Skip to main content

Showing 1–7 of 7 results for author: Tullsen, D

Searching in archive cs. Search in all archives.
.
  1. arXiv:2109.00665  [pdf, other

    cs.AR

    Agon: A Scalable Competitive Scheduler for Large Heterogeneous Systems

    Authors: Andreas Prodromou, Ashish Venkat, Dean M. Tullsen

    Abstract: This work proposes a competitive scheduling approach, designed to scale to large heterogeneous multicore systems. This scheduler overcomes the challenges of (1) the high computation overhead of near-optimal schedulers, and (2) the error introduced by inaccurate performance predictions. This paper presents Agon, a neural network-based classifier that selects from a range of schedulers, from simple… ▽ More

    Submitted 1 September, 2021; originally announced September 2021.

  2. arXiv:2102.12730  [pdf, other

    cs.CR

    Swivel: Hardening WebAssembly against Spectre

    Authors: Shravan Narayan, Craig Disselkoen, Daniel Moghimi, Sunjay Cauligi, Evan Johnson, Zhao Gang, Anjo Vahldiek-Oberwagner, Ravi Sahita, Hovav Shacham, Dean Tullsen, Deian Stefan

    Abstract: We describe Swivel, a new compiler framework for hardening WebAssembly (Wasm) against Spectre attacks. Outside the browser, Wasm has become a popular lightweight, in-process sandbox and is, for example, used in production to isolate different clients on edge clouds and function-as-a-service platforms. Unfortunately, Spectre attacks can bypass Wasm's isolation guarantees. Swivel hardens Wasm agains… ▽ More

    Submitted 19 March, 2021; v1 submitted 25 February, 2021; originally announced February 2021.

    Comments: Accepted at USENIX 21

    MSC Class: D.4.6 ACM Class: D.4.6

  3. Automatically Eliminating Speculative Leaks from Cryptographic Code with Blade

    Authors: Marco Vassena, Craig Disselkoen, Klaus V. Gleissenthall, Sunjay Cauligi, Rami Gökhan Kici, Ranjit Jhala, Dean Tullsen, Deian Stefan

    Abstract: We introduce BLADE, a new approach to automatically and efficiently eliminate speculative leaks from cryptographic code. BLADE is built on the insight that to stop leaks via speculation, it suffices to $\textit{cut}$ the dataflow from expressions that speculatively introduce secrets ($\textit{sources}$) to those that leak them through the cache ($\textit{sinks}$), rather than prohibit speculation… ▽ More

    Submitted 7 December, 2020; v1 submitted 1 May, 2020; originally announced May 2020.

  4. arXiv:2003.12154  [pdf, other

    cs.LG cs.CR cs.IT stat.ML

    Not All Features Are Equal: Discovering Essential Features for Preserving Prediction Privacy

    Authors: Fatemehsadat Mireshghallah, Mohammadkazem Taram, Ali Jalali, Ahmed Taha Elthakeb, Dean Tullsen, Hadi Esmaeilzadeh

    Abstract: When receiving machine learning services from the cloud, the provider does not need to receive all features; in fact, only a subset of the features are necessary for the target prediction task. Discerning this subset is the key problem of this work. We formulate this problem as a gradient-based perturbation maximization method that discovers this subset in the input feature space with respect to t… ▽ More

    Submitted 20 February, 2021; v1 submitted 26 March, 2020; originally announced March 2020.

    Comments: This paper is presented at the 2021 Web conference (WWW 2021)

  5. arXiv:1910.01755  [pdf, other

    cs.CR cs.PL

    Constant-Time Foundations for the New Spectre Era

    Authors: Sunjay Cauligi, Craig Disselkoen, Klaus v. Gleissenthall, Dean Tullsen, Deian Stefan, Tamara Rezk, Gilles Barthe

    Abstract: The constant-time discipline is a software-based countermeasure used for protecting high assurance cryptographic implementations against timing side-channel attacks. Constant-time is effective (it protects against many known attacks), rigorous (it can be formalized using program semantics), and amenable to automated verification. Yet, the advent of micro-architectural attacks makes constant-time a… ▽ More

    Submitted 8 May, 2020; v1 submitted 3 October, 2019; originally announced October 2019.

    Comments: To appear at PLDI '20

  6. arXiv:1909.04841  [pdf, other

    cs.CR cs.AR cs.NI

    Packet Chasing: Spying on Network Packets over a Cache Side-Channel

    Authors: Mohammadkazem Taram, Ashish Venkat, Dean Tullsen

    Abstract: This paper presents Packet Chasing, an attack on the network that does not require access to the network, and works regardless of the privilege level of the process receiving the packets. A spy process can easily probe and discover the exact cache location of each buffer used by the network driver. Even more useful, it can discover the exact sequence in which those buffers are used to receive pack… ▽ More

    Submitted 25 May, 2020; v1 submitted 11 September, 2019; originally announced September 2019.

  7. arXiv:1905.11814  [pdf, other

    cs.CR cs.LG stat.ML

    Shredder: Learning Noise Distributions to Protect Inference Privacy

    Authors: Fatemehsadat Mireshghallah, Mohammadkazem Taram, Prakash Ramrakhyani, Dean Tullsen, Hadi Esmaeilzadeh

    Abstract: A wide variety of deep neural applications increasingly rely on the cloud to perform their compute-heavy inference. This common practice requires sending private and privileged data over the network to remote servers, exposing it to the service provider and potentially compromising its privacy. Even if the provider is trusted, the data can still be vulnerable over communication channels or via sid… ▽ More

    Submitted 27 October, 2020; v1 submitted 26 May, 2019; originally announced May 2019.

    Comments: Presented in ASPLOS 2020