Skip to main content

Showing 1–7 of 7 results for author: Jamjoom, H

Searching in archive cs. Search in all archives.
.
  1. arXiv:2303.15540  [pdf, other

    cs.CR cs.OS

    Intel TDX Demystified: A Top-Down Approach

    Authors: Pau-Chen Cheng, Wojciech Ozga, Enriquillo Valdez, Salman Ahmed, Zhongshu Gu, Hani Jamjoom, Hubertus Franke, James Bottomley

    Abstract: Intel Trust Domain Extensions (TDX) is a new architectural extension in the 4th Generation Intel Xeon Scalable Processor that supports confidential computing. TDX allows the deployment of virtual machines in the Secure-Arbitration Mode (SEAM) with encrypted CPU state and memory, integrity protection, and remote attestation. TDX aims to enforce hardware-assisted isolation for virtual machines and m… ▽ More

    Submitted 27 March, 2023; originally announced March 2023.

  2. arXiv:2105.09400  [pdf, other

    cs.CR cs.LG

    Separation of Powers in Federated Learning

    Authors: Pau-Chen Cheng, Kevin Eykholt, Zhongshu Gu, Hani Jamjoom, K. R. Jayaram, Enriquillo Valdez, Ashish Verma

    Abstract: Federated Learning (FL) enables collaborative training among mutually distrusting parties. Model updates, rather than training data, are concentrated and fused in a central aggregation server. A key security challenge in FL is that an untrustworthy or compromised aggregation process might lead to unforeseeable information leakage. This challenge is especially acute due to recently demonstrated att… ▽ More

    Submitted 19 May, 2021; originally announced May 2021.

  3. arXiv:1812.03230  [pdf, other

    cs.CR cs.LG

    Reaching Data Confidentiality and Model Accountability on the CalTrain

    Authors: Zhongshu Gu, Hani Jamjoom, Dong Su, Heqing Huang, Jialong Zhang, Tengfei Ma, Dimitrios Pendarakis, Ian Molloy

    Abstract: Distributed collaborative learning (DCL) paradigms enable building joint machine learning models from distrusting multi-party participants. Data confidentiality is guaranteed by retaining private training data on each participant's local infrastructure. However, this approach to achieving data confidentiality makes today's DCL designs fundamentally vulnerable to data poisoning and backdoor attacks… ▽ More

    Submitted 7 December, 2018; originally announced December 2018.

  4. arXiv:1807.00969  [pdf, other

    cs.CR

    Confidential Inference via Ternary Model Partitioning

    Authors: Zhongshu Gu, Heqing Huang, Jialong Zhang, Dong Su, Hani Jamjoom, Ankita Lamba, Dimitrios Pendarakis, Ian Molloy

    Abstract: Today's cloud vendors are competing to provide various offerings to simplify and accelerate AI service deployment. However, cloud users always have concerns about the confidentiality of their runtime data, which are supposed to be processed on third-party's compute infrastructures. Information disclosure of user-supplied data may jeopardize users' privacy and breach increasingly stringent data pro… ▽ More

    Submitted 12 August, 2020; v1 submitted 3 July, 2018; originally announced July 2018.

  5. arXiv:1610.04676  [pdf, other

    cs.DC cs.SI

    Analysis and Modeling of Social Influence in High Performance Computing Workloads

    Authors: Shuai Zheng, Zon-Yin Shae, Xiangliang Zhang, Hani Jamjoom, Liana Fong

    Abstract: Social influence among users (e.g., collaboration on a project) creates bursty behavior in the underlying high performance computing (HPC) workloads. Using representative HPC and cluster workload logs, this paper identifies, analyzes, and quantifies the level of social influence across HPC users. We show the existence of a social graph that is characterized by a pattern of dominant users and follo… ▽ More

    Submitted 14 October, 2016; originally announced October 2016.

    Comments: The 17th International European Conference on Parallel and Distributed Computing, Euro-Par 2011

  6. arXiv:1509.09066  [pdf, other

    cs.CY

    Quality of Consumption: The Friendlier Side of Quality of Service

    Authors: Murad Kablan, Hani Jamjoom, Eric Keller

    Abstract: Cloud services today are increasingly built using functionality from other running services. In this paper, we question whether legacy Quality of Services (QoS) metrics and enforcement techniques are sufficient as they are producer centric. We argue that, similar to customer rating systems found in banking systems and many sharing economy apps (e.g., Uber and Airbnb), Quality of Consumption (QoC)… ▽ More

    Submitted 30 September, 2015; originally announced September 2015.

    Comments: arXiv admin note: text overlap with arXiv:1509.09057

  7. arXiv:1509.09057  [pdf, other

    cs.NI

    The Cloud Needs a Reputation System

    Authors: Murad Kablan, Carlee Joe-Won, Sangtae Ha, Hani Jamjoom, Eric Keller

    Abstract: Today's cloud apps are built from many diverse services that are managed by different parties. At the same time, these parties, which consume and/or provide services, continue to rely on arcane static security and entitlements models. In this paper, we introduce Seit, an inter-tenant framework that manages the interactions between cloud services. Seit is a software-defined reputation-based framewo… ▽ More

    Submitted 30 September, 2015; originally announced September 2015.