Zum Hauptinhalt springen

Showing 1–21 of 21 results for author: Cidon, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.16719  [pdf, other

    cs.CR

    Cookie Monster: Efficient On-device Budgeting for Differentially-Private Ad-Measurement Systems

    Authors: Pierre Tholoniat, Kelly Kostopoulou, Peter McNeely, Prabhpreet Singh Sodhi, Anirudh Varanasi, Benjamin Case, Asaf Cidon, Roxana Geambasu, Mathias Lécuyer

    Abstract: With the impending removal of third-party cookies from major browsers and the introduction of new privacy-preserving advertising APIs, the research community has a timely opportunity to assist industry in qualitatively improving the Web's privacy. This paper discusses our efforts, within a W3C community group, to enhance existing privacy-preserving advertising measurement APIs. We analyze designs… ▽ More

    Submitted 26 August, 2024; v1 submitted 26 May, 2024; originally announced May 2024.

    Comments: To appear at SOSP '24. v3: changed to non-anonymized name after acceptance notification, clarified text and reformatted graphs in §8. v2: added pseudocode in §3.3

  2. arXiv:2312.06808  [pdf, other

    cs.OS

    BPF-oF: Storage Function Pushdown Over the Network

    Authors: Ioannis Zarkadas, Tal Zussman, Jeremy Carin, Sheng Jiang, Yuhong Zhong, Jonas Pfefferle, Hubertus Franke, Junfeng Yang, Kostis Kaffes, Ryan Stutsman, Asaf Cidon

    Abstract: Storage disaggregation, wherein storage is accessed over the network, is popular because it allows applications to independently scale storage capacity and bandwidth based on dynamic application demand. However, the added network processing introduced by disaggregation can consume significant CPU resources. In many storage systems, logical storage operations (e.g., lookups, aggregations) involve a… ▽ More

    Submitted 11 December, 2023; originally announced December 2023.

  3. Turbo: Effective Caching in Differentially-Private Databases

    Authors: Kelly Kostopoulou, Pierre Tholoniat, Asaf Cidon, Roxana Geambasu, Mathias Lécuyer

    Abstract: Differentially-private (DP) databases allow for privacy-preserving analytics over sensitive datasets or data streams. In these systems, user privacy is a limited resource that must be conserved with each query. We propose Turbo, a novel, state-of-the-art caching layer for linear query workloads over DP databases. Turbo builds upon private multiplicative weights (PMW), a DP mechanism that is powerf… ▽ More

    Submitted 23 October, 2023; v1 submitted 28 June, 2023; originally announced June 2023.

    Comments: Extended version of a paper presented at the 29th ACM Symposium on Operating Systems Principles (SOSP '23)

  4. arXiv:2305.17222  [pdf, other

    cs.OS

    Karma: Resource Allocation for Dynamic Demands

    Authors: Midhul Vuppalapati, Giannis Fikioris, Rachit Agarwal, Asaf Cidon, Anurag Khandelwal, Eva Tardos

    Abstract: We consider the problem of fair resource allocation in a system where user demands are dynamic, that is, where user demands vary over time. Our key observation is that the classical max-min fairness algorithm for resource allocation provides many desirable properties (e.g., Pareto efficiency, strategy-proofness, and fairness), but only under the strong assumption of user demands being static over… ▽ More

    Submitted 7 July, 2023; v1 submitted 26 May, 2023; originally announced May 2023.

    Comments: Full version of paper accepted to USENIX OSDI 2023 with proofs of theoretical guarantees

  5. arXiv:2305.07772  [pdf, other

    cs.LG cs.CV

    Monitoring and Adapting ML Models on Mobile Devices

    Authors: Wei Hao, Zixi Wang, Lauren Hong, Lingxiao Li, Nader Karayanni, Chengzhi Mao, Junfeng Yang, Asaf Cidon

    Abstract: ML models are increasingly being pushed to mobile devices, for low-latency inference and offline operation. However, once the models are deployed, it is hard for ML operators to track their accuracy, which can degrade unpredictably (e.g., due to data drift). We design the first end-to-end system for continuously monitoring and adapting models on mobile devices without requiring feedback from users… ▽ More

    Submitted 17 May, 2023; v1 submitted 12 May, 2023; originally announced May 2023.

  6. arXiv:2212.13228  [pdf, other

    cs.CR cs.LG

    Packing Privacy Budget Efficiently

    Authors: Pierre Tholoniat, Kelly Kostopoulou, Mosharaf Chowdhury, Asaf Cidon, Roxana Geambasu, Mathias Lécuyer, Junfeng Yang

    Abstract: Machine learning (ML) models can leak information about users, and differential privacy (DP) provides a rigorous way to bound that leakage under a given budget. This DP budget can be regarded as a new type of compute resource in workloads of multiple ML models training on user data. Once it is used, the DP budget is forever consumed. Therefore, it is crucial to allocate it most efficiently to trai… ▽ More

    Submitted 26 December, 2022; originally announced December 2022.

  7. arXiv:2204.10933  [pdf, other

    cs.CR cs.AI cs.DC cs.LG

    A Tale of Two Models: Constructing Evasive Attacks on Edge Models

    Authors: Wei Hao, Aahil Awatramani, Jiayang Hu, Chengzhi Mao, Pin-Chun Chen, Eyal Cidon, Asaf Cidon, Junfeng Yang

    Abstract: Full-precision deep learning models are typically too large or costly to deploy on edge devices. To accommodate to the limited hardware resources, models are adapted to the edge using various edge-adaptation techniques, such as quantization and pruning. While such techniques may have a negligible impact on top-line accuracy, the adapted models exhibit subtle differences in output compared to the o… ▽ More

    Submitted 22 April, 2022; originally announced April 2022.

    Journal ref: MLSys 2022

  8. arXiv:2201.02120  [pdf, other

    cs.DC cs.CY cs.LG cs.NI

    Treehouse: A Case For Carbon-Aware Datacenter Software

    Authors: Thomas Anderson, Adam Belay, Mosharaf Chowdhury, Asaf Cidon, Irene Zhang

    Abstract: The end of Dennard scaling and the slowing of Moore's Law has put the energy use of datacenters on an unsustainable path. Datacenters are already a significant fraction of worldwide electricity use, with application demand scaling at a rapid rate. We argue that substantial reductions in the carbon intensity of datacenter computing are possible with a software-centric approach: by making energy and… ▽ More

    Submitted 6 January, 2022; originally announced January 2022.

  9. arXiv:2108.06893  [pdf, other

    cs.DC

    Memtrade: A Disaggregated-Memory Marketplace for Public Clouds

    Authors: Hasan Al Maruf, Yuhong Zhong, Hongyi Wang, Mosharaf Chowdhury, Asaf Cidon, Carl Waldspurger

    Abstract: We present Memtrade, the first memory disaggregation system for public clouds. Public clouds introduce a set of unique challenges for resource disaggregation across different tenants, including security, isolation and pricing. Memtrade allows producer virtual machines (VMs) to lease both their unallocated memory and allocated-but-idle application memory to remote consumer VMs for a limited period… ▽ More

    Submitted 16 August, 2021; originally announced August 2021.

  10. arXiv:2106.15335  [pdf, other

    cs.CR cs.DC cs.LG

    Privacy Budget Scheduling

    Authors: Tao Luo, Mingen Pan, Pierre Tholoniat, Asaf Cidon, Roxana Geambasu, Mathias Lécuyer

    Abstract: Machine learning (ML) models trained on personal data have been shown to leak information about users. Differential privacy (DP) enables model training with a guaranteed bound on this leakage. Each new model trained with DP increases the bound on data leakage and can be seen as consuming part of a global privacy budget that should not be exceeded. This budget is a scarce resource that must be care… ▽ More

    Submitted 29 June, 2021; originally announced June 2021.

    Comments: Extended version of a paper presented at the 15th USENIX Symposium on Operating Systems Design and Implementation (OSDI '21)

  11. arXiv:2102.12922  [pdf, other

    cs.OS cs.DB

    BPF for storage: an exokernel-inspired approach

    Authors: Yu Jian Wu, Hongyi Wang, Yuhong Zhong, Asaf Cidon, Ryan Stutsman, Amy Tai, Junfeng Yang

    Abstract: The overhead of the kernel storage path accounts for half of the access latency for new NVMe storage devices. We explore using BPF to reduce this overhead, by injecting user-defined functions deep in the kernel's I/O processing stack. When issuing a series of dependent I/O requests, this approach can increase IOPS by over 2.5$\times$ and cut latency by half, by bypassing kernel layers and avoiding… ▽ More

    Submitted 25 February, 2021; originally announced February 2021.

  12. arXiv:2010.09028  [pdf, other

    cs.LG

    Characterizing and Taming Model Instability Across Edge Devices

    Authors: Eyal Cidon, Evgenya Pergament, Zain Asgar, Asaf Cidon, Sachin Katti

    Abstract: The same machine learning model running on different edge devices may produce highly-divergent outputs on a nearly-identical input. Possible reasons for the divergence include differences in the device sensors, the device's signal processing hardware and software, and its operating system and processors. This paper presents the first methodical characterization of the variations in model predictio… ▽ More

    Submitted 18 October, 2020; originally announced October 2020.

  13. arXiv:2008.02352  [pdf, other

    cs.DB cs.DC

    Efficient Compactions Between Storage Tiers with PrismDB

    Authors: Ashwini Raina, Jianan Lu, Asaf Cidon, Michael J. Freedman

    Abstract: In recent years, emerging storage hardware technologies have focused on divergent goals: better performance or lower cost-per-bit. Correspondingly, data systems that employ these technologies are typically optimized either to be fast (but expensive) or cheap (but slow). We take a different approach: by architecting a storage engine to natively utilize two tiers of fast and low-cost storage technol… ▽ More

    Submitted 25 May, 2022; v1 submitted 5 August, 2020; originally announced August 2020.

  14. arXiv:2007.14030  [pdf, other

    cs.CR cs.SI

    A Large-Scale Analysis of Attacker Activity in Compromised Enterprise Accounts

    Authors: Neil Shah, Grant Ho, Marco Schweighauser, M. H. Afifi, Asaf Cidon, David Wagner

    Abstract: We present a large-scale characterization of attacker activity across 111 real-world enterprise organizations. We develop a novel forensic technique for distinguishing between attacker activity and benign activity in compromised enterprise accounts that yields few false positives and enables us to perform fine-grained analysis of attacker behavior. Applying our methods to a set of 159 compromised… ▽ More

    Submitted 28 July, 2020; originally announced July 2020.

    Comments: Extended report of workshop paper presented at the 1st MLHat Workshop (MLHat Security and ML 2020). KDD, 2020

  15. arXiv:1912.01149  [pdf, other

    cs.CR cs.LG

    Cost-Aware Robust Tree Ensembles for Security Applications

    Authors: Yizheng Chen, Shiqi Wang, Weifan Jiang, Asaf Cidon, Suman Jana

    Abstract: There are various costs for attackers to manipulate the features of security classifiers. The costs are asymmetric across features and to the directions of changes, which cannot be precisely captured by existing cost models based on $L_p$-norm robustness. In this paper, we utilize such domain knowledge to increase the attack cost of evading classifiers, specifically, tree ensemble models that are… ▽ More

    Submitted 22 February, 2021; v1 submitted 2 December, 2019; originally announced December 2019.

    Comments: USENIX Security 2021

  16. arXiv:1910.09727  [pdf, other

    cs.DC cs.NI

    Hydra: Resilient and Highly Available Remote Memory

    Authors: Youngmoon Lee, Hasan Al Maruf, Mosharaf Chowdhury, Asaf Cidon, Kang G. Shin

    Abstract: We present Hydra, a low-latency, low-overhead, and highly available resilience mechanism for remote memory. Hydra can access erasure-coded remote memory within a single-digit microsecond read/write latency, significantly improving the performance-efficiency trade-off over the state-of-the-art -- it performs similar to in-memory replication with 1.6X lower memory overhead. We also propose CodingSet… ▽ More

    Submitted 28 May, 2023; v1 submitted 21 October, 2019; originally announced October 2019.

    Journal ref: 20th USENIX Conference on File and Storage Technologies (FAST), 2022, 181-198

  17. arXiv:1910.00790  [pdf, other

    cs.CR cs.SI

    Detecting and Characterizing Lateral Phishing at Scale

    Authors: Grant Ho, Asaf Cidon, Lior Gavish, Marco Schweighauser, Vern Paxson, Stefan Savage, Geoffrey M. Voelker, David Wagner

    Abstract: We present the first large-scale characterization of lateral phishing attacks, based on a dataset of 113 million employee-sent emails from 92 enterprise organizations. In a lateral phishing attack, adversaries leverage a compromised enterprise account to send phishing emails to other users, benefitting from both the implicit trust and the information in the hijacked user's account. We develop a cl… ▽ More

    Submitted 2 October, 2019; originally announced October 2019.

    Comments: Extended report of conference paper presented at the 26th USENIX Security Symposium (USENIX Security 19). USENIX Association, 2019

  18. arXiv:1811.05922  [pdf, other

    cs.LG stat.ML

    Bandana: Using Non-volatile Memory for Storing Deep Learning Models

    Authors: Assaf Eisenman, Maxim Naumov, Darryl Gardner, Misha Smelyanskiy, Sergey Pupyrev, Kim Hazelwood, Asaf Cidon, Sachin Katti

    Abstract: Typical large-scale recommender systems use deep learning models that are stored on a large amount of DRAM. These models often rely on embeddings, which consume most of the required memory. We present Bandana, a storage system that reduces the DRAM footprint of embeddings, by using Non-volatile Memory (NVM) as the primary storage medium, with a small amount of DRAM as cache. The main challenge in… ▽ More

    Submitted 14 November, 2018; v1 submitted 14 November, 2018; originally announced November 2018.

  19. arXiv:1805.02790  [pdf, other

    cs.DC

    Live Recovery of Bit Corruptions in Datacenter Storage Systems

    Authors: Amy Tai, Andrew Kryczka, Shobhit Kanaujia, Chris Petersen, Mikhail Antonov, Muhammad Waliji, Kyle Jamieson, Michael J. Freedman, Asaf Cidon

    Abstract: Due to its high performance and decreasing cost per bit, flash is becoming the main storage medium in datacenters for hot data. However, flash endurance is a perpetual problem, and due to technology trends, subsequent generations of flash devices exhibit progressively shorter lifetimes before they experience uncorrectable bit errors. In this paper we propose extending flash lifetime by allowing… ▽ More

    Submitted 8 May, 2018; v1 submitted 7 May, 2018; originally announced May 2018.

  20. arXiv:1702.02588  [pdf, other

    cs.OS

    Flashield: a Key-value Cache that Minimizes Writes to Flash

    Authors: Assaf Eisenman, Asaf Cidon, Evgenya Pergament, Or Haimovich, Ryan Stutsman, Mohammad Alizadeh, Sachin Katti

    Abstract: As its price per bit drops, SSD is increasingly becoming the default storage medium for cloud application databases. However, it has not become the preferred storage medium for key-value caches, even though SSD offers more than 10x lower price per bit and sufficient performance compared to DRAM. This is because key-value caches need to frequently insert, update and evict small objects. This causes… ▽ More

    Submitted 8 February, 2017; originally announced February 2017.

  21. arXiv:1610.08129  [pdf, other

    cs.OS

    Memshare: a Dynamic Multi-tenant Memory Key-value Cache

    Authors: Asaf Cidon, Daniel Rushton, Stephen M. Rumble, Ryan Stutsman

    Abstract: Web application performance is heavily reliant on the hit rate of memory-based caches. Current DRAM-based web caches statically partition their memory across multiple applications sharing the cache. This causes under utilization of memory which negatively impacts cache hit rates. We present Memshare, a novel web memory cache that dynamically manages memory across applications. Memshare provides a… ▽ More

    Submitted 25 October, 2016; originally announced October 2016.

    Comments: 14 pages, 5 figures