Skip to main content

Showing 1–24 of 24 results for author: Butler, B

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.02436  [pdf, other

    physics.app-ph cs.ET

    Internet of Paint (IoP): Channel Modeling and Capacity Analysis for Terahertz Electromagnetic Nanonetworks Embedded in Paint

    Authors: Lasantha Thakshila Wedage, Mehmet Can Vuran, Bernard Butler, Yevgeni Koucheryavy, Sasitharan Balasubramaniam

    Abstract: This work opens a new chapter in the 100,000 year-old concept of paint, by leveraging innovations in nano-technology in the sub-THz frequency range. More specifically, the groundbreaking concept of Internet of Paint (IoP) is introduced along with a comprehensive channel model and a capacity analysis for nano-scale radios embedded in paint and communicating through paint. Nano-network devices, inte… ▽ More

    Submitted 3 May, 2024; originally announced May 2024.

    Comments: 15 pages, 17 figures, accepted for publication in the IEEE Journal on Selected Areas in Communications Special Issue on Electromagnetic Nanonetworks

  2. arXiv:2404.11815  [pdf, other

    cs.CR

    AquaSonic: Acoustic Manipulation of Underwater Data Center Operations and Resource Management

    Authors: Jennifer Sheldon, Weidong Zhu, Adnan Abdullah, Sri Hrushikesh Varma Bhupathiraju, Takeshi Sugawara, Kevin R. B. Butler, Md Jahidul Islam, Sara Rampazzi

    Abstract: Underwater datacenters (UDCs) hold promise as next-generation data storage due to their energy efficiency and environmental sustainability benefits. While the natural cooling properties of water save power, the isolated aquatic environment and long-range sound propagation in water create unique vulnerabilities which differ from those of on-land data centers. Our research discovers the unique vulne… ▽ More

    Submitted 7 May, 2024; v1 submitted 17 April, 2024; originally announced April 2024.

    Comments: Accepted to IEEE S&P 2024

  3. arXiv:2402.02018  [pdf, other

    cs.LG

    The Landscape and Challenges of HPC Research and LLMs

    Authors: Le Chen, Nesreen K. Ahmed, Akash Dutta, Arijit Bhattacharjee, Sixing Yu, Quazi Ishtiaque Mahmud, Waqwoya Abebe, Hung Phan, Aishwarya Sarkar, Branden Butler, Niranjan Hasabnis, Gal Oren, Vy A. Vo, Juan Pablo Munoz, Theodore L. Willke, Tim Mattson, Ali Jannesari

    Abstract: Recently, language models (LMs), especially large language models (LLMs), have revolutionized the field of deep learning. Both encoder-decoder models and prompt-based techniques have shown immense potential for natural language processing and code-based tasks. Over the past several years, many research labs and institutions have invested heavily in high-performance computing, approaching or breach… ▽ More

    Submitted 6 February, 2024; v1 submitted 2 February, 2024; originally announced February 2024.

  4. arXiv:2311.11156  [pdf, other

    math.OC cs.MA cs.RO eess.SY math.DS

    Collaborative Safe Formation Control for Coupled Multi-Agent Systems

    Authors: Brooks A. Butler, Chi Ho Leung, Philip E. Paré

    Abstract: The safe control of multi-robot swarms is a challenging and active field of research, where common goals include maintaining group cohesion while simultaneously avoiding obstacles and inter-agent collision. Building off our previously developed theory for distributed collaborative safety-critical control for networked dynamic systems, we propose a distributed algorithm for the formation control of… ▽ More

    Submitted 2 April, 2024; v1 submitted 18 November, 2023; originally announced November 2023.

    Comments: This work has been accepted to be presented at the 2024 European Control Conference

  5. arXiv:2310.03289  [pdf, other

    math.OC cs.MA eess.SY math.DS

    Collaborative Safety-Critical Control for Networked Dynamic Systems

    Authors: Brooks A. Butler, Philip E. Paré

    Abstract: As modern systems become ever more connected with complex dynamic coupling relationships, the development of safe control methods for such networked systems becomes paramount. In this paper, we define a general networked model with coupled dynamics and local control and discuss the relationship of node-level safety definitions for individual agents with local neighborhood dynamics. We define a nod… ▽ More

    Submitted 1 May, 2024; v1 submitted 4 October, 2023; originally announced October 2023.

    Comments: This work is under review for publication in the IEEE Transactions on Automatic Control

  6. arXiv:2301.00658  [pdf, other

    cs.IT

    Comparative Analysis of Terahertz Propagation Under Dust Storm Conditions on Mars and Earth

    Authors: Lasantha Thakshila Wedage, Bernard Butler, Sasitharan Balasubramaniam, Yevgeni Koucheryavy, Mehmet C. Vuran

    Abstract: Reliable Terahertz (THz) links are necessary for outdoor point-to-point communication with the exponential growth of wireless data traffic. This study presents a modified Monte Carlo simulation procedure for estimating THz link attenuation due to multiple scattering by dust particles on the THz beam propagation path. Scattering models are developed for beams through dust, based on Mie and Rayleigh… ▽ More

    Submitted 10 December, 2022; originally announced January 2023.

    Comments: 14 pages, 12 figures, Journal

  7. arXiv:2206.10746  [pdf

    cs.CR

    A Practical Methodology for ML-Based EM Side Channel Disassemblers

    Authors: Cesar N. Arguello, Hunter Searle, Sara Rampazzi, Kevin R. B. Butler

    Abstract: Providing security guarantees for embedded devices with limited interface capabilities is an increasingly crucial task. Although these devices don't have traditional interfaces, they still generate unintentional electromagnetic signals that correlate with the instructions being executed. By collecting these traces using our methodology and leveraging a random forest algorithm to develop a machine… ▽ More

    Submitted 20 July, 2022; v1 submitted 21 June, 2022; originally announced June 2022.

    Comments: Accepted to the poster section of the 7th IEEE European Symposium on Security and Privacy 2022

  8. arXiv:2204.01516  [pdf, other

    cs.CR cs.SE

    SAUSAGE: Security Analysis of Unix domain Socket Usage in Android

    Authors: Mounir Elgharabawy, Blas Kojusner, Mohammad Mannan, Kevin R. B. Butler, Byron Williams, Amr Youssef

    Abstract: The Android operating system is currently the most popular mobile operating system in the world. Android is based on Linux and therefore inherits its features including its Inter-Process Communication (IPC) mechanisms. These mechanisms are used by processes to communicate with one another and are extensively used in Android. While Android-specific IPC mechanisms have been studied extensively, Unix… ▽ More

    Submitted 4 April, 2022; originally announced April 2022.

    Comments: Accepted to EuroS&P 2022

  9. arXiv:2110.13392  [pdf, other

    cs.NI

    Graph-based Heuristic Solution for Placing Distributed Video Processing Applications on Moving Vehicle Clusters

    Authors: Kanika Sharma, Bernard Butler, Brendan Jennings

    Abstract: Vehicular fog computing (VFC) is envisioned as an extension of cloud and mobile edge computing to utilize the rich sensing and processing resources available in vehicles. We focus on slow-moving cars that spend a significant time in urban traffic congestion as a potential pool of on-board sensors, video cameras, and processing capacity. For leveraging the dynamic network and processing resources,… ▽ More

    Submitted 25 October, 2021; originally announced October 2021.

    Comments: 14 pages, 10 figures

  10. arXiv:2110.09471  [pdf, other

    cs.NI

    Scaling and Placing Distributed Services on Vehicle Clusters in Urban Environments

    Authors: Kanika Sharma, Bernard Butler, Brendan Jennings

    Abstract: Many vehicles spend a significant amount of time in urban traffic congestion. Due to the evolution of autonomous cars, driver assistance systems, and in-vehicle entertainment, many vehicles have plentiful computational and communication capacity. How can we deploy data collection and processing tasks on these (slowly) moving vehicles to productively use any spare resources? To answer this question… ▽ More

    Submitted 11 October, 2021; originally announced October 2021.

    Comments: 16 pages, 15 Figures

  11. arXiv:2103.03325  [pdf, other

    cs.LG

    Hard-label Manifolds: Unexpected Advantages of Query Efficiency for Finding On-manifold Adversarial Examples

    Authors: Washington Garcia, Pin-Yu Chen, Somesh Jha, Scott Clouse, Kevin R. B. Butler

    Abstract: Designing deep networks robust to adversarial examples remains an open problem. Likewise, recent zeroth order hard-label attacks on image classification models have shown comparable performance to their first-order, gradient-level alternatives. It was recently shown in the gradient-level setting that regular adversarial examples leave the data manifold, while their on-manifold counterparts are in… ▽ More

    Submitted 4 March, 2021; originally announced March 2021.

    Comments: Preprint

  12. arXiv:2009.02224  [pdf, other

    eess.SP cs.IT

    Evolving Intelligent Reflector Surface towards 6G for Public Health: Application in Airborne Virus Detection

    Authors: Harun Šiljak, Nouman Ashraf, Michael Taynnan Barros, Daniel Perez Martins, Bernard Butler, Arman Farhang, Nicola Marchetti, Sasitharan Balasubramaniam

    Abstract: While metasurface based intelligent reflecting surfaces (IRS) are an important emerging technology for future generations of wireless connectivity in its own right, the plans for the mass deployment of these surfaces motivate the question of their integration with other new and emerging technologies that would require mass proliferation. This question of integration and the vision of future commun… ▽ More

    Submitted 4 September, 2020; originally announced September 2020.

    Comments: This work has been submitted to the IEEE for possible publication

  13. arXiv:1907.00935  [pdf, other

    cs.CR

    One-Time Programs made Practical

    Authors: Lianying Zhao, Joseph I. Choi, Didem Demirag, Kevin R. B. Butler, Mohammad Mannan, Erman Ayday, Jeremy Clark

    Abstract: A one-time program (OTP) works as follows: Alice provides Bob with the implementation of some function. Bob can have the function evaluated exclusively on a single input of his choosing. Once executed, the program will fail to evaluate on any other input. State-of-the-art one-time programs have remained theoretical, requiring custom hardware that is cost-ineffective/unavailable, or confined to adh… ▽ More

    Submitted 1 July, 2019; originally announced July 2019.

  14. A Hybrid Approach to Secure Function Evaluation Using SGX

    Authors: Joseph I. Choi, Dave '**g' Tian, Grant Hernandez, Christopher Patton, Benjamin Mood, Thomas Shrimpton, Kevin R. B. Butler, Patrick Traynor

    Abstract: A protocol for two-party secure function evaluation (2P-SFE) aims to allow the parties to learn the output of function $f$ of their private inputs, while leaking nothing more. In a sense, such a protocol realizes a trusted oracle that computes $f$ and returns the result to both parties. There have been tremendous strides in efficiency over the past ten years, yet 2P-SFE protocols remain impractica… ▽ More

    Submitted 6 May, 2019; v1 submitted 3 May, 2019; originally announced May 2019.

    Comments: Full version, with proofs, of conference paper at AsiaCCS 2019; updated to include copyright information

  15. arXiv:1904.05734  [pdf, other

    cs.CR cs.LG cs.SD eess.AS

    Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems

    Authors: Hadi Abdullah, Washington Garcia, Christian Peeters, Patrick Traynor, Kevin R. B. Butler, Joseph Wilson

    Abstract: Voice Processing Systems (VPSes), now widely deployed, have been made significantly more accurate through the application of recent advances in machine learning. However, adversarial machine learning has similarly advanced and has been used to demonstrate that VPSes are vulnerable to the injection of hidden commands - audio obscured by noise that is correctly recognized by a VPS but not by human b… ▽ More

    Submitted 18 March, 2019; originally announced April 2019.

    Journal ref: The Network and Distributed System Security Symposium (NDSS) 2019

  16. arXiv:1810.00024  [pdf, other

    cs.LG cs.AI cs.CR stat.ML

    Explainable Black-Box Attacks Against Model-based Authentication

    Authors: Washington Garcia, Joseph I. Choi, Suman K. Adari, Somesh Jha, Kevin R. B. Butler

    Abstract: Establishing unique identities for both humans and end systems has been an active research problem in the security community, giving rise to innovative machine learning-based authentication techniques. Although such techniques offer an automated method to establish identity, they have not been vetted against sophisticated attacks that target their core machine learning technique. This paper demons… ▽ More

    Submitted 28 September, 2018; originally announced October 2018.

  17. Potential of Augmented Reality for Intelligent Transportation Systems

    Authors: Adnan Mahmood, Bernard Butler, Brendan Jennings

    Abstract: Rapid advances in wireless communication technologies coupled with ongoing massive development in vehicular networking standards and innovations in computing, sensing, and analytics have paved the way for intelligent transportation systems (ITS) to develop rapidly in the near future. ITS provides a complete solution for the efficient and intelligent management of real-time traffic, wherein sensory… ▽ More

    Submitted 10 June, 2018; originally announced June 2018.

    Comments: In: Lee N. (eds) Encyclopedia of Computer Graphics and Games. Springer, Cham, 2018

  18. FirmUSB: Vetting USB Device Firmware using Domain Informed Symbolic Execution

    Authors: Grant Hernandez, Farhaan Fowze, Dave Tian, Tuba Yavuz, Kevin R. B. Butler

    Abstract: The USB protocol has become ubiquitous, supporting devices from high-powered computing devices to small embedded devices and control systems. USB's greatest feature, its openness and expandability, is also its weakness, and attacks such as BadUSB exploit the unconstrained functionality afforded to these devices as a vector for compromise. Fundamentally, it is virtually impossible to know whether a… ▽ More

    Submitted 30 August, 2017; originally announced August 2017.

    Comments: 18 pages, CCS 2017

  19. arXiv:1602.02831  [pdf, other

    cs.IT

    Minimum Distances of the QC-LDPC Codes in IEEE 802 Communication Standards

    Authors: Brian K. Butler

    Abstract: This work applies earlier results on Quasi-Cyclic (QC) LDPC codes to the codes specified in six separate IEEE 802 standards, specifying wireless communications from 54 MHz to 60 GHz. First, we examine the weight matrices specified to upper bound the codes' minimum distance independent of block length. Next, we search for the minimum distance achieved for the parity check matrices selected at each… ▽ More

    Submitted 8 February, 2016; originally announced February 2016.

    Comments: Submitted to IEEE ISIT 2016. 5 pages, 2 figures, and 7 tables

  20. arXiv:1409.5783  [pdf, other

    cs.IT

    LDPC Code Density Evolution in the Error Floor Region

    Authors: Brian K. Butler, Paul H. Siegel

    Abstract: This short paper explores density evolution (DE) for low-density parity-check (LDPC) codes at signal-to-noise-ratios (SNRs) that are significantly above the decoding threshold. The focus is on the additive white Gaussian noise channel and LDPC codes in which the variable nodes have regular degree. Prior work, using DE, produced results in the error floor region which were asymptotic in the belie… ▽ More

    Submitted 19 September, 2014; originally announced September 2014.

    Comments: 5 pages, 2 figures

  21. arXiv:1208.1326  [pdf, other

    cs.IT math.NA

    Numerical Issues Affecting LDPC Error Floors

    Authors: Brian K. Butler, Paul H. Siegel

    Abstract: Numerical issues related to the occurrence of error floors in floating-point simulations of belief propagation (BP) decoders are examined. Careful processing of messages corresponding to highly-certain bit values can sometimes reduce error floors by several orders of magnitude. Computational solutions for properly handling such messages are provided for the sum-product algorithm (SPA) and several… ▽ More

    Submitted 6 August, 2012; originally announced August 2012.

    Comments: 7 pages, 5 figures. Submitted to IEEE Globecom (Selected Area of Communications Data Storage Track)

  22. arXiv:1202.2826  [pdf, other

    cs.IT

    Error Floor Approximation for LDPC Codes in the AWGN Channel

    Authors: Brian K. Butler, Paul H. Siegel

    Abstract: This paper addresses the prediction of error floors of low-density parity-check (LDPC) codes with variable nodes of constant degree in the additive white Gaussian noise (AWGN) channel. Specifically, we focus on the performance of the sum-product algorithm (SPA) decoder formulated in the log-likelihood ratio (LLR) domain. We hypothesize that several published error floor levels are due to the manne… ▽ More

    Submitted 9 June, 2013; v1 submitted 13 February, 2012; originally announced February 2012.

    Comments: 24 pages, 15 figures, submitted to IEEE Transactions on Information Theory

  23. arXiv:1201.2386  [pdf, other

    cs.IT

    Bounds on the Minimum Distance of Punctured Quasi-Cyclic LDPC Codes

    Authors: Brian K. Butler, Paul H. Siegel

    Abstract: Recent work by Divsalar et al. has shown that properly designed protograph-based low-density parity-check (LDPC) codes typically have minimum (Hamming) distance linearly increasing with block length. This fact rests on ensemble arguments over all possible expansions of the base protograph. However, when implementation complexity is considered, the expansions are frequently selected from a smaller… ▽ More

    Submitted 20 February, 2013; v1 submitted 11 January, 2012; originally announced January 2012.

    Comments: 13 pages, 6 figures, 6 tables. Submitted to IEEE Transactions on Information Theory

  24. On Distance Properties of Quasi-Cyclic Protograph-Based LDPC Codes

    Authors: Brian K. Butler, Paul H. Siegel

    Abstract: Recent work has shown that properly designed protograph-based LDPC codes may have minimum distance linearly increasing with block length. This notion rests on ensemble arguments over all possible expansions of the base protograph. When implementation complexity is considered, the expansion is typically chosen to be quite orderly. For example, protograph expansion by cyclically shifting connections… ▽ More

    Submitted 29 April, 2010; originally announced April 2010.

    Comments: Submitted to IEEE International Symposium on Information Theory, to be held June 2010