Zum Hauptinhalt springen

Showing 1–20 of 20 results for author: Pietzuch, P

Searching in archive cs. Search in all archives.
.
  1. arXiv:2312.11796  [pdf, other

    cs.CR

    QuanShield: Protecting against Side-Channels Attacks using Self-Destructing Enclaves

    Authors: Shujie Cui, Haohua Li, Yuanhong Li, Zhi Zhang, Lluís Vilanova, Peter Pietzuch

    Abstract: Trusted Execution Environments (TEEs) allow user processes to create enclaves that protect security-sensitive computation against access from the OS kernel and the hypervisor. Recent work has shown that TEEs are vulnerable to side-channel attacks that allow an adversary to learn secrets shielded in enclaves. The majority of such attacks trigger exceptions or interrupts to trace the control or data… ▽ More

    Submitted 18 December, 2023; originally announced December 2023.

    Comments: 15pages, 5 figures, 5 tables

    MSC Class: ACM

  2. arXiv:2312.05181  [pdf, other

    cs.DC cs.AI cs.LG

    Tenplex: Dynamic Parallelism for Deep Learning using Parallelizable Tensor Collections

    Authors: Marcel Wagenländer, Guo Li, Bo Zhao, Luo Mai, Peter Pietzuch

    Abstract: Deep learning (DL) jobs use multi-dimensional parallelism, i.e. combining data, model, and pipeline parallelism, to use large GPU clusters efficiently. Long-running jobs may experience changes to their GPU allocation: (i) resource elasticity during training adds or removes GPUs; (ii) hardware maintenance may require redeployment on different GPUs; and (iii) GPU failures force jobs to run with fewe… ▽ More

    Submitted 23 April, 2024; v1 submitted 8 December, 2023; originally announced December 2023.

  3. arXiv:2305.10863  [pdf, other

    cs.DC cs.AI cs.LG cs.OS

    Quiver: Supporting GPUs for Low-Latency, High-Throughput GNN Serving with Workload Awareness

    Authors: Zeyuan Tan, Xiulong Yuan, Congjie He, Man-Kit Sit, Guo Li, Xiaoze Liu, Baole Ai, Kai Zeng, Peter Pietzuch, Luo Mai

    Abstract: Systems for serving inference requests on graph neural networks (GNN) must combine low latency with high throughout, but they face irregular computation due to skew in the number of sampled graph nodes and aggregated GNN features. This makes it challenging to exploit GPUs effectively: using GPUs to sample only a few graph nodes yields lower performance than CPU-based sampling; and aggregating many… ▽ More

    Submitted 18 May, 2023; originally announced May 2023.

  4. arXiv:2302.11358  [pdf, other

    cs.DC cs.OS

    Faabric: Fine-Grained Distribution of Scientific Workloads in the Cloud

    Authors: Simon Shillaker, Carlos Segarra, Eleftheria Mappoura, Mayeul Fournial, Lluis Vilanova, Peter Pietzuch

    Abstract: With their high parallelism and resource needs, many scientific applications benefit from cloud deployments. Today, scientific applications are executed on dedicated pools of VMs, resulting in resource fragmentation: users pay for underutilised resources, and providers cannot reallocate unused resources between applications. While serverless cloud computing could address these issues, its programm… ▽ More

    Submitted 22 February, 2023; originally announced February 2023.

    Comments: 12 pages

  5. arXiv:2210.00882  [pdf, other

    cs.LG cs.AI cs.DC

    MSRL: Distributed Reinforcement Learning with Dataflow Fragments

    Authors: Huanzhou Zhu, Bo Zhao, Gang Chen, Weifeng Chen, Yijie Chen, Liang Shi, Yaodong Yang, Peter Pietzuch, Lei Chen

    Abstract: Reinforcement learning (RL) trains many agents, which is resource-intensive and must scale to large GPU clusters. Different RL training algorithms offer different opportunities for distributing and parallelising the computation. Yet, current distributed RL systems tie the definition of RL algorithms to their distributed execution: they hard-code particular distribution strategies and only accelera… ▽ More

    Submitted 28 October, 2022; v1 submitted 3 October, 2022; originally announced October 2022.

  6. arXiv:2205.15757  [pdf, other

    cs.DC cs.CR

    Dropbear: Machine Learning Marketplaces made Trustworthy with Byzantine Model Agreement

    Authors: Alex Shamis, Peter Pietzuch, Antoine Delignat-Lavaud, Andrew Paverd, Manuel Costa

    Abstract: Marketplaces for machine learning (ML) models are emerging as a way for organizations to monetize models. They allow model owners to retain control over hosted models by using cloud resources to execute ML inference requests for a fee, preserving model confidentiality. Clients that rely on hosted models require trustworthy inference results, even when models are managed by third parties. While the… ▽ More

    Submitted 31 May, 2022; originally announced May 2022.

  7. arXiv:2205.15359  [pdf, other

    cs.CR eess.SY

    CTR: Checkpoint, Transfer, and Restore for Secure Enclaves

    Authors: Yoshimichi Nakatsuka, Ercan Ozturk, Alex Shamis, Andrew Paverd, Peter Pietzuch

    Abstract: Hardware-based Trusted Execution Environments (TEEs) are becoming increasingly prevalent in cloud computing, forming the basis for confidential computing. However, the security goals of TEEs sometimes conflict with existing cloud functionality, such as VM or process migration, because TEE memory cannot be read by the hypervisor, OS, or other software on the platform. Whilst some newer TEE architec… ▽ More

    Submitted 30 May, 2022; originally announced May 2022.

  8. arXiv:2202.05732  [pdf, other

    cs.OS

    CAP-VMs: Capability-Based Isolation and Sharing for Microservices

    Authors: Vasily A. Sartakov, Lluís Vilanova, David Eyers, Takahiro Shinagawa, Peter Pietzuch

    Abstract: Cloud stacks must isolate application components, while permitting efficient data sharing between components deployed on the same physical host. Traditionally, the MMU enforces isolation and permits sharing at page granularity. MMU approaches, however, lead to cloud stacks with large TCBs in kernel space, and page granularity requires inefficient OS interfaces for data sharing. Forthcoming CPUs wi… ▽ More

    Submitted 24 June, 2022; v1 submitted 11 February, 2022; originally announced February 2022.

  9. arXiv:2105.13116  [pdf, other

    cs.DC

    IA-CCF: Individual Accountability for Permissioned Ledgers

    Authors: Alex Shamis, Peter Pietzuch, Miguel Castro, Cédric Fournet, Edward Ashton, Amaury Chamayou, Sylvan Clebsch, Antoine Delignat-Lavaud, Matthew Kerner, Julien Maffre, Manuel Costa, Mark Russinovich

    Abstract: Permissioned ledger systems allow a consortium of members that do not trust one another to execute transactions safely on a set of replicas. Such systems typically use Byzantine fault tolerance (BFT) protocols to distribute trust, which only ensures safety when fewer than 1/3 of the replicas misbehave. Providing guarantees beyond this threshold is a challenge: current systems assume that the ledge… ▽ More

    Submitted 8 March, 2022; v1 submitted 27 May, 2021; originally announced May 2021.

  10. arXiv:2104.13429  [pdf, other

    cs.DC

    Pronto: Federated Task Scheduling

    Authors: Andreas Grammenos, Evangelia Kalyvianaki, Peter Pietzuch

    Abstract: We present a federated, asynchronous, memory-limited algorithm for online task scheduling across large-scale networks of hundreds of workers. This is achieved through recent advancements in federated edge computing that unlocks the ability to incrementally compute local model updates within each node separately. This local model is then used along with incoming data to generate a rejection signal… ▽ More

    Submitted 27 April, 2021; originally announced April 2021.

    Comments: 19 pages, 7 figures, 7 tables

  11. arXiv:2006.11068  [pdf, other

    cs.CY

    The EuroSys 2020 Online Conference: Experience and lessons learned

    Authors: Angelos Bilas, Dejan Kostic, Kostas Magoutis, Evangelos Markatos, Dushyanth Narayanan, Peter Pietzuch, Margo Seltzer

    Abstract: The 15th European Conference on Computer Systems (EuroSys'20) was organized as a virtual (online) conference on April 27-30, 2020. The main EuroSys'20 track took place April 28-30, 2020, preceded by five workshops (EdgeSys'20, EuroDW'20, EuroSec'20, PaPoC'20, SPMA'20) on April 27, 2020. The decision to hold a virtual (online) conference was taken in early April 2020, after consultations with the E… ▽ More

    Submitted 19 June, 2020; originally announced June 2020.

  12. arXiv:2002.09344  [pdf, other

    cs.DC

    Faasm: Lightweight Isolation for Efficient Stateful Serverless Computing

    Authors: Simon Shillaker, Peter Pietzuch

    Abstract: Serverless computing is an excellent fit for big data processing because it can scale quickly and cheaply to thousands of parallel functions. Existing serverless platforms isolate functions in ephemeral, stateless containers, preventing them from directly sharing memory. This forces users to duplicate and serialise data repeatedly, adding unnecessary performance and resource costs. We believe that… ▽ More

    Submitted 19 June, 2020; v1 submitted 21 February, 2020; originally announced February 2020.

  13. arXiv:1908.11143  [pdf, other

    cs.OS cs.CR

    SGX-LKL: Securing the Host OS Interface for Trusted Execution

    Authors: Christian Priebe, Divya Muthukumaran, Joshua Lind, Huanzhou Zhu, Shujie Cui, Vasily A. Sartakov, Peter Pietzuch

    Abstract: Hardware support for trusted execution in modern CPUs enables tenants to shield their data processing workloads in otherwise untrusted cloud environments. Runtime systems for the trusted execution must rely on an interface to the untrusted host OS to use external resources such as storage, network, and other functions. Attackers may exploit this interface to leak data or corrupt the computation.… ▽ More

    Submitted 20 January, 2020; v1 submitted 29 August, 2019; originally announced August 2019.

  14. arXiv:1907.11465  [pdf, other

    cs.DC

    ServerMix: Tradeoffs and Challenges of Serverless Data Analytics

    Authors: Pedro García-López, Marc Sánchez-Artigas, Simon Shillaker, Peter Pietzuch, David Breitgand, Gil Vernik, Pierre Sutra, Tristan Tarrant, Ana Juan Ferrer

    Abstract: Serverless computing has become very popular today since it largely simplifies cloud programming. Developers do not need to longer worry about provisioning or operating servers, and they pay only for the compute resources used when their code is run. This new cloud paradigm suits well for many applications, and researchers have already begun investigating the feasibility of serverless computing fo… ▽ More

    Submitted 26 July, 2019; originally announced July 2019.

    Comments: 15 pages, 1 figure, 1 table

  15. Using Trusted Execution Environments for Secure Stream Processing of Medical Data

    Authors: Carlos Segarra, Ricard Delgado-Gonzalo, Mathieu Lemay, Pierre-Louis Aublin, Peter Pietzuch, Valerio Schiavoni

    Abstract: Processing sensitive data, such as those produced by body sensors, on third-party untrusted clouds is particularly challenging without compromising the privacy of the users generating it. Typically, these sensors generate large quantities of continuous data in a streaming fashion. Such vast amount of data must be processed efficiently and securely, even under strong adversarial models. The recent… ▽ More

    Submitted 17 June, 2019; originally announced June 2019.

    Comments: 19th International Conference on Distributed Applications and Interoperable Systems

    Journal ref: In: Pereira J., Ricci L. (eds) Distributed Applications and Interoperable Systems. DAIS 2019. Pages 91-107. Lecture Notes in Computer Science, vol 11534. Springer, Cham

  16. arXiv:1901.02244  [pdf, other

    cs.DC cs.LG

    CROSSBOW: Scaling Deep Learning with Small Batch Sizes on Multi-GPU Servers

    Authors: Alexandros Koliousis, Pijika Watcharapichat, Matthias Weidlich, Luo Mai, Paolo Costa, Peter Pietzuch

    Abstract: Deep learning models are trained on servers with many GPUs, and training must scale with the number of GPUs. Systems such as TensorFlow and Caffe2 train models with parallel synchronous stochastic gradient descent: they process a batch of training data at a time, partitioned across GPUs, and average the resulting partial gradients to obtain an updated global model. To fully utilise all GPUs, syste… ▽ More

    Submitted 8 January, 2019; originally announced January 2019.

  17. SecureCloud: Secure Big Data Processing in Untrusted Clouds

    Authors: Florian Kelbert, Franz Gregor, Rafael Pires, Stefan Köpsell, Marcelo Pasin, Aurélien Havet, Valerio Schiavoni, Pascal Felber, Christof Fetzer, Peter Pietzuch

    Abstract: We present the SecureCloud EU Horizon 2020 project, whose goal is to enable new big data applications that use sensitive data in the cloud without compromising data security and privacy. For this, SecureCloud designs and develops a layered architecture that allows for (i) the secure creation and deployment of secure micro-services; (ii) the secure integration of individual micro-services to full-f… ▽ More

    Submitted 4 May, 2018; originally announced May 2018.

    Comments: 4 pages. Lausanne, Switzerland

    Journal ref: Design, Automation & Test in Europe Conference & Exhibition (DATE), 2017

  18. arXiv:1707.05454  [pdf, other

    cs.CR

    Teechain: A Secure Payment Network with Asynchronous Blockchain Access

    Authors: Joshua Lind, Oded Naor, Ittay Eyal, Florian Kelbert, Peter Pietzuch, Emin Gun Sirer

    Abstract: Blockchains such as Bitcoin and Ethereum execute payment transactions securely, but their performance is limited by the need for global consensus. Payment networks overcome this limitation through off-chain transactions. Instead of writing to the blockchain for each transaction, they only settle the final payment balances with the underlying blockchain. When executing off-chain transactions in cur… ▽ More

    Submitted 26 October, 2019; v1 submitted 17 July, 2017; originally announced July 2017.

  19. arXiv:1705.09902  [pdf, other

    cs.PL

    Extending programs with debug-related features, with application to hardware development

    Authors: Nik Sultana, Salvator Galea, David Greaves, Marcin Wojcik, Noa Zilberman, Richard Clegg, Luo Mai, Richard Mortier, Peter Pietzuch, Jon Crowcroft, Andrew W Moore

    Abstract: The capacity and programmability of reconfigurable hardware such as FPGAs has improved steadily over the years, but they do not readily provide any mechanisms for monitoring or debugging running programs. Such mechanisms need to be written into the program itself. This is done using ad hoc methods and primitive tools when compared to CPU programming. This complicates the programming and debugging… ▽ More

    Submitted 28 May, 2017; originally announced May 2017.

  20. arXiv:1612.07766  [pdf, other

    cs.CR

    Teechan: Payment Channels Using Trusted Execution Environments

    Authors: Joshua Lind, Ittay Eyal, Peter Pietzuch, Emin Gün Sirer

    Abstract: Blockchain protocols are inherently limited in transaction throughput and latency. Recent efforts to address performance and scale blockchains have focused on off-chain payment channels. While such channels can achieve low latency and high throughput, deploying them securely on top of the Bitcoin blockchain has been difficult, partly because building a secure implementation requires changes to the… ▽ More

    Submitted 7 March, 2017; v1 submitted 22 December, 2016; originally announced December 2016.