Skip to main content

Showing 1–4 of 4 results for author: Harnik, D

.
  1. arXiv:2404.15198  [pdf, other

    cs.LG cs.IT

    Lossless and Near-Lossless Compression for Foundation Models

    Authors: Moshik Hershcovitch, Leshem Choshen, Andrew Wood, Ilias Enmouri, Peter Chin, Swaminathan Sundararaman, Danny Harnik

    Abstract: With the growth of model sizes and scale of their deployment, their sheer size burdens the infrastructure requiring more network and more storage to accommodate these. While there is a vast literature about reducing model sizes, we investigate a more traditional type of compression -- one that compresses the model to a smaller form and is coupled with a decompression algorithm that returns it to i… ▽ More

    Submitted 5 April, 2024; originally announced April 2024.

  2. arXiv:2205.15545  [pdf, other

    cs.CR cs.DC

    Rethinking Block Storage Encryption with Virtual Disks

    Authors: Danny Harnik, Oded Naor, Effi Ofer, Or Ozery

    Abstract: Disk encryption today uses standard encryption methods that are length preserving and do not require storing any additional information with an encrypted disk sector. This significantly simplifies disk encryption management as the disk map** does not change with encryption. On the other hand, it forces the encryption to be deterministic when data is being overwritten and it disallows integrity m… ▽ More

    Submitted 31 May, 2022; originally announced May 2022.

  3. arXiv:1808.02708  [pdf, other

    cs.CR

    It Takes Two to #MeToo - Using Enclaves to Build Autonomous Trusted Systems

    Authors: Danny Harnik, Paula Ta-Shma, Eliad Tsfadia

    Abstract: We provide enhanced security against insider attacks in services that manage extremely sensitive data. One example is a #MeToo use case where sexual harassment complaints are reported but only revealed when another complaint is filed against the same perpetrator. Such a service places tremendous trust on service operators which our work aims to relieve. To this end we introduce a new autonomous… ▽ More

    Submitted 8 August, 2018; originally announced August 2018.

  4. arXiv:1806.10883  [pdf, other

    cs.CR

    Securing the Storage Data Path with SGX Enclaves

    Authors: Danny Harnik, Eliad Tsfadia, Doron Chen, Ronen Kat

    Abstract: We explore the use of SGX enclaves as a means to improve the security of handling keys and data in storage systems. We study two main configurations for SGX computations, as they apply to performing data-at-rest encryption in a storage system. The first configuration aims to protect the encryption keys used in the encryption process. The second configuration aims to protect both the encryption key… ▽ More

    Submitted 28 June, 2018; originally announced June 2018.