Skip to main content

Showing 1–6 of 6 results for author: Shamis, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2205.15757  [pdf, other

    cs.DC cs.CR

    Dropbear: Machine Learning Marketplaces made Trustworthy with Byzantine Model Agreement

    Authors: Alex Shamis, Peter Pietzuch, Antoine Delignat-Lavaud, Andrew Paverd, Manuel Costa

    Abstract: Marketplaces for machine learning (ML) models are emerging as a way for organizations to monetize models. They allow model owners to retain control over hosted models by using cloud resources to execute ML inference requests for a fee, preserving model confidentiality. Clients that rely on hosted models require trustworthy inference results, even when models are managed by third parties. While the… ▽ More

    Submitted 31 May, 2022; originally announced May 2022.

  2. arXiv:2205.15359  [pdf, other

    cs.CR eess.SY

    CTR: Checkpoint, Transfer, and Restore for Secure Enclaves

    Authors: Yoshimichi Nakatsuka, Ercan Ozturk, Alex Shamis, Andrew Paverd, Peter Pietzuch

    Abstract: Hardware-based Trusted Execution Environments (TEEs) are becoming increasingly prevalent in cloud computing, forming the basis for confidential computing. However, the security goals of TEEs sometimes conflict with existing cloud functionality, such as VM or process migration, because TEE memory cannot be read by the hypervisor, OS, or other software on the platform. Whilst some newer TEE architec… ▽ More

    Submitted 30 May, 2022; originally announced May 2022.

  3. arXiv:2105.13116  [pdf, other

    cs.DC

    IA-CCF: Individual Accountability for Permissioned Ledgers

    Authors: Alex Shamis, Peter Pietzuch, Miguel Castro, Cédric Fournet, Edward Ashton, Amaury Chamayou, Sylvan Clebsch, Antoine Delignat-Lavaud, Matthew Kerner, Julien Maffre, Manuel Costa, Mark Russinovich

    Abstract: Permissioned ledger systems allow a consortium of members that do not trust one another to execute transactions safely on a set of replicas. Such systems typically use Byzantine fault tolerance (BFT) protocols to distribute trust, which only ensures safety when fewer than 1/3 of the replicas misbehave. Providing guarantees beyond this threshold is a challenge: current systems assume that the ledge… ▽ More

    Submitted 8 March, 2022; v1 submitted 27 May, 2021; originally announced May 2021.

  4. arXiv:2006.14346  [pdf, other

    cs.DC

    Fast General Distributed Transactions with Opacity using Global Time

    Authors: Alex Shamis, Matthew Renzelmann, Stanko Novakovic, Georgios Chatzopoulos, Anders T. Gjerdrum, Dan Alistarh, Aleksandar Dragojevic, Dushyanth Narayanan, Miguel Castro

    Abstract: Transactions can simplify distributed applications by hiding data distribution, concurrency, and failures from the application developer. Ideally the developer would see the abstraction of a single large machine that runs transactions sequentially and never fails. This requires the transactional subsystem to provide opacity (strict serializability for both committed and aborted transactions), as w… ▽ More

    Submitted 25 June, 2020; originally announced June 2020.

  5. A1: A Distributed In-Memory Graph Database

    Authors: Chiranjeeb Buragohain, Knut Magne Risvik, Paul Brett, Miguel Castro, Wonhee Cho, Joshua Cowhig, Nikolas Gloy, Karthik Kalyanaraman, Richendra Khanna, John Pao, Matthew Renzelmann, Alex Shamis, Timothy Tan, Shuheng Zheng

    Abstract: A1 is an in-memory distributed database used by the Bing search engine to support complex queries over structured data. The key enablers for A1 are availability of cheap DRAM and high speed RDMA (Remote Direct Memory Access) networking in commodity hardware. A1 uses FaRM as its underlying storage layer and builds the graph abstraction and query engine on top. The combination of in-memory storage a… ▽ More

    Submitted 12 April, 2020; originally announced April 2020.

  6. arXiv:2001.07886  [pdf, other

    cs.MM cs.CR eess.SY

    AMP: Authentication of Media via Provenance

    Authors: Paul England, Henrique S. Malvar, Eric Horvitz, Jack W. Stokes, Cédric Fournet, Rebecca Burke-Aguero, Amaury Chamayou, Sylvan Clebsch, Manuel Costa, John Deutscher, Shabnam Erfani, Matt Gaylor, Andrew Jenks, Kevin Kane, Elissa Redmiles, Alex Shamis, Isha Sharma, Sam Wenker, Anika Zaman

    Abstract: Advances in graphics and machine learning have led to the general availability of easy-to-use tools for modifying and synthesizing media. The proliferation of these tools threatens to cast doubt on the veracity of all media. One approach to thwarting the flow of fake media is to detect modified or synthesized media through machine learning methods. While detection may help in the short term, we be… ▽ More

    Submitted 20 June, 2020; v1 submitted 22 January, 2020; originally announced January 2020.

    Comments: Add detailed manifest description, Add provenance, Improve text