Skip to main content

Showing 1–25 of 25 results for author: Morrison, A

Searching in archive cs. Search in all archives.
.
  1. Last-Level Cache Side-Channel Attacks Are Feasible in the Modern Public Cloud (Extended Version)

    Authors: Zirui Neil Zhao, Adam Morrison, Christopher W. Fletcher, Josep Torrellas

    Abstract: Last-level cache side-channel attacks have been mostly demonstrated in highly-controlled, quiescent local environments. Hence, it is unclear whether such attacks are feasible in a production cloud environment. In the cloud, side channels are flooded with noise from activities of other tenants and, in Function-as-a-Service (FaaS) workloads, the attacker has a very limited time window to mount the a… ▽ More

    Submitted 20 May, 2024; originally announced May 2024.

    Journal ref: 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS 2024), Volume 2, pages 582-600, La Jolla, CA, USA, May 2024

  2. DECLASSIFLOW: A Static Analysis for Modeling Non-Speculative Knowledge to Relax Speculative Execution Security Measures (Full Version)

    Authors: Rutvik Choudhary, Alan Wang, Zirui Neil Zhao, Adam Morrison, Christopher W. Fletcher

    Abstract: Speculative execution attacks undermine the security of constant-time programming, the standard technique used to prevent microarchitectural side channels in security-sensitive software such as cryptographic code. Constant-time code must therefore also deploy a defense against speculative execution attacks to prevent leakage of secret data stored in memory or the processor registers. Unfortunately… ▽ More

    Submitted 14 December, 2023; originally announced December 2023.

    Journal ref: In Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security (CCS '23). Association for Computing Machinery, New York, NY, USA, 2053-2067

  3. arXiv:2311.14079  [pdf, other

    cs.LG stat.ML

    Empirical Comparison between Cross-Validation and Mutation-Validation in Model Selection

    Authors: **yang Yu, Sami Hamdan, Leonard Sasse, Abigail Morrison, Kaustubh R. Patil

    Abstract: Mutation validation (MV) is a recently proposed approach for model selection, garnering significant interest due to its unique characteristics and potential benefits compared to the widely used cross-validation (CV) method. In this study, we empirically compared MV and $k$-fold CV using benchmark and real-world datasets. By employing Bayesian tests, we compared generalization estimates yielding th… ▽ More

    Submitted 15 February, 2024; v1 submitted 23 November, 2023; originally announced November 2023.

  4. arXiv:2306.09855  [pdf, other

    q-bio.NC cs.NE

    Runtime Construction of Large-Scale Spiking Neuronal Network Models on GPU Devices

    Authors: Bruno Golosio, Jose Villamar, Gianmarco Tiddia, Elena Pastorelli, Jonas Stapmanns, Viviana Fanti, Pier Stanislao Paolucci, Abigail Morrison, Johanna Senk

    Abstract: Simulation speed matters for neuroscientific research: this includes not only how quickly the simulated model time of a large-scale spiking neuronal network progresses, but also how long it takes to instantiate the network model in computer memory. On the hardware side, acceleration via highly parallel GPUs is being increasingly utilized. On the software side, code generation approaches ensure hig… ▽ More

    Submitted 16 June, 2023; originally announced June 2023.

    Comments: 29 pages, 9 figures

    Journal ref: Appl. Sci. 2023, 13(17), 9598

  5. arXiv:2306.04602  [pdf, other

    cs.CR

    Prefix Siphoning: Exploiting LSM-Tree Range Filters For Information Disclosure (Full Version)

    Authors: Adi Kaufman, Moshik Hershcovitch, Adam Morrison

    Abstract: Key-value stores typically leave access control to the systems for which they act as storage engines. Unfortunately, attackers may circumvent such read access controls via timing attacks on the key-value store, which use differences in query response times to glean information about stored data. To date, key-value store timing attacks have aimed to disclose stored values and have exploited exter… ▽ More

    Submitted 8 September, 2023; v1 submitted 7 June, 2023; originally announced June 2023.

    Comments: Full version of USENIX ATC'23 paper

  6. arXiv:2305.01656  [pdf, other

    cs.HC cs.LG cs.LO

    Probabilistic Formal Modelling to Uncover and Interpret Interaction Styles

    Authors: Oana Andrei, Muffy Calder, Matthew Chalmers, Alistair Morrison

    Abstract: We present a study using new computational methods, based on a novel combination of machine learning for inferring admixture hidden Markov models and probabilistic model checking, to uncover interaction styles in a mobile app. These styles are then used to inform a redesign, which is implemented, deployed, and then analysed using the same methods. The data sets are logged user traces, collected ov… ▽ More

    Submitted 1 May, 2023; originally announced May 2023.

  7. arXiv:2212.08484  [pdf, other

    cs.NE cs.MA

    Emergent communication enhances foraging behaviour in evolved swarms controlled by Spiking Neural Networks

    Authors: Cristian Jimenez Romero, Alper Yegenoglu, Aarón Pérez Martín, Sandra Diaz-Pier, Abigail Morrison

    Abstract: Social insects such as ants communicate via pheromones which allows them to coordinate their activity and solve complex tasks as a swarm, e.g. foraging for food. This behavior was shaped through evolutionary processes. In computational models, self-coordination in swarms has been implemented using probabilistic or simple action rules to shape the decision of each agent and the collective behavior.… ▽ More

    Submitted 8 September, 2023; v1 submitted 16 December, 2022; originally announced December 2022.

    Comments: 27 pages, 16 figures

  8. arXiv:2212.05354  [pdf, other

    q-bio.NC cs.NE

    Phenomenological modeling of diverse and heterogeneous synaptic dynamics at natural density

    Authors: Agnes Korcsak-Gorzo, Charl Linssen, Jasper Albers, Stefan Dasbach, Renato Duarte, Susanne Kunkel, Abigail Morrison, Johanna Senk, Jonas Stapmanns, Tom Tetzlaff, Markus Diesmann, Sacha J. van Albada

    Abstract: This chapter sheds light on the synaptic organization of the brain from the perspective of computational neuroscience. It provides an introductory overview on how to account for empirical data in mathematical models, implement such models in software, and perform simulations reflecting experiments. This path is demonstrated with respect to four key aspects of synaptic signaling: the connectivity o… ▽ More

    Submitted 19 February, 2023; v1 submitted 10 December, 2022; originally announced December 2022.

    Comments: 38 pages, 5 figures, LaTeX; added two figures, clarified and extended formulations, updated format, added references

  9. arXiv:2208.10087  [pdf

    cs.CY

    A Trust Framework for Government Use of Artificial Intelligence and Automated Decision Making

    Authors: Pia Andrews, Tim de Sousa, Bruce Haefele, Matt Beard, Marcus Wigan, Abhinav Palia, Kathy Reid, Saket Narayan, Morgan Dumitru, Alex Morrison, Geoff Mason, Aurelie Jacquet

    Abstract: This paper identifies the current challenges of the mechanisation, digitisation and automation of public sector systems and processes, and proposes a modern and practical framework to ensure and assure ethical and high veracity Artificial Intelligence (AI) or Automated Decision Making (ADM) systems in public institutions. This framework is designed for the specific context of the public sector, in… ▽ More

    Submitted 22 August, 2022; originally announced August 2022.

    Comments: Comments were integrated into the paper from all peer reviewers. Am happy to provide a copied history of comments if useful

  10. arXiv:2203.17139  [pdf, other

    cs.DS cs.DB

    Prefix Filter: Practically and Theoretically Better Than Bloom

    Authors: Tomer Even, Guy Even, Adam Morrison

    Abstract: Many applications of approximate membership query data structures, or filters, require only an incremental filter that supports insertions but not deletions. However, the design space of incremental filters is missing a "sweet spot" filter that combines space efficiency, fast queries, and fast insertions. Incremental filters, such as the Bloom and blocked Bloom filter, are not space efficient. Dyn… ▽ More

    Submitted 25 October, 2022; v1 submitted 31 March, 2022; originally announced March 2022.

    Comments: Full version of VLDB'22 paper

  11. Exploring hyper-parameter spaces of neuroscience models on high performance computers with Learning to Learn

    Authors: Alper Yegenoglu, Anand Subramoney, Thorsten Hater, Cristian Jimenez-Romero, Wouter Klijn, Aaron Perez Martin, Michiel van der Vlag, Michael Herty, Abigail Morrison, Sandra Diaz-Pier

    Abstract: Neuroscience models commonly have a high number of degrees of freedom and only specific regions within the parameter space are able to produce dynamics of interest. This makes the development of tools and strategies to efficiently find these regions of high importance to advance brain research. Exploring the high dimensional parameter space using numerical simulations has been a frequently used te… ▽ More

    Submitted 28 February, 2022; originally announced February 2022.

  12. arXiv:2201.09331  [pdf, other

    cs.DS cs.DB cs.DC

    Cuckoo Trie: Exploiting Memory-Level Parallelism for Efficient DRAM Indexing

    Authors: Adar Zeitak, Adam Morrison

    Abstract: We present the Cuckoo Trie, a fast, memory-efficient ordered index structure. The Cuckoo Trie is designed to have memory-level parallelism -- which a modern out-of-order processor can exploit to execute DRAM accesses in parallel -- without sacrificing memory efficiency. The Cuckoo Trie thus breaks a fundamental performance barrier faced by current indexes, whose bottleneck is a series of dependent… ▽ More

    Submitted 23 January, 2022; originally announced January 2022.

    Comments: Published in SOSP 2021

  13. arXiv:2110.12261  [pdf, other

    cs.CV eess.IV

    espiownage: Tracking Transients in Steelpan Drum Strikes Using Surveillance Technology

    Authors: Scott H. Hawley, Andrew C. Morrison, Grant S. Morgan

    Abstract: We present an improvement in the ability to meaningfully track features in high speed videos of Caribbean steelpan drums illuminated by Electronic Speckle Pattern Interferometry (ESPI). This is achieved through the use of up-to-date computer vision libraries for object detection and image segmentation as well as a significant effort toward cleaning the dataset previously used to train systems for… ▽ More

    Submitted 23 October, 2021; originally announced October 2021.

    Comments: 6 pages, 5 figures, submitted to NeurIPS 2021 Workshop on Machine Learning and the Physical Sciences

    ACM Class: I.4.6; I.4.9

  14. arXiv:2106.15601  [pdf, other

    cs.CR

    An Analysis of Speculative Type Confusion Vulnerabilities in the Wild

    Authors: Ofek Kirzner, Adam Morrison

    Abstract: Spectre v1 attacks, which exploit conditional branch misprediction, are often identified with attacks that bypass array bounds checking to leak data from a victim's memory. Generally, however, Spectre v1 attacks can exploit any conditional branch misprediction that makes the victim execute code incorrectly. In this paper, we investigate speculative type confusion, a Spectre v1 attack vector in whi… ▽ More

    Submitted 2 July, 2021; v1 submitted 29 June, 2021; originally announced June 2021.

    Comments: To appear in USENIX Security 2021

  15. arXiv:2102.00632  [pdf, other

    cs.CV cs.LG physics.app-ph physics.ins-det

    ConvNets for Counting: Object Detection of Transient Phenomena in Steelpan Drums

    Authors: Scott H. Hawley, Andrew C. Morrison

    Abstract: We train an object detector built from convolutional neural networks to count interference fringes in elliptical antinode regions in frames of high-speed video recordings of transient oscillations in Caribbean steelpan drums illuminated by electronic speckle pattern interferometry (ESPI). The annotations provided by our model aim to contribute to the understanding of time-dependent behavior in suc… ▽ More

    Submitted 6 September, 2021; v1 submitted 31 January, 2021; originally announced February 2021.

    Comments: 13 pages, 9 figures, accepted for J. Acous. Soc. Am. (JASA) Special Issue on Machine Learning in Acoustics

    ACM Class: I.4.7

  16. arXiv:2011.07622  [pdf, other

    cs.DC

    Recoverable, Abortable, and Adaptive Mutual Exclusion with Sublogarithmic RMR Complexity

    Authors: Daniel Katzan, Adam Morrison

    Abstract: We present the first recoverable mutual exclusion (RME) algorithm that is simultaneously abortable, adaptive to point contention, and with sublogarithmic RMR complexity. Our algorithm has $O(\min(K,\log_W N))$ RMR passage complexity and $O(F + \min(K,\log_W N))$ RMR super-passage complexity, where $K$ is the number of concurrent processes (point contention), $W$ is the size (in bits) of registers,… ▽ More

    Submitted 8 July, 2023; v1 submitted 15 November, 2020; originally announced November 2020.

    Comments: Full version of OPODIS 2020 paper

  17. Proving Highly-Concurrent Traversals Correct

    Authors: Yotam M. Y. Feldman, Artem Khyzha, Constantin Enea, Adam Morrison, Aleksandar Nanevski, Noam Rinetzky, Sharon Shoham

    Abstract: Modern highly-concurrent search data structures, such as search trees, obtain multi-core scalability and performance by having operations traverse the data structure without any synchronization. As a result, however, these algorithms are notoriously difficult to prove linearizable, which requires identifying a point in time in which the traversal's result is correct. The problem is that traversing… ▽ More

    Submitted 10 January, 2024; v1 submitted 2 October, 2020; originally announced October 2020.

    Comments: Extended version of a paper appearing in OOPSLA'20

  18. arXiv:2008.08042  [pdf, ps, other

    quant-ph cs.MS

    Just another quantum assembly language (Jaqal)

    Authors: Benjamin C. A. Morrison, Andrew J. Landahl, Daniel S. Lobser, Kenneth M. Rudinger, Antonio E. Russo, Jay W. Van Der Wall, Peter Maunz

    Abstract: The Quantum Scientific Computing Open User Testbed (QSCOUT) is a trapped-ion quantum computer testbed realized at Sandia National Laboratories on behalf of the Department of Energy's Office of Science and its Advanced Scientific Computing (ASCR) program. Here we describe Jaqal, for Just another quantum assembly language, the programming language we invented to specify programs executed on QSCOUT.… ▽ More

    Submitted 18 August, 2020; originally announced August 2020.

    Comments: Accepted by the IEEE International Conference on Quantum Computing and Engineering, Oct. 12-16, 2020. Contains overlaps with the formal Jaqal language specification in arXiv:2003.09382, but expands significantly on the rationales behind the language choices made

  19. arXiv:2007.11818  [pdf, other

    cs.AR cs.CR

    Speculative Interference Attacks: Breaking Invisible Speculation Schemes

    Authors: Mohammad Behnia, Prateek Sahu, Riccardo Paccagnella, Jiyong Yu, Zirui Zhao, Xiang Zou, Thomas Unterluggauer, Josep Torrellas, Carlos Rozas, Adam Morrison, Frank Mckeen, Fangfei Liu, Ron Gabor, Christopher W. Fletcher, Abhishek Basak, Alaa Alameldeen

    Abstract: Recent security vulnerabilities that target speculative execution (e.g., Spectre) present a significant challenge for processor design. The highly publicized vulnerability uses speculative execution to learn victim secrets by changing cache state. As a result, recent computer architecture research has focused on invisible speculation mechanisms that attempt to block changes in cache state due to s… ▽ More

    Submitted 23 April, 2021; v1 submitted 23 July, 2020; originally announced July 2020.

    Comments: Updated CR Version

  20. arXiv:1908.01405  [pdf, other

    cs.NI cs.CR

    Programmable In-Network Security for Context-aware BYOD Policies

    Authors: Qiao Kang, Lei Xue, Adam Morrison, Yuxin Tang, Ang Chen, Xiapu Luo

    Abstract: Bring Your Own Device (BYOD) has become the new norm in enterprise networks, but BYOD security remains a top concern. Context-aware security, which enforces access control based on dynamic runtime context, holds much promise. Recent work has developed SDN solutions to collect device context for network-wide access control in a central controller. However, the central controller poses a bottleneck… ▽ More

    Submitted 4 August, 2019; originally announced August 2019.

  21. arXiv:1907.12275  [pdf

    cs.DC cs.HC

    Staged deployment of interactive multi-application HPC workflows

    Authors: Wouter Klijn, Sandra Diaz-Pier, Abigail Morrison, Alexander Peyser

    Abstract: Running scientific workflows on a supercomputer can be a daunting task for a scientific domain specialist. Workflow management solutions (WMS) are a standard method for reducing the complexity of application deployment on high performance computing (HPC) infrastructure. We introduce the design for a middleware system that extends and combines the functionality from existing solutions in order to c… ▽ More

    Submitted 29 July, 2019; originally announced July 2019.

    Comments: 7 pages, 3 figures, The 2019 International Conference on High Performance Computing & Simulation

  22. arXiv:1805.03992  [pdf, other

    cs.DC

    Order out of Chaos: Proving Linearizability Using Local Views

    Authors: Yotam M. Y. Feldman, Constantin Enea, Adam Morrison, Noam Rinetzky, Sharon Shoham

    Abstract: Proving the linearizability of highly concurrent data structures, such as those using optimistic concurrency control, is a challenging task. The main difficulty is in reasoning about the view of the memory obtained by the threads, because as they execute, threads observe different fragments of memory from different points in time. Until today, every linearizability proof has tackled this challenge… ▽ More

    Submitted 5 August, 2018; v1 submitted 10 May, 2018; originally announced May 2018.

    Comments: Full version of the DISC'18 paper

  23. arXiv:1606.02882  [pdf

    cs.SE

    NESTML: a modeling language for spiking neurons

    Authors: Dimitri Plotnikov, Bernhard Rumpe, Inga Blundell, Tammo Ippen, Jochen Martin Eppler, Abgail Morrison

    Abstract: Biological nervous systems exhibit astonishing complexity .Neuroscientists aim to capture this com- plexity by modeling and simulation of biological processes. Often very comple xm odels are nec- essary to depict the processes, which makes it dif fi cult to create these models. Powerful tools are thus necessary ,which enable neuroscientists to express models in acomprehensi ve and concise way and… ▽ More

    Submitted 9 June, 2016; originally announced June 2016.

    Comments: 16 pages, 5 figures, Modellierung 2016 Conference

  24. Closed loop interactions between spiking neural network and robotic simulators based on MUSIC and ROS

    Authors: Philipp Weidel, Mikael Djurfeldt, Renato Duarte, Abigail Morrison

    Abstract: In order to properly assess the function and computational properties of simulated neural systems, it is necessary to account for the nature of the stimuli that drive the system. However, providing stimuli that are rich and yet both reproducible and amenable to experimental manipulations is technically challenging, and even more so if a closed-loop scenario is required. In this work, we present a… ▽ More

    Submitted 16 April, 2016; originally announced April 2016.

  25. arXiv:1510.07898  [pdf, other

    cs.SE cs.LO

    Probabilistic Formal Analysis of App Usage to Inform Redesign

    Authors: Oana Andrei, Muffy Calder, Matthew Chalmers, Alistair Morrison, Mattias Rost

    Abstract: This paper sets out a process of app analysis intended to support understanding of use but also redesign. From usage logs we infer activity patterns - Markov models - and employ probabilistic formal analysis to ask questions about the use of the app. The core of this paper's contribution is a bridging of stochastic and formal modelling, but we also describe the work to make that analytic core util… ▽ More

    Submitted 27 October, 2015; originally announced October 2015.

    Comments: 13 pages, 6 figures, 7 tables, under review