NFs and divide them into three categories: fully offloadable, partially offloadable, and non-offloadable. Second, when deploying new SFCs, P4SFC automatically offloads proper NFs to switches based on their position and offloadability. To deploy new SFCs at runtime, we design a dynamic P4 data plane, whose execution logic can be reconfigured at runtime without interrupting the current execution logic. Finally, to maintain state consistency between the server and the switch for partially offloaded NFs, we design a state library to automatically synchronize states between servers and switches. Experimental results show that P4SFC achieves significant performance improvement for real-world SFCs.","PeriodicalId":226034,"journal":{"name":"2020 IEEE 39th International Performance Computing and Communications Conference (IPCCC)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117120300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Network Resource Scheduling For Cloud/Edge Data Centers","authors":"Yuhan Zhao, Wei Zhang, Meihong Yang, Huiling Shi","doi":"10.1109/IPCCC50635.2020.9391529","DOIUrl":"https://doi.org/10.1109/IPCCC50635.2020.9391529","url":null,"abstract":"The cloud-edge integration service model combines the advantages of computing capabilities both from cloud and edge. Therefore, the data centers with cloud-edge integrated are an irreversible trend for the evolution of future data center. Software-Defined Network (SDN), emerging as a novel network model, separates content forwarding and control, and that makes resource management across data center network more efficient. This article focuses on the network data transmission and management for future data centers. First, it reviews measurement, analysis, and monitoring methods meant for new features of global SDN network. Then it focuses on unified management of SDN resources like traffic scheduling theory for cross-domain data centers based on cloud. Specifically, we proposed a novel fault response mechanism across the network with a more precise location and less response time. With dynamic changes of cloud computing and edge computing services combined, global QoS control and QoE optimization methods are proposed correspondingly. Finally, a set of SDN control platforms supporting the functions mentioned above are formulated. We hope that our work will shed some new light and provide new theoretical support for cloud-edge-combined cross-domain data center network architecture.","PeriodicalId":226034,"journal":{"name":"2020 IEEE 39th International Performance Computing and Communications Conference (IPCCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129614626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yiding Wang, Zhenyi Wang, Chenghao Li, Yilin Zhang, Haizhou Wang
{"title":"A Multimodal Feature Fusion-Based Method for Individual Depression Detection on Sina Weibo","authors":"Yiding Wang, Zhenyi Wang, Chenghao Li, Yilin Zhang, Haizhou Wang","doi":"10.1109/IPCCC50635.2020.9391501","DOIUrl":"https://doi.org/10.1109/IPCCC50635.2020.9391501","url":null,"abstract":"Existing studies have shown that various types of information on the online social network (OSN) can help predict the early stage of depression. However, studies using machine learning methods to accomplish depression detection tasks still do not have high classification performance, suggesting that there is much potential for improvement in their feature engineering. In this paper, we first construct a dataset on Sina Weibo (a leading OSN with the largest number of active users in the Chinese community), namely the Weibo User Depression Detection Dataset (WU3D). It includes more than 10,000 depressed users and 20,000 normal users, both of which are manually labeled and rechecked by specialists. Then, we extract text-based word features using the popular pretrained model XLNet and summarize nine statistical features related to user text, social behavior, and pictures. Moreover, we construct a deep neural network classification model, i.e. Multimodal Feature Fusion Network (MFFN), to fuse the above-extracted features from different information sources and further accomplish the classification task. The experimental results show that our approach achieves an F1-Score of 0.9685 on the test dataset, which has a good performance improvement compared to the existing works. In addition, we verify that our multimodal detecting approach is more robust than multimodel ensemble ones. Our work could also provide new research methods for depression detection on other OSN platforms.","PeriodicalId":226034,"journal":{"name":"2020 IEEE 39th International Performance Computing and Communications Conference (IPCCC)","volume":"146 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133213210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"REPROOF: Quantifying the Jam Resistance of REBUF","authors":"Joshua Groen, P. Howell, M.D. Collins","doi":"10.1109/IPCCC50635.2020.9391560","DOIUrl":"https://doi.org/10.1109/IPCCC50635.2020.9391560","url":null,"abstract":"REPROOF analytically and experimentally quantifies a Jam Resistant BBC based Uncoordinated Frequency Division Multiplexing (FDM) system that does not require any shared secret.","PeriodicalId":226034,"journal":{"name":"2020 IEEE 39th International Performance Computing and Communications Conference (IPCCC)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116707682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient Architecture Paradigm for Deep Learning Inference as a Service","authors":"Jin Yu, Xiaopeng Ke, Fengyuan Xu, Hao Huang","doi":"10.1109/IPCCC50635.2020.9391551","DOIUrl":"https://doi.org/10.1109/IPCCC50635.2020.9391551","url":null,"abstract":"Deep learning (DL) inference has been broadly used and shown excellent performance in many intelligent applications. Unfortunately, the high resource consumption and training efforts of sophisticated models present obstacles for regular users to enjoy it. Thus, Deep Learning Inference as a Service (DIaaS), offering online inference services on cloud, has earned great popularity among cloud tenants who can send their DIaaS inputs via RPCs across the internal network. However, such detached architecture paradigm is inappropriate to DIaaS because the high-dimensional inputs of DIaaS consume a lot of precious internal bandwidth and the service latency of DIaaS has to be low and stable. We therefore propose a novel architecture paradigm on cloud for DIaaS in order to address the above two problems without giving up the security and maintenance benefits. We first leverage the SGX technology, a strongly-protected user space enclave, to bring DIaaS computation to its input source as close as possible, i.e. co-locating a cloud tenant and its subscribed DIaaS in the same virtual machine. When the GPU acceleration is needed, we migrate this virtual machine to any available GPU host and transparently utilize the GPU via our backend computing stack installed on it. In this way the majority of internal bandwidth is saved compared to traditional paradigm. Furthermore, we greatly improve the efficiency of the proposed architecture paradigm, from the computation and I/O perspectives, by making the entire data flow more DL-oriented. Finally, we implement a prototype system and evaluate it in real-world scenarios. The experiments show that our locality-aware architecture achieves the average single CPU (GPU) based deep learning inference time 2.84X (4.87X) less than the traditional detached architecture on average.","PeriodicalId":226034,"journal":{"name":"2020 IEEE 39th International Performance Computing and Communications Conference (IPCCC)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127238031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Authentication Based on Blockchain","authors":"Norah Alilwit","doi":"10.1109/IPCCC50635.2020.9391553","DOIUrl":"https://doi.org/10.1109/IPCCC50635.2020.9391553","url":null,"abstract":"Blockchain is one of the most trending technologies in past five years and it is called the new generation of the internet. Bitcoin was the first technology that used blockchain concept in its system. Blockchain has intense attention from academic community, developers and programmers, because of its distinctive properties such as decentralization, persistency, anonymity and auditability. Blockchain technology has evolved and is applicable in various applications outside the field. This paper provides background on blockchain technology and presents a suitable and logical solution for user authentication based on blockchain via the unified smart pass platform that allows the user to login with all service providers channels.","PeriodicalId":226034,"journal":{"name":"2020 IEEE 39th International Performance Computing and Communications Conference (IPCCC)","volume":"268 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124350314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Distributed Scheduling Algorithm for Optimizing Age of Information in Wireless Networks","authors":"Dongxiao Yu, Xinpeng Duan, Feng Li, Yi Liang, Huan Yang, Jiguo Yu","doi":"10.1109/IPCCC50635.2020.9391518","DOIUrl":"https://doi.org/10.1109/IPCCC50635.2020.9391518","url":null,"abstract":"Age of Information (AoI) is an emerging concept to model information freshness from the perspective of destinations of information deliveries. Serving as a metric to characterize the data delivery timeliness, the peak age indicates the maximum value of the AoI prior to a data packet reception. In this paper, we present a distributed scheduling algorithm for peak age optimization in a wireless network where a number of sensor nodes attempt to deliver their sensed data to a data collector over a wireless channel. In particular, each sensor node accesses the channel for data delivery independently according to an adaptively tuned transmission probability. The beauty of our algorithm lies in that, even with neither centralized infrastructure nor coordinations among the sensor nodes, our algorithm asymptotically approximates the optimal solution by only a constant factor. We perform solid theoretical analysis and extensive simulations to verify the efficacy of our algorithm. To the best of our knowledge, it is the first fully distributed scheduling algorithm for AoI optimization in wireless networks.","PeriodicalId":226034,"journal":{"name":"2020 IEEE 39th International Performance Computing and Communications Conference (IPCCC)","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122887852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jianzhou Mao, T. Bhattacharya, Xiaopu Peng, T. Cao, X. Qin
{"title":"Modeling Energy Consumption of Virtual Machines in DVFS-Enabled Cloud Data Centers","authors":"Jianzhou Mao, T. Bhattacharya, Xiaopu Peng, T. Cao, X. Qin","doi":"10.1109/IPCCC50635.2020.9391552","DOIUrl":"https://doi.org/10.1109/IPCCC50635.2020.9391552","url":null,"abstract":"To cut back energy consumption of virtual-machine-powered data centers, we build an optimization model for virtual machines running in DVFS-enabled cloud data centers. With the model in place, cloud computing systems are equipped to keep track of dynamic power and static power of processors in virtual machines. Unlike existing dynamic voltage and frequency scaling schemes, our solution orchestrates frequency requirements rather than task execution times. The model makes it possible to obtain an optimal frequency ratio, which minimizes energy consumption of virtual machines. As a result, a data center’s energy efficiency is boosted by controlling CPU frequency to meet the optimal frequency ratio. We demonstrate a way of manipulating frequency ratios to pushing up energy efficiency without violating virtual machines’ frequency requirements. The experimental results unveil that our modeling approach offers a practical way of conserving the energy consumption of virtual machines running in data centers.","PeriodicalId":226034,"journal":{"name":"2020 IEEE 39th International Performance Computing and Communications Conference (IPCCC)","volume":"599 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131277518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xiaobo Cai, Ke Han, Yan Li, Huihui Wang, Jiajin Zhang, Yue Zhang
{"title":"Research on Security Estimation and Control of Cyber-Physical System","authors":"Xiaobo Cai, Ke Han, Yan Li, Huihui Wang, Jiajin Zhang, Yue Zhang","doi":"10.1109/IPCCC50635.2020.9391573","DOIUrl":"https://doi.org/10.1109/IPCCC50635.2020.9391573","url":null,"abstract":"Cyber-Physical Systems (CPS) is a multidimensional complex system that integrates computing, network, and physical environments. Due to the existence of network communications and embedded computers, CPS is vulnerable to attacks, so its security has become an important issue. The paper studies the main types of network attacks and the methods of detection, including the security estimation and control of CPS. Finally, the paper puts forward the key issues and challenges faced by the CPS network attack research.","PeriodicalId":226034,"journal":{"name":"2020 IEEE 39th International Performance Computing and Communications Conference (IPCCC)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131821143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}