Skip to main content

Showing 1–6 of 6 results for author: Angel, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2312.07813  [pdf, other

    cs.OS cs.LG

    On a Foundation Model for Operating Systems

    Authors: Divyanshu Saxena, Nihal Sharma, Donghyun Kim, Rohit Dwivedula, Jiayi Chen, Chenxi Yang, Sriram Ravula, Zichao Hu, Aditya Akella, Sebastian Angel, Joydeep Biswas, Swarat Chaudhuri, Isil Dillig, Alex Dimakis, P. Brighten Godfrey, Daehyeok Kim, Chris Rossbach, Gang Wang

    Abstract: This paper lays down the research agenda for a domain-specific foundation model for operating systems (OSes). Our case for a foundation model revolves around the observations that several OS components such as CPU, memory, and network subsystems are interrelated and that OS traces offer the ideal dataset for a foundation model to grasp the intricacies of diverse OS components and their behavior in… ▽ More

    Submitted 12 December, 2023; originally announced December 2023.

    Comments: Machine Learning for Systems Workshop at 37th NeurIPS Conference, 2023, New Orleans, LA, USA

  2. Flamingo: Multi-Round Single-Server Secure Aggregation with Applications to Private Federated Learning

    Authors: Yi** Ma, Jess Woods, Sebastian Angel, Antigoni Polychroniadou, Tal Rabin

    Abstract: This paper introduces Flamingo, a system for secure aggregation of data across a large set of clients. In secure aggregation, a server sums up the private inputs of clients and obtains the result without learning anything about the individual inputs beyond what is implied by the final sum. Flamingo focuses on the multi-round setting found in federated learning in which many consecutive summations… ▽ More

    Submitted 18 May, 2024; v1 submitted 18 August, 2023; originally announced August 2023.

  3. arXiv:2010.06706  [pdf, other

    cs.DC

    Fault-tolerant and Transactional Stateful Serverless Workflows (extended version)

    Authors: Haoran Zhang, Adney Cardoza, Peter Baile Chen, Sebastian Angel, Vincent Liu

    Abstract: This paper introduces Beldi, a library and runtime system for writing and composing fault-tolerant and transactional stateful serverless functions. Beldi runs on existing providers and lets developers write complex stateful applications that require fault tolerance and transactional semantics without the need to deal with tasks such as load balancing or maintaining virtual machines. Beldi's contri… ▽ More

    Submitted 13 October, 2020; originally announced October 2020.

    Comments: Paper appears at OSDI 2020

    Journal ref: Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI). November, 2020

  4. arXiv:1910.13056  [pdf, other

    cs.OS cs.DC

    Disaggregation and the Application

    Authors: Sebastian Angel, Mihir Nanavati, Siddhartha Sen

    Abstract: This paper examines disaggregated data center architectures from the perspective of the applications that would run on these data centers, and challenges the abstractions that have been proposed to date. In particular, we argue that operating systems for disaggregated data centers should not abstract disaggregated hardware resources, such as memory, compute, and storage away from applications, but… ▽ More

    Submitted 28 October, 2019; originally announced October 2019.

  5. arXiv:1809.00111  [pdf, ps, other

    cs.CR

    What's a little leakage between friends?

    Authors: Sebastian Angel, David Lazar, Ioanna Tzialla

    Abstract: This paper introduces a new attack on recent messaging systems that protect communication metadata. The main observation is that if an adversary manages to compromise a user's friend, it can use this compromised friend to learn information about the user's other ongoing conversations. Specifically, the adversary learns whether a user is sending other messages or not, which opens the door to existi… ▽ More

    Submitted 23 October, 2018; v1 submitted 1 September, 2018; originally announced September 2018.

    Comments: Appears in WPES 2018. This update contains a minor clarification in Section 4 (last paragraph) and Section 4.1 (first paragraph) over the published version

  6. arXiv:1506.01449  [pdf

    cs.OS cs.CR

    Defending against malicious peripherals with Cinch

    Authors: Sebastian Angel, Riad S. Wahby, Max Howald, Joshua B. Leners, Michael Spilo, Zhen Sun, Andrew J. Blumberg, Michael Walfish

    Abstract: Malicious peripherals designed to attack their host computers are a growing problem. Inexpensive and powerful peripherals that attach to plug-and-play buses have made such attacks easy to mount. Making matters worse, commodity operating systems lack coherent defenses, and users are often unaware of the scope of the problem. We present Cinch, a pragmatic response to this threat. Cinch uses virtuali… ▽ More

    Submitted 29 June, 2016; v1 submitted 3 June, 2015; originally announced June 2015.

    Comments: 18 pages, 7 figures

    Journal ref: Proc. USENIX Security (2016), 397--414