Skip to main content

Showing 1–20 of 20 results for author: Hendler, D

.
  1. arXiv:2308.03485  [pdf, other

    cs.DC

    Recoverable and Detectable Self-Implementations of Swap

    Authors: Tomer Lev Lehman, Hagit Attiya, Danny Hendler

    Abstract: Recoverable algorithms tolerate failures and recoveries of processes by using non-volatile memory. Of particular interest are self-implementations of key operations, in which a recoverable operation is implemented from its non-recoverable counterpart (in addition to reads and writes). This paper presents two self-implementations of the SWAP operation. One works in the system-wide failures model, w… ▽ More

    Submitted 7 August, 2023; originally announced August 2023.

  2. arXiv:2204.11584  [pdf, other

    cs.DC

    Recovery of Distributed Iterative Solvers for Linear Systems Using Non-Volatile RAM

    Authors: Yehonatan Fridman, Yaniv Snir, Harel Levin, Danny Hendler, Hagit Attiya, Gal Oren

    Abstract: HPC systems are a critical resource for scientific research. The increased demand for computational power and memory ushers in the exascale era, in which supercomputers are designed to provide enormous computing power to meet these needs. These complex supercomputers consist of numerous compute nodes and are consequently expected to experience frequent faults and crashes. Mathematical solvers, i… ▽ More

    Submitted 9 August, 2022; v1 submitted 25 April, 2022; originally announced April 2022.

    Comments: 10 pages, 10 figures

  3. arXiv:2203.13495  [pdf, other

    cs.SI cs.LG

    Machine-Learning Based Objective Function Selection for Community Detection

    Authors: Asa Bornstein, Amir Rubin, Danny Hendler

    Abstract: NECTAR, a Node-centric ovErlap** Community deTection AlgoRithm, presented in 2016 by Cohen et. al, chooses dynamically between two objective functions which function to optimize, based on the network on which it is invoked. This approach, as shown by Cohen et al., outperforms six state-of-the-art algorithms for overlap** community detection. In this work, we present NECTAR-ML, an extension of… ▽ More

    Submitted 25 March, 2022; originally announced March 2022.

  4. arXiv:2109.02166  [pdf, other

    cs.DC

    Assessing the Use Cases of Persistent Memory in High-Performance Scientific Computing

    Authors: Yehonatan Fridman, Yaniv Snir, Matan Rusanovsky, Kfir Zvi, Harel Levin, Danny Hendler, Hagit Attiya, Gal Oren

    Abstract: As the High Performance Computing world moves towards the Exa-Scale era, huge amounts of data should be analyzed, manipulated and stored. In the traditional storage/memory hierarchy, each compute node retains its data objects in its local volatile DRAM. Whenever the DRAM's capacity becomes insufficient for storing this data, the computation should either be distributed between several compute node… ▽ More

    Submitted 5 September, 2021; originally announced September 2021.

    Comments: 10 pages, 6 figures, The source code used by this work, as well as the benchmarks and other relevant sources, are available at: https://github.com/Scientific-Computing-Lab-NRCN/StoringStorage

  5. arXiv:2105.14344  [pdf, other

    cs.CR

    BPFroid: Robust Real Time Android Malware Detection Framework

    Authors: Yaniv Agman, Danny Hendler

    Abstract: We present BPFroid -- a novel dynamic analysis framework for Android that uses the eBPF technology of the Linux kernel to continuously monitor events of user applications running on a real device. The monitored events are collected from different components of the Android software stack: internal kernel functions, system calls, native library functions, and the Java API framework. As BPFroid hooks… ▽ More

    Submitted 29 May, 2021; originally announced May 2021.

    Comments: 22 pages, 7 figures, submitted to ieee access

  6. arXiv:2105.11932  [pdf, other

    cs.DC

    Execution of NVRAM Programs with Persistent Stack

    Authors: Vitaly Aksenov, Ohad Ben-Baruch, Danny Hendler, Ilya Kokorin, Matan Rusanovsky

    Abstract: Non-Volatile Random Access Memory (NVRAM) is a novel type of hardware that combines the benefits of traditional persistent memory (persistency of data over hardware failures) and DRAM (fast random access). In this work, we describe an algorithm that can be used to execute NVRAM programs and recover the system after a hardware failure while taking the architecture of real-world NVRAM systems into a… ▽ More

    Submitted 25 May, 2021; originally announced May 2021.

  7. arXiv:2104.09902  [pdf, other

    cs.DC

    Upper and Lower Bounds for Deterministic Approximate Objects

    Authors: Danny Hendler, Adnane Khattabi, Alessia Milani, Corentin Travers

    Abstract: Relaxing the sequential specification of shared objects has been proposed as a promising approach to obtain implementations with better complexity. In this paper, we study the step complexity of relaxed variants of two common shared objects: max registers and counters. In particular, we consider the $k$-multiplicative-accurate max register and the $k$-multiplicative-accurate counter, where read op… ▽ More

    Submitted 20 April, 2021; originally announced April 2021.

  8. Early Detection of In-Memory Malicious Activity based on Run-time Environmental Features

    Authors: Dorel Yaffe, Danny Hendler

    Abstract: In recent years malware has become increasingly sophisticated and difficult to detect prior to exploitation. While there are plenty of approaches to malware detection, they all have shortcomings when it comes to identifying malware correctly prior to exploitation. The trade-off is usually between false positives, causing overhead, preventing normal usage and the risk of letting the malware execute… ▽ More

    Submitted 29 March, 2021; originally announced March 2021.

    Comments: 26 pages, 12 figures, LNCS format, CSCML 2021 to appear

  9. arXiv:2012.12868  [pdf, other

    cs.DC cs.OS

    Flat-Combining-Based Persistent Data Structures for Non-Volatile Memory

    Authors: Matan Rusanovsky, Hagit Attiya, Ohad Ben-Baruch, Tom Gerby, Danny Hendler, Pedro Ramalhete

    Abstract: Flat combining (FC) is a synchronization paradigm in which a single thread, holding a global lock, collects requests by multiple threads for accessing a concurrent data structure and applies their combined requests to it. Although FC is sequential, it significantly reduces synchronization overheads and cache invalidations and thus often provides better performance than that of lock-free implementa… ▽ More

    Submitted 8 December, 2021; v1 submitted 23 December, 2020; originally announced December 2020.

  10. DAEMON: Dataset-Agnostic Explainable Malware Classification Using Multi-Stage Feature Mining

    Authors: Ron Korine, Danny Hendler

    Abstract: Numerous metamorphic and polymorphic malicious variants are generated automatically on a daily basis by mutation engines that transform the code of a malicious program while retaining its functionality, in order to evade signature-based detection. These automatic processes have greatly increased the number of malware variants, deeming their fully-manual analysis impossible. Malware classification… ▽ More

    Submitted 25 June, 2021; v1 submitted 4 August, 2020; originally announced August 2020.

  11. arXiv:2004.04986  [pdf, other

    cs.LG cs.CR stat.ML

    Towards Federated Learning With Byzantine-Robust Client Weighting

    Authors: Amit Portnoy, Yoav Tirosh, Danny Hendler

    Abstract: Federated Learning (FL) is a distributed machine learning paradigm where data is distributed among clients who collaboratively train a model in a computation process coordinated by a central server. By assigning a weight to each client based on the proportion of data instances it possesses, the rate of convergence to an accurate joint model can be greatly accelerated. Some previous works studied F… ▽ More

    Submitted 18 May, 2021; v1 submitted 10 April, 2020; originally announced April 2020.

    ACM Class: I.2.6; I.2.11; C.2.0

  12. arXiv:2002.11378  [pdf, ps, other

    cs.DC

    Upper and Lower Bounds on the Space Complexity of Detectable Object

    Authors: Ohad Ben-Baruch, Danny Hendler, Matan Rusanovsky

    Abstract: The emergence of systems with non-volatile main memory (NVM) increases the interest in the design of \emph{recoverable concurrent objects} that are robust to crash-failures, since their operations are able to recover from such failures by using state retained in NVM. Of particular interest are recoverable algorithms that, in addition to ensuring object consistency, also provide \emph{detectability… ▽ More

    Submitted 26 February, 2020; originally announced February 2020.

  13. arXiv:1905.13600  [pdf, other

    cs.DC

    Tracking in Order to Recover: Detectable Recovery of Lock-Free Data Structures

    Authors: Hagit Attiya, Ohad Ben-Baruch, Panagiota Fatourou, Danny Hendler, Eleftherios Kosmas

    Abstract: This paper presents the tracking approach for deriving detectably recoverable (and thus also durable) implementations of many widely-used concurrent data structures. Such data structures, satisfying detectable recovery, are appealing for emerging systems featuring byte-addressable non-volatile main memory (NVRAM), whose persistence allows to efficiently resurrect failed processes after crashes. De… ▽ More

    Submitted 27 July, 2021; v1 submitted 31 May, 2019; originally announced May 2019.

  14. arXiv:1905.09538  [pdf, other

    cs.CR cs.LG

    AMSI-Based Detection of Malicious PowerShell Code Using Contextual Embeddings

    Authors: Amir Rubin, Shay Kels, Danny Hendler

    Abstract: PowerShell is a command-line shell, supporting a scripting language. It is widely used in organizations for configuration management and task automation but is also increasingly used by cybercriminals for launching cyberattacks against organizations, mainly because it is pre-installed on Windows machines and exposes strong functionality that may be leveraged by attackers. This makes the problem of… ▽ More

    Submitted 19 September, 2019; v1 submitted 23 May, 2019; originally announced May 2019.

    Comments: 17 pages, 8 figures, 4 tables

  15. arXiv:1804.04177  [pdf, other

    cs.CR cs.NE

    Detecting Malicious PowerShell Commands using Deep Neural Networks

    Authors: Danny Hendler, Shay Kels, Amir Rubin

    Abstract: Microsoft's PowerShell is a command-line shell and scripting language that is installed by default on Windows machines. While PowerShell can be configured by administrators for restricting access and reducing vulnerabilities, these restrictions can be bypassed. Moreover, PowerShell commands can be easily generated dynamically, executed from memory, encoded and obfuscated, thus making the logging a… ▽ More

    Submitted 14 April, 2018; v1 submitted 11 April, 2018; originally announced April 2018.

    Comments: 19 pages, 5 figures

  16. arXiv:1607.01683  [pdf, other

    cs.SI physics.soc-ph

    Node-Centric Detection of Overlap** Communities in Social Networks

    Authors: Yehonatan Cohen, Danny Hendler, Amir Rubin

    Abstract: We present NECTAR, a community detection algorithm that generalizes Louvain method's local search heuristic for overlap** community structures. NECTAR chooses dynamically which objective function to optimize based on the network on which it is invoked. Our experimental evaluation on both synthetic benchmark graphs and real-world networks, based on ground-truth communities, shows that NECTAR prov… ▽ More

    Submitted 6 July, 2016; originally announced July 2016.

  17. arXiv:1308.2147  [pdf, other

    cs.DB cs.DC

    Exploiting Locality in Lease-Based Replicated Transactional Memory via Task Migration

    Authors: Danny Hendler, Alex Naiman, Sebastiano Peluso, Francesco Quaglia, Paolo Romano, Adi Suissa

    Abstract: We present Lilac-TM, the first locality-aware Distributed Software Transactional Memory (DSTM) implementation. Lilac-TM is a fully decentralized lease-based replicated DSTM. It employs a novel self- optimizing lease circulation scheme based on the idea of dynamically determining whether to migrate transactions to the nodes that own the leases required for their validation, or to demand the acquisi… ▽ More

    Submitted 9 August, 2013; originally announced August 2013.

    Comments: 23 pages, 5 figures

  18. arXiv:1305.5800  [pdf, other

    cs.DC

    Lightweight Contention Management for Efficient Compare-and-Swap Operations

    Authors: Dave Dice, Danny Hendler, Ilya Mirsky

    Abstract: Many concurrent data-structure implementations use the well-known compare-and-swap (CAS) operation, supported in hardware by most modern multiprocessor architectures for inter-thread synchronization. A key weakness of the CAS operation is the degradation in its performance in the presence of memory contention. In this work we study the following question: can software-based contention management… ▽ More

    Submitted 24 May, 2013; originally announced May 2013.

    Comments: 25 pages, to be published in Euro-Par 2013 proceedings

    ACM Class: D.1.3; D.4.1

  19. arXiv:1209.5038  [pdf, ps, other

    cs.LG

    Fast Randomized Model Generation for Shapelet-Based Time Series Classification

    Authors: Daniel Gordon, Danny Hendler, Lior Rokach

    Abstract: Time series classification is a field which has drawn much attention over the past decade. A new approach for classification of time series uses classification trees based on shapelets. A shapelet is a subsequence extracted from one of the time series in the dataset. A disadvantage of this approach is the time required for building the shapelet-based classification tree. The search for the best sh… ▽ More

    Submitted 23 September, 2012; originally announced September 2012.

  20. arXiv:1106.6304  [pdf, other

    cs.DC

    A Dynamic Elimination-Combining Stack Algorithm

    Authors: Gal Bar-Nissan, Danny Hendler, Adi Suissa

    Abstract: Two key synchronization paradigms for the construction of scalable concurrent data-structures are software combining and elimination. Elimination-based concurrent data-structures allow operations with reverse semantics (such as push and pop stack operations) to "collide" and exchange values without having to access a central location. Software combining, on the other hand, is effective when collid… ▽ More

    Submitted 30 June, 2011; originally announced June 2011.