Zum Hauptinhalt springen

Showing 1–18 of 18 results for author: Bernaschi, M

Searching in archive cs. Search in all archives.
.
  1. Multi-GPU aggregation-based AMG preconditioner for iterative linear solvers

    Authors: Massimo Bernaschi, Alessandro Celestini, Pasqua D'Ambra, Flavio Vella

    Abstract: We present and release in open source format a sparse linear solver which efficiently exploits heterogeneous parallel computers. The solver can be easily integrated into scientific applications that need to solve large and sparse linear systems on modern parallel computers made of hybrid nodes hosting NVIDIA Graphics Processing Unit (GPU) accelerators. The work extends our previous efforts in th… ▽ More

    Submitted 4 March, 2023; originally announced March 2023.

    Journal ref: IEEE Transactions on Parallel and Distributed Systems (2023)

  2. arXiv:2209.10439  [pdf, other

    physics.soc-ph cs.SI physics.data-an

    The Fitness-Corrected Block Model, or how to create maximum-entropy data-driven spatial social networks

    Authors: Massimo Bernaschi, Alessandro Celestini, Stefano Guarino, Enrico Mastrostefano, Fabio Saracco

    Abstract: Models of networks play a major role in explaining and reproducing empirically observed patterns. Suitable models can be used to randomize an observed network while preserving some of its features, or to generate synthetic graphs whose properties may be tuned upon the characteristics of a given population. In the present paper, we introduce the Fitness-Corrected Block Model, an adjustable-density… ▽ More

    Submitted 21 September, 2022; originally announced September 2022.

    Comments: 14 pages, 1 figure

    Journal ref: Sci Rep 12, 18206 (2022)

  3. arXiv:2202.05868  [pdf, other

    cs.DC

    Blocking Techniques for Sparse Matrix Multiplication on Tensor Accelerators

    Authors: Paolo Sylos Labini, Massimo Bernaschi, Francesco Silvestri, Flavio Vella

    Abstract: Tensor accelerators have gained popularity because they provide a cheap and efficient solution for speeding up computational-expensive tasks in Deep Learning and, more recently, in other Scientific Computing applications. However, since their features are specifically designed for tensor algebra (typically dense matrix-product), it is commonly assumed that they are not suitable for applications wi… ▽ More

    Submitted 11 February, 2022; originally announced February 2022.

    Comments: 12 pages, 14 images

  4. arXiv:2109.06097  [pdf

    cs.CR

    Forensics for Microsoft Teams

    Authors: Marco Nicoletti, Massimo Bernaschi

    Abstract: Microsoft Teams is a collaboration and communication platform developed by Microsoft that replaces and extends Microsoft Skype for Business. It differs from Skype for Business by the fact that it exists only as part of the Microsoft 365 products whereas Skype for Business can be deployed completely or partly on-premise. During the pandemic emergency in 2020 and 2021 Microsoft Teams has increased d… ▽ More

    Submitted 13 September, 2021; originally announced September 2021.

  5. arXiv:2102.09510  [pdf, other

    cond-mat.dis-nn cond-mat.stat-mech cs.DC cs.DS physics.comp-ph

    How we are leading a 3-XORSAT challenge: from the energy landscape to the algorithm and its efficient implementation on GPUs

    Authors: M. Bernaschi, M. Bisson, M. Fatica, E. Marinari, V. Martin-Mayor, G. Parisi, F. Ricci-Tersenghi

    Abstract: A recent 3-XORSAT challenge required to minimize a very complex and rough energy function, typical of glassy models with a random first order transition and a golf course like energy landscape. We present the ideas beyond the quasi-greedy algorithm and its very efficient implementation on GPUs that are allowing us to rank first in such a competition. We suggest a better protocol to compare algorit… ▽ More

    Submitted 24 February, 2021; v1 submitted 18 February, 2021; originally announced February 2021.

    Comments: 7 pages, 7 figure, EPL format + SM (2 pages)

    Journal ref: EPL, 133 (2021) 60005

  6. Onion under Microscope: An in-depth analysis of the Tor network

    Authors: Massimo Bernaschi, Alessandro Celestini, Marco Cianfriglia, Stefano Guarino, Flavio Lombardi, Enrico Mastrostefano

    Abstract: Tor is an anonymity network that allows offering and accessing various kinds of resources, known as hidden services, while guaranteeing sender and receiver anonymity. The Tor web is the set of web resources that exist on the Tor network, and Tor websites are part of the so-called dark web. Recent research works have evaluated Tor security, evolution over time, and thematic organization. Neverthele… ▽ More

    Submitted 20 January, 2021; originally announced January 2021.

    Journal ref: World Wide Web volume 25 (2022)

  7. Inferring urban social networks from publicly available data

    Authors: Stefano Guarino, Enrico Mastrostefano, Massimo Bernaschi, Alessandro Celestini, Marco Cianfriglia, Davide Torre, Lena Zastrow

    Abstract: The emergence of social networks and the definition of suitable generative models for synthetic yet realistic social graphs are widely studied problems in the literature. By not being tied to any real data, random graph models cannot capture all the subtleties of real networks and are inadequate for many practical contexts -- including areas of research, such as computational epidemiology, which a… ▽ More

    Submitted 2 April, 2021; v1 submitted 11 December, 2020; originally announced December 2020.

    Journal ref: Future Internet 2021, 13(5)

  8. arXiv:2012.02670  [pdf, other

    cs.CR cs.LG

    Unleashing the Tiger: Inference Attacks on Split Learning

    Authors: Dario Pasquini, Giuseppe Ateniese, Massimo Bernaschi

    Abstract: We investigate the security of Split Learning -- a novel collaborative machine learning framework that enables peak performance by requiring minimal resources consumption. In the present paper, we expose vulnerabilities of the protocol and demonstrate its inherent insecurity by introducing general attack strategies targeting the reconstruction of clients' private training sets. More prominently, w… ▽ More

    Submitted 4 November, 2021; v1 submitted 4 December, 2020; originally announced December 2020.

    Comments: ACM Conference on Computer and Communications Security 2021 (CCS21)

  9. arXiv:2010.12269  [pdf, other

    cs.CR cs.LG

    Reducing Bias in Modeling Real-world Password Strength via Deep Learning and Dynamic Dictionaries

    Authors: Dario Pasquini, Marco Cianfriglia, Giuseppe Ateniese, Massimo Bernaschi

    Abstract: Password security hinges on an in-depth understanding of the techniques adopted by attackers. Unfortunately, real-world adversaries resort to pragmatic guessing strategies such as dictionary attacks that are inherently difficult to model in password security studies. In order to be representative of the actual threat, dictionary attacks must be thoughtfully configured and tuned. However, this proc… ▽ More

    Submitted 26 February, 2021; v1 submitted 23 October, 2020; originally announced October 2020.

    Comments: To appear in the proceedings of the 30th USENIX Security Symposium 2021

  10. arXiv:2004.07179  [pdf, other

    cs.CR cs.LG

    Interpretable Probabilistic Password Strength Meters via Deep Learning

    Authors: Dario Pasquini, Giuseppe Ateniese, Massimo Bernaschi

    Abstract: Probabilistic password strength meters have been proved to be the most accurate tools to measure password strength. Unfortunately, by construction, they are limited to solely produce an opaque security estimation that fails to fully support the user during the password composition. In the present work, we move the first steps towards cracking the intelligibility barrier of this compelling class of… ▽ More

    Submitted 11 May, 2021; v1 submitted 15 April, 2020; originally announced April 2020.

    Comments: An abridged version of this paper appears in the proceedings of the 25th European Symposium on Research in Computer Security (ESORICS) 2020

  11. arXiv:1910.04232  [pdf, other

    cs.CR

    Improving Password Guessing via Representation Learning

    Authors: Dario Pasquini, Ankit Gangwal, Giuseppe Ateniese, Massimo Bernaschi, Mauro Conti

    Abstract: Learning useful representations from unstructured data is one of the core challenges, as well as a driving force, of modern data-driven approaches. Deep learning has demonstrated the broad advantages of learning and harnessing such representations. In this paper, we introduce a deep generative model representation learning approach for password guessing. We show that an abstract password represent… ▽ More

    Submitted 26 July, 2020; v1 submitted 9 October, 2019; originally announced October 2019.

    Comments: This paper appears in the proceedings of the 42nd IEEE Symposium on Security and Privacy (Oakland) S&P 2021

  12. A Performance Study of the 2D Ising Model on GPUs

    Authors: Joshua Romero, Mauro Bisson, Massimiliano Fatica, Massimo Bernaschi

    Abstract: The simulation of the two-dimensional Ising model is used as a benchmark to show the computational capabilities of Graphic Processing Units (GPUs). The rich programming environment now available on GPUs and flexible hardware capabilities allowed us to quickly experiment with several implementation ideas: a simple stencil-based algorithm, recasting the stencil operations into matrix multiplies to t… ▽ More

    Submitted 14 June, 2019; originally announced June 2019.

  13. arXiv:1903.02926  [pdf, other

    cs.LG stat.ML

    Adversarial Out-domain Examples for Generative Models

    Authors: Dario Pasquini, Marco Mingione, Massimo Bernaschi

    Abstract: Deep generative models are rapidly becoming a common tool for researchers and developers. However, as exhaustively shown for the family of discriminative models, the test-time inference of deep neural networks cannot be fully controlled and erroneous behaviors can be induced by an attacker. In the present work, we show how a malicious user can force a pre-trained generator to reproduce arbitrary d… ▽ More

    Submitted 13 May, 2019; v1 submitted 7 March, 2019; originally announced March 2019.

    Comments: accepted in proceedings of the Workshop on Machine Learning for Cyber-Crime Investigation and Cybersecurity

  14. arXiv:1901.01337  [pdf, other

    cs.CR

    BitCracker: BitLocker meets GPUs

    Authors: Elena Agostini, Massimo Bernaschi

    Abstract: BitLocker is a full-disk encryption feature available in recent Windows versions. It is designed to protect data by providing encryption for entire volumes and it makes use of a number of different authentication methods. In this paper we present a solution, named BitCracker, to attempt the decryption, by means of a dictionary attack, of memory units encrypted by BitLocker with a user supplied pas… ▽ More

    Submitted 4 January, 2019; originally announced January 2019.

  15. arXiv:1602.00963  [pdf, other

    cs.DC cs.DS cs.SI

    Algorithms and Heuristics for Scalable Betweenness Centrality Computation on Multi-GPU Systems

    Authors: Flavio Vella, Giancarlo Carbone, Massimo Bernaschi

    Abstract: Betweenness Centrality (BC) is steadily growing in popularity as a metrics of the influence of a vertex in a graph. The BC score of a vertex is proportional to the number of all-pairs-shortest-paths passing through it. However, complete and exact BC computation for a large-scale graph is an extraordinary challenge that requires high performance computing techniques to provide results in a reasonab… ▽ More

    Submitted 2 February, 2016; originally announced February 2016.

    Journal ref: Journal of Experimental Algorithmics (JEA) 2018

  16. arXiv:1408.1605  [pdf, other

    cs.DC

    Parallel Distributed Breadth First Search on the Kepler Architecture

    Authors: Mauro Bisson, Massimo Bernaschi, Enrico Mastrostefano

    Abstract: We present the results obtained by using an evolution of our CUDA-based solution for the exploration, via a Breadth First Search, of large graphs. This latest version exploits at its best the features of the Kepler architecture and relies on a combination of techniques to reduce both the number of communications among the GPUs and the amount of exchanged data. The final result is a code that can v… ▽ More

    Submitted 23 December, 2014; v1 submitted 7 August, 2014; originally announced August 2014.

    Comments: In this revision we adopt a technique to reduce the size of exchanged messages that relies on the use of a bitmap. This change halves, by itself, the total execution time. Now the code reaches 800 GTEPS on 4096 Kepler GPUs. We also made some modifications to the Introduction and to the performance section. Added new references

  17. arXiv:1307.8276  [pdf, other

    physics.comp-ph cs.DC

    GPU peer-to-peer techniques applied to a cluster interconnect

    Authors: Roberto Ammendola, Massimo Bernaschi, Andrea Biagioni, Mauro Bisson, Massimiliano Fatica, Ottorino Frezza, Francesca Lo Cicero, Alessandro Lonardo, Enrico Mastrostefano, Pier Stanislao Paolucci, Davide Rossetti, Francesco Simula, Laura Tosoratto, Piero Vicini

    Abstract: Modern GPUs support special protocols to exchange data directly across the PCI Express bus. While these protocols could be used to reduce GPU data transmission times, basically by avoiding staging to host memory, they require specific hardware features which are not available on current generation network adapters. In this paper we describe the architectural modifications required to implement pee… ▽ More

    Submitted 31 July, 2013; originally announced July 2013.

    Comments: paper accepted to CASS 2013

  18. arXiv:1006.2566  [pdf, other

    cond-mat.dis-nn cs.DC

    The Heisenberg spin glass model on GPU: myths and actual facts

    Authors: M. Bernaschi, G. Parisi, L. Parisi

    Abstract: We describe different implementations of the 3D Heisenberg spin glass model for Graphics Processing Units (GPU). The results show that the {\em fast} shared memory gives better performance with respect to the {\em slow} global memory only if a multi-hit technique is used.

    Submitted 13 June, 2010; originally announced June 2010.

    Comments: 13 pages, 2 figures, 4 tables