Zum Hauptinhalt springen

Showing 1–15 of 15 results for author: Popa, R A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2404.07979  [pdf, other

    cs.CL cs.AI cs.LG

    LLoCO: Learning Long Contexts Offline

    Authors: Sijun Tan, Xiuyu Li, Shishir Patil, Ziyang Wu, Tianjun Zhang, Kurt Keutzer, Joseph E. Gonzalez, Raluca Ada Popa

    Abstract: Processing long contexts remains a challenge for large language models (LLMs) due to the quadratic computational and memory overhead of the self-attention mechanism and the substantial KV cache sizes during generation. We propose a novel approach to address this problem by learning contexts offline through context compression and in-domain parameter-efficient finetuning. Our method enables an LLM… ▽ More

    Submitted 11 April, 2024; originally announced April 2024.

    Comments: The first two authors contributed equally to this work

  2. arXiv:2404.06921  [pdf, other

    cs.CL cs.AI

    GoEX: Perspectives and Designs Towards a Runtime for Autonomous LLM Applications

    Authors: Shishir G. Patil, Tianjun Zhang, Vivian Fang, Noppapon C., Roy Huang, Aaron Hao, Martin Casado, Joseph E. Gonzalez, Raluca Ada Popa, Ion Stoica

    Abstract: Large Language Models (LLMs) are evolving beyond their classical role of providing information within dialogue systems to actively engaging with tools and performing actions on real-world applications and services. Today, humans verify the correctness and appropriateness of the LLM-generated outputs (e.g., code, functions, or actions) before putting them into real-world execution. This poses signi… ▽ More

    Submitted 10 April, 2024; originally announced April 2024.

  3. Reflections on trusting distributed trust

    Authors: Emma Dauterman, Vivian Fang, Natacha Crooks, Raluca Ada Popa

    Abstract: Many systems today distribute trust across multiple parties such that the system provides certain security properties if a subset of the parties are honest. In the past few years, we have seen an explosion of academic and industrial cryptographic systems built on distributed trust, including secure multi-party computation applications (e.g., private analytics, secure learning, and private key reco… ▽ More

    Submitted 10 November, 2022; v1 submitted 14 October, 2022; originally announced October 2022.

    Comments: 8 pages, 3 figures

    Journal ref: HotNets 2022

  4. arXiv:2205.07147  [pdf

    cs.DC

    The Sky Above The Clouds

    Authors: Sarah Chasins, Alvin Cheung, Natacha Crooks, Ali Ghodsi, Ken Goldberg, Joseph E. Gonzalez, Joseph M. Hellerstein, Michael I. Jordan, Anthony D. Joseph, Michael W. Mahoney, Aditya Parameswaran, David Patterson, Raluca Ada Popa, Koushik Sen, Scott Shenker, Dawn Song, Ion Stoica

    Abstract: Technology ecosystems often undergo significant transformations as they mature. For example, telephony, the Internet, and PCs all started with a single provider, but in the United States each is now served by a competitive market that uses comprehensive and universal technology standards to provide compatibility. This white paper presents our view on how the cloud ecosystem, barely over fifteen ye… ▽ More

    Submitted 14 May, 2022; originally announced May 2022.

    Comments: 35 pages

  5. arXiv:2106.14651  [pdf, other

    cs.OS cs.CR

    MAGE: Nearly Zero-Cost Virtual Memory for Secure Computation

    Authors: Sam Kumar, David E. Culler, Raluca Ada Popa

    Abstract: Secure Computation (SC) is a family of cryptographic primitives for computing on encrypted data in single-party and multi-party settings. SC is being increasingly adopted by industry for a variety of applications. A significant obstacle to using SC for practical applications is the memory overhead of the underlying cryptography. We develop MAGE, an execution engine for SC that efficiently runs SC… ▽ More

    Submitted 27 October, 2022; v1 submitted 23 June, 2021; originally announced June 2021.

    Comments: 19 pages; Accepted to OSDI 2021

  6. arXiv:2010.13752  [pdf, other

    cs.CR

    Senate: A Maliciously-Secure MPC Platform for Collaborative Analytics

    Authors: Rishabh Poddar, Sukrit Kalra, Avishay Yanai, Ryan Deng, Raluca Ada Popa, Joseph M. Hellerstein

    Abstract: Many organizations stand to benefit from pooling their data together in order to draw mutually beneficial insights -- e.g., for fraud detection across banks, better medical studies across hospitals, etc. However, such organizations are often prevented from sharing their data with each other by privacy concerns, regulatory hurdles, or business competition. We present Senate, a system that allows mu… ▽ More

    Submitted 26 October, 2020; originally announced October 2020.

    Comments: USENIX Security 2021

  7. arXiv:2010.02524  [pdf, other

    cs.CR

    Secure Collaborative Training and Inference for XGBoost

    Authors: Andrew Law, Chester Leung, Rishabh Poddar, Raluca Ada Popa, Chenyu Shi, Octavian Sima, Chaofan Yu, Xingmeng Zhang, Wenting Zheng

    Abstract: In recent years, gradient boosted decision tree learning has proven to be an effective method of training robust models. Moreover, collaborative learning among multiple parties has the potential to greatly benefit all parties involved, but organizations have also encountered obstacles in sharing sensitive data due to business, regulatory, and liability concerns. We propose Secure XGBoost, a priv… ▽ More

    Submitted 6 October, 2020; originally announced October 2020.

    Comments: ACM CCS PPMLP'20

  8. arXiv:2008.06627  [pdf, other

    cs.CR

    Practical Volume-Based Attacks on Encrypted Databases

    Authors: Rishabh Poddar, Stephanie Wang, Jianan Lu, Raluca Ada Popa

    Abstract: Recent years have seen an increased interest towards strong security primitives for encrypted databases (such as oblivious protocols), that hide the access patterns of query execution, and reveal only the volume of results. However, recent work has shown that even volume leakage can enable the reconstruction of entire columns in the database. Yet, existing attacks rely on a set of assumptions that… ▽ More

    Submitted 14 August, 2020; originally announced August 2020.

    Comments: IEEE EuroS&P 2020

  9. arXiv:2006.09628  [pdf, other

    cs.CR cs.CV

    Visor: Privacy-Preserving Video Analytics as a Cloud Service

    Authors: Rishabh Poddar, Ganesh Ananthanarayanan, Srinath Setty, Stavros Volos, Raluca Ada Popa

    Abstract: Video-analytics-as-a-service is becoming an important offering for cloud providers. A key concern in such services is privacy of the videos being analyzed. While trusted execution environments (TEEs) are promising options for preventing the direct leakage of private video content, they remain vulnerable to side-channel attacks. We present Visor, a system that provides confidentiality for the use… ▽ More

    Submitted 23 June, 2020; v1 submitted 16 June, 2020; originally announced June 2020.

    Comments: USENIX Security 2020

  10. arXiv:1912.01701  [pdf, other

    cs.CR

    An Off-Chip Attack on Hardware Enclaves via the Memory Bus

    Authors: Dayeol Lee, Dongha Jung, Ian T. Fang, Chia-Che Tsai, Raluca Ada Popa

    Abstract: This paper shows how an attacker can break the confidentiality of a hardware enclave with Membuster, an off-chip attack based on snooping the memory bus. An attacker with physical access can observe an unencrypted address bus and extract fine-grained memory access patterns of the victim. Membuster is qualitatively different from prior on-chip attacks to enclaves and is more difficult to thwart.… ▽ More

    Submitted 3 December, 2019; originally announced December 2019.

    Comments: In proceedings of the 29th USENIX Security Symposium, 2020, 18 pages

  11. arXiv:1907.07212  [pdf, other

    cs.CR cs.LG

    Helen: Maliciously Secure Coopetitive Learning for Linear Models

    Authors: Wenting Zheng, Raluca Ada Popa, Joseph E. Gonzalez, Ion Stoica

    Abstract: Many organizations wish to collaboratively train machine learning models on their combined datasets for a common benefit (e.g., better medical research, or fraud detection). However, they often cannot share their plaintext datasets due to privacy concerns and/or business competition. In this paper, we design and build Helen, a system that allows multiple parties to train a linear model without rev… ▽ More

    Submitted 3 September, 2019; v1 submitted 16 July, 2019; originally announced July 2019.

    Journal ref: IEEE S&P 2019

  12. arXiv:1905.13369  [pdf, other

    cs.CR

    JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT

    Authors: Sam Kumar, Yuncong Hu, Michael P Andersen, Raluca Ada Popa, David E. Culler

    Abstract: As the Internet of Things (IoT) emerges over the next decade, developing secure communication for IoT devices is of paramount importance. Achieving end-to-end encryption for large-scale IoT systems, like smart buildings or smart cities, is challenging because multiple principals typically interact indirectly via intermediaries, meaning that the recipient of a message is not known in advance. This… ▽ More

    Submitted 3 March, 2020; v1 submitted 30 May, 2019; originally announced May 2019.

    Comments: Extended version of a paper accepted at USENIX Security 2019

  13. arXiv:1902.03383  [pdf, ps, other

    cs.OS

    Cloud Programming Simplified: A Berkeley View on Serverless Computing

    Authors: Eric Jonas, Johann Schleier-Smith, Vikram Sreekanti, Chia-Che Tsai, Anurag Khandelwal, Qifan Pu, Vaishaal Shankar, Joao Carreira, Karl Krauth, Neeraja Yadwadkar, Joseph E. Gonzalez, Raluca Ada Popa, Ion Stoica, David A. Patterson

    Abstract: Serverless cloud computing handles virtually all the system administration operations needed to make it easier for programmers to use the cloud. It provides an interface that greatly simplifies cloud programming, and represents an evolution that parallels the transition from assembly language to high-level programming languages. This paper gives a quick history of cloud computing, including an acc… ▽ More

    Submitted 9 February, 2019; originally announced February 2019.

  14. arXiv:1712.05855  [pdf, other

    cs.AI

    A Berkeley View of Systems Challenges for AI

    Authors: Ion Stoica, Dawn Song, Raluca Ada Popa, David Patterson, Michael W. Mahoney, Randy Katz, Anthony D. Joseph, Michael Jordan, Joseph M. Hellerstein, Joseph E. Gonzalez, Ken Goldberg, Ali Ghodsi, David Culler, Pieter Abbeel

    Abstract: With the increasing commoditization of computer vision, speech recognition and machine translation systems and the widespread deployment of learning-based back-end technologies such as digital advertising and intelligent infrastructures, AI (Artificial Intelligence) has moved from research labs to production. These changes have been made possible by unprecedented levels of data and computation, by… ▽ More

    Submitted 15 December, 2017; originally announced December 2017.

    Comments: Berkeley Technical Report

    Report number: EECS-2017-159

  15. arXiv:1108.2080  [pdf, other

    cs.NI cs.CR

    Going Beyond Pollution Attacks: Forcing Byzantine Clients to Code Correctly

    Authors: Raluca Ada Popa, Alessandro Chiesa, Tural Badirkhanli, Muriel Médard

    Abstract: Network coding achieves optimal throughput in multicast networks. However, throughput optimality \emph{relies} on the network nodes or routers to code \emph{correctly}. A Byzantine node may introduce junk packets in the network (thus polluting downstream packets and causing the sinks to receive the wrong data) or may choose coding coefficients in a way that significantly reduces the throughput of… ▽ More

    Submitted 9 August, 2011; originally announced August 2011.

    Comments: A shorter version is in submission to IEEE INFOCOM 2012