Skip to main content

Showing 1–12 of 12 results for author: LeMay, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2301.13760  [pdf, other

    cs.CR

    EC-CFI: Control-Flow Integrity via Code Encryption Counteracting Fault Attacks

    Authors: Pascal Nasahl, Salmin Sultana, Hans Liljestrand, Karanvir Grewal, Michael LeMay, David M. Durham, David Schrammel, Stefan Mangard

    Abstract: Fault attacks enable adversaries to manipulate the control-flow of security-critical applications. By inducing targeted faults into the CPU, the software's call graph can be escaped and the control-flow can be redirected to arbitrary functions inside the program. To protect the control-flow from these attacks, dedicated fault control-flow integrity (CFI) countermeasures are commonly deployed. Howe… ▽ More

    Submitted 24 March, 2023; v1 submitted 31 January, 2023; originally announced January 2023.

    Comments: Accepted at HOST'23

  2. arXiv:2110.04071  [pdf, other

    eess.SP cs.LG

    Generative Pre-Trained Transformer for Cardiac Abnormality Detection

    Authors: Pierre Louis Gaudilliere, Halla Sigurthorsdottir, Clémentine Aguet, Jérôme Van Zaen, Mathieu Lemay, Ricard Delgado-Gonzalo

    Abstract: ECG heartbeat classification plays a vital role in diagnosis of cardiac arrhythmia. The goal of the Physionet/CinC 2021 challenge was to accurately classify clinical diagnosis based on 12, 6, 4, 3 or 2-lead ECG recordings in order to aid doctors in the diagnoses of different heart conditions. Transformers have had great success in the field of natural language processing in the past years. Our tea… ▽ More

    Submitted 7 October, 2021; originally announced October 2021.

    Comments: 4 pages, 2 figures, accepted for publication in CinC 2021

  3. arXiv:2108.03705  [pdf, other

    cs.CR

    The Endokernel: Fast, Secure, and Programmable Subprocess Virtualization

    Authors: Bum** Im, Fangfei Yang, Chia-Che Tsai, Michael LeMay, Anjo Vahldiek-Oberwagner, Nathan Dautenhahn

    Abstract: Commodity applications contain more and more combinations of interacting components (user, application, library, and system) and exhibit increasingly diverse tradeoffs between isolation, performance, and programmability. We argue that the challenge of future runtime isolation is best met by embracing the multi-principle nature of applications, rethinking process architecture for fast and extensibl… ▽ More

    Submitted 10 August, 2021; v1 submitted 8 August, 2021; originally announced August 2021.

    Comments: Revision: Fix 2 misspellings: 1) No white space in the title, 2) One of the Author's name

  4. Isolation Without Taxation: Near Zero Cost Transitions for SFI

    Authors: Matthew Kolosick, Shravan Narayan, Evan Johnson, Conrad Watt, Michael LeMay, Deepak Garg, Ranjit Jhala, Deian Stefan

    Abstract: Software sandboxing or software-based fault isolation (SFI) is a lightweight approach to building secure systems out of untrusted components. Mozilla, for example, uses SFI to harden the Firefox browser by sandboxing third-party libraries, and companies like Fastly and Cloudflare use SFI to safely co-locate untrusted tenants on their edge clouds. While there have been significant efforts to optimi… ▽ More

    Submitted 18 November, 2021; v1 submitted 30 April, 2021; originally announced May 2021.

  5. Cardiac Arrhythmia Detection from ECG with Convolutional Recurrent Neural Networks

    Authors: Jérôme Van Zaen, Ricard Delgado-Gonzalo, Damien Ferrario Mathieu Lemay

    Abstract: Except for a few specific types, cardiac arrhythmias are not immediately life-threatening. However, if not treated appropriately, they can cause serious complications. In particular, atrial fibrillation, which is characterized by fast and irregular heart beats, increases the risk of stroke. We propose three neural network architectures to detect abnormal rhythms from single-lead ECG signals. These… ▽ More

    Submitted 7 October, 2020; originally announced October 2020.

    Comments: 18 pages, Published in BIOSTEC 2019

    Journal ref: BIOSTEC 2019. Communications in Computer and Information Science, vol 1211 (2020)

  6. arXiv:2009.13320  [pdf, other

    cs.LG eess.SP

    ECG Classification with a Convolutional Recurrent Neural Network

    Authors: Halla Sigurthorsdottir, Jérôme Van Zaen, Ricard Delgado-Gonzalo, Mathieu Lemay

    Abstract: We developed a convolutional recurrent neural network to classify 12-lead ECG signals for the challenge of PhysioNet/ Computing in Cardiology 2020 as team Pink Irish Hat. The model combines convolutional and recurrent layers, takes sliding windows of ECG signals as input and yields the probability of each class as output. The convolutional part extracts features from each sliding window. The bi-di… ▽ More

    Submitted 6 October, 2020; v1 submitted 28 September, 2020; originally announced September 2020.

    Comments: 4 pages, 3 figures, presented at Computing in Cardiology 2020, under review for conference proceedings

  7. arXiv:1912.02322  [pdf, other

    cs.DC cs.LG cs.PF

    Perseus: Characterizing Performance and Cost of Multi-Tenant Serving for CNN Models

    Authors: Matthew LeMay, Shijian Li, Tian Guo

    Abstract: Deep learning models are increasingly used for end-user applications, supporting both novel features such as facial recognition, and traditional features, e.g. web search. To accommodate high inference throughput, it is common to host a single pre-trained Convolutional Neural Network (CNN) in dedicated cloud-based servers with hardware accelerators such as Graphics Processing Units (GPUs). However… ▽ More

    Submitted 30 March, 2020; v1 submitted 4 December, 2019; originally announced December 2019.

    Comments: 8 pages, 5 figures, and 6 tables. In proceedings of International Conference on Cloud Engineering (IC2E) 2020

  8. Secure Stream Processing for Medical Data

    Authors: Carlos Segarra, Enric Muntané, Mathieu Lemay, Valerio Schiavoni, Ricard Delgado-Gonzalo

    Abstract: Medical data belongs to whom it produces it. In an increasing manner, this data is usually processed in unauthorized third-party clouds that should never have the opportunity to access it. Moreover, recent data protection regulations (e.g., GDPR) pave the way towards the development of privacy-preserving processing techniques. In this paper, we present a proof of concept of a streaming IoT archite… ▽ More

    Submitted 30 July, 2019; v1 submitted 29 July, 2019; originally announced July 2019.

    Journal ref: IEEE Engineering in Medicine and Biology Conference 2019 (EMBC '19)

  9. Classification of Cardiac Arrhythmias from Single Lead ECG with a Convolutional Recurrent Neural Network

    Authors: Jérôme Van Zaen, Olivier Chételat, Mathieu Lemay, Enric M. Calvo, Ricard Delgado-Gonzalo

    Abstract: While most heart arrhythmias are not immediately harmful, they can lead to severe complications. In particular, atrial fibrillation, the most common arrhythmia, is characterized by fast and irregular heart beats and increases the risk of suffering a stroke. To detect such abnormal heart conditions, we propose a system composed of two main parts: a smart vest with two cooperative sensors to collect… ▽ More

    Submitted 25 June, 2019; originally announced July 2019.

    Comments: Nominated to best paper award

  10. Using Trusted Execution Environments for Secure Stream Processing of Medical Data

    Authors: Carlos Segarra, Ricard Delgado-Gonzalo, Mathieu Lemay, Pierre-Louis Aublin, Peter Pietzuch, Valerio Schiavoni

    Abstract: Processing sensitive data, such as those produced by body sensors, on third-party untrusted clouds is particularly challenging without compromising the privacy of the users generating it. Typically, these sensors generate large quantities of continuous data in a streaming fashion. Such vast amount of data must be processed efficiently and securely, even under strong adversarial models. The recent… ▽ More

    Submitted 17 June, 2019; originally announced June 2019.

    Comments: 19th International Conference on Distributed Applications and Interoperable Systems

    Journal ref: In: Pereira J., Ricci L. (eds) Distributed Applications and Interoperable Systems. DAIS 2019. Pages 91-107. Lecture Notes in Computer Science, vol 11534. Springer, Cham

  11. arXiv:1709.04095  [pdf, other

    cs.IR

    Query Completion Using Bandits for Engines Aggregation

    Authors: Audrey Durand, Jean-Alexandre Beaumont, Christian Gagne, Michel Lemay, Sebastien Paquet

    Abstract: Assisting users by suggesting completed queries as they type is a common feature of search systems known as query auto-completion. A query auto-completion engine may use prior signals and available information (e.g., user is anonymous, user has a history, user visited the site before the search or not, etc.) in order to improve its recommendations. There are many possible strategies for query auto… ▽ More

    Submitted 12 September, 2017; originally announced September 2017.

    Comments: Presented at The 3rd Multidisciplinary Conference on Reinforcement Learning and Decision Making (RLDM), June 11-14 (2017), University of Michigan, USA

  12. Network-on-Chip Firewall: Countering Defective and Malicious System-on-Chip Hardware

    Authors: Michael LeMay, Carl A. Gunter

    Abstract: Mobile devices are in roles where the integrity and confidentiality of their apps and data are of paramount importance. They usually contain a System-on-Chip (SoC), which integrates microprocessors and peripheral Intellectual Property (IP) connected by a Network-on-Chip (NoC). Malicious IP or software could compromise critical data. Some types of attacks can be blocked by controlling data transfer… ▽ More

    Submitted 16 January, 2017; v1 submitted 14 April, 2014; originally announced April 2014.

    Comments: 33 pages, 6 figures

    Journal ref: Logic, Rewriting, and Concurrency. Aug. 2015. Springer International Publishing