Zum Hauptinhalt springen

Showing 1–28 of 28 results for author: Shin, K G

Searching in archive cs. Search in all archives.
.
  1. arXiv:2403.06281  [pdf, other

    cs.CR

    Refinement of MMIO Models for Improving the Coverage of Firmware Fuzzing

    Authors: Wei-Lun Huang, Kang G. Shin

    Abstract: Embedded systems (ESes) are now ubiquitous, collecting sensitive user data and helping the users make safety-critical decisions. Their vulnerability may thus pose a grave threat to the security and privacy of billions of ES users. Grey-box fuzzing is widely used for testing ES firmware. It usually runs the firmware in a fully emulated environment for efficient testing. In such a setting, the fuzze… ▽ More

    Submitted 10 March, 2024; originally announced March 2024.

    Comments: 14 pages, 4 figures

  2. arXiv:2312.10356  [pdf, other

    cs.NI

    End-to-End Asynchronous Traffic Scheduling in Converged 5G and Time-Sensitive Networks

    Authors: Jiacheng Li, Yongxiang Zhao, Chunxi Li, Zonghui Li, Kang G. Shin, Bo Ai

    Abstract: As required by Industry 4.0, companies will move towards flexible and individual manufacturing. To succeed in this transition, convergence of 5G and time-sensitive networks (TSN) is the most promising technology and has thus attracted considerable interest from industry and standardization groups. However, the delay and jitter of end-to-end (e2e) transmission will get exacerbated if the transmissi… ▽ More

    Submitted 16 December, 2023; originally announced December 2023.

  3. arXiv:2309.11902  [pdf, other

    cs.NI cs.AR

    A Switch Architecture for Time-Triggered Transmission with Best-Effort Delivery

    Authors: Zonghui Li, Wenlin Zhu, Kang G. Shin, Hai Wan, Xiaoyu Song, Dong Yang, Bo Ai

    Abstract: In Time-Triggered (TT) or time-sensitive networks, the transmission of a TT frame is required to be scheduled at a precise time instant for industrial distributed real-time control systems. Other (or {\em best-effort} (BE)) frames are forwarded in a BE manner. Under this scheduling strategy, the transmission of a TT frame must wait until its scheduled instant even if it could have been transmitted… ▽ More

    Submitted 21 September, 2023; originally announced September 2023.

    Comments: 14 pages

  4. arXiv:2308.03868  [pdf, other

    cs.CR cs.HC

    Eye-Shield: Real-Time Protection of Mobile Device Screen Information from Shoulder Surfing

    Authors: Brian Tang, Kang G. Shin

    Abstract: People use mobile devices ubiquitously for computing, communication, storage, web browsing, and more. As a result, the information accessed and stored within mobile devices, such as financial and health information, text messages, and emails, can often be sensitive. Despite this, people frequently use their mobile devices in public areas, becoming susceptible to a simple yet effective attack, shou… ▽ More

    Submitted 7 August, 2023; originally announced August 2023.

    Comments: Published at 32nd USENIX Security Symposium (2023) U.S. Pat. App. No. 63/468,650-Conf. #8672

  5. arXiv:2302.01568  [pdf, other

    cs.LG cs.DC

    DynaMIX: Resource Optimization for DNN-Based Real-Time Applications on a Multi-Tasking System

    Authors: Minkyoung Cho, Kang G. Shin

    Abstract: As deep neural networks (DNNs) prove their importance and feasibility, more and more DNN-based apps, such as detection and classification of objects, have been developed and deployed on autonomous vehicles (AVs). To meet their growing expectations and requirements, AVs should "optimize" use of their limited onboard computing resources for multiple concurrent in-vehicle apps while satisfying their… ▽ More

    Submitted 3 February, 2023; originally announced February 2023.

    Comments: 13 pages, 9 figures, 5 tables

  6. arXiv:2204.03211  [pdf, other

    cs.DC

    Elastic Model Aggregation with Parameter Service

    Authors: Juncheng Gu, Mosharaf Chowdhury, Kang G. Shin, Aditya Akella

    Abstract: Model aggregation, the process that updates model parameters, is an important step for model convergence in distributed deep learning (DDL). However, the parameter server (PS), a popular paradigm of performing model aggregation, causes CPU underutilization in deep learning (DL) clusters, due to the bursty nature of aggregation and static resource allocation. To remedy this problem, we propose Para… ▽ More

    Submitted 7 April, 2022; originally announced April 2022.

  7. arXiv:2102.02308  [pdf, other

    cs.AR cs.CR

    Fuzzing Hardware Like Software

    Authors: Timothy Trippel, Kang G. Shin, Alex Chernyakhovsky, Garret Kelly, Dominic Rizzo, Matthew Hicks

    Abstract: Hardware flaws are permanent and potent: hardware cannot be patched once fabricated, and any flaws may undermine any software executing on top. Consequently, verification time dominates implementation time. The gold standard in hardware Design Verification (DV) is concentrated at two extremes: random dynamic verification and formal verification. Both struggle to root out the subtle flaws in comple… ▽ More

    Submitted 3 February, 2021; originally announced February 2021.

  8. arXiv:1910.09727  [pdf, other

    cs.DC cs.NI

    Hydra: Resilient and Highly Available Remote Memory

    Authors: Youngmoon Lee, Hasan Al Maruf, Mosharaf Chowdhury, Asaf Cidon, Kang G. Shin

    Abstract: We present Hydra, a low-latency, low-overhead, and highly available resilience mechanism for remote memory. Hydra can access erasure-coded remote memory within a single-digit microsecond read/write latency, significantly improving the performance-efficiency trade-off over the state-of-the-art -- it performs similar to in-memory replication with 1.6X lower memory overhead. We also propose CodingSet… ▽ More

    Submitted 28 May, 2023; v1 submitted 21 October, 2019; originally announced October 2019.

    Journal ref: 20th USENIX Conference on File and Storage Technologies (FAST), 2022, 181-198

  9. arXiv:1909.12535  [pdf, other

    cs.LG stat.ML

    Federated User Representation Learning

    Authors: Duc Bui, Kshitiz Malik, Jack Goetz, Honglei Liu, Seungwhan Moon, Anuj Kumar, Kang G. Shin

    Abstract: Collaborative personalization, such as through learned user representations (embeddings), can improve the prediction accuracy of neural-network-based models significantly. We propose Federated User Representation Learning (FURL), a simple, scalable, privacy-preserving and resource-efficient way to utilize existing neural personalization techniques in the Federated Learning (FL) setting. FURL divid… ▽ More

    Submitted 27 September, 2019; originally announced September 2019.

  10. arXiv:1908.07119  [pdf

    cs.IT

    Provisioning Energy-Efficiency and QoS for Multi-Carrier CoMP with Limited Feedback

    Authors: Mohammad G. Khoshkholgh, Victor C. M. Leung, Kang G. Shin, Keivan Navaie

    Abstract: We consider resource allocation (RA) in multi-carrier coordinated multi-point (CoMP) systems with limited feedback, in which a cluster of base stations (BSs), each equipped with multiple antennas, are connect to each other and/or a central processor via backhauls/fronthauls. The main objective of coordinated RA is to select user equipments (UEs) on each subcarrier, dynamically decide upon the clus… ▽ More

    Submitted 19 August, 2019; originally announced August 2019.

    Comments: prepared 2015

  11. arXiv:1907.10560  [pdf, ps, other

    eess.SP cs.NI

    Accurate Angular Inference for 802.11ad Devices Using Beam-Specific Measurements

    Authors: Haichuan Ding, Kang G. Shin

    Abstract: Due to their sparsity, 60GHz channels are characterized by a few dominant paths. Knowing the angular information of their dominant paths, we can develop various applications, such as the prediction of link performance and the tracking of an 802.11ad device. Although they are equipped with phased arrays, the angular inference for 802.11ad devices is still challenging due to their limited number of… ▽ More

    Submitted 24 July, 2019; originally announced July 2019.

  12. arXiv:1906.08842  [pdf, other

    cs.CR

    T-TER: Defeating A2 Trojans with Targeted Tamper-Evident Routing

    Authors: Timothy Trippel, Kang G. Shin, Kevin B. Bush, Matthew Hicks

    Abstract: Since the inception of the Integrated Circuit (IC), the size of the transistors used to construct them has continually shrunk. While this advancement significantly improves computing capability, fabrication costs have skyrocketed. As a result, most IC designers must now outsource fabrication. Outsourcing, however, presents a security threat: comprehensive post-fabrication inspection is infeasible… ▽ More

    Submitted 27 October, 2020; v1 submitted 20 June, 2019; originally announced June 2019.

  13. arXiv:1906.08836  [pdf, other

    cs.CR

    An Extensible Framework for Quantifying the Coverage of Defenses Against Untrusted Foundries

    Authors: Timothy Trippel, Kang G. Shin, Kevin B. Bush, Matthew Hicks

    Abstract: The transistors used to construct Integrated Circuits (ICs) continue to shrink. While this shrinkage improves performance and density, it also reduces trust: the price to build leading-edge fabrication facilities has skyrocketed, forcing even nation states to outsource the fabrication of high-performance ICs. Outsourcing fabrication presents a security threat because the black-box nature of a fabr… ▽ More

    Submitted 20 June, 2019; originally announced June 2019.

  14. arXiv:1902.08547  [pdf

    cs.IT

    Coverage Performance of Aerial-Terrestrial HetNets

    Authors: M. G. Khoshkholgh, Keivan Navaie, Halim Yanikomerogluy, V. C. M. Leung, Kang. G. Shin

    Abstract: Providing seamless coverage under current cellular network technologies is surmountable only through gross overengineering. Alternatively, as an economically effective solution, the use of unmanned aerial vehicles (UAVs), augmented with the functionalities of terrestrial base stations (BSs), is recently advocated. In this paper we investigate the effect that the incorporation of UAV-mounted BSs (U… ▽ More

    Submitted 22 February, 2019; originally announced February 2019.

    Comments: 6 page conference paper

    Journal ref: IEEE VTC 2019

  15. arXiv:1902.08545  [pdf

    cs.IT

    Randomized Caching in Cooperative UAV-Enabled Fog-RAN

    Authors: M. G. Khoshkholgh, Keivan Navaie, Halim Yanikomerogluy, V. C. M. Leung, Kang G. Shin

    Abstract: We consider an unmanned aerial vehicle enabled (UAV-enabled) fog-radio access network (F-RAN) in which UAVs are considered as flying remote radio heads (RRH) equipped with caching and cooperative communications capabilities. We are mainly focus on probabilistic/randomized content placement strategy, and accordingly formulate the content placement as an optimization problem. We then study the effic… ▽ More

    Submitted 22 February, 2019; originally announced February 2019.

    Comments: 6 page conference

    Journal ref: IEEE WCNC 2019

  16. arXiv:1902.08542  [pdf

    cs.IT

    How Do Non-Ideal UAV Antennas Affect Air-to-Ground Communications?

    Authors: M. G. Khoshkholgh, Keivan Navaie, Halim Yanikomeroglu, V. C. M. Leung, Kang. G. Shin

    Abstract: Analysis of the performance of Unmanned Aerial Vehicle (UAV)-enabled communications systems often relies upon idealized antenna characteristic, where the side-lobe gain of UAVs' antenna is ignored. In practice, however, side-lobe cause inevitable interference to the ground users. We investigate the impact of UAVs' antenna side-lobe on the performance of UAV-enabled communication. Our analysis show… ▽ More

    Submitted 22 February, 2019; originally announced February 2019.

    Comments: 7 pages conference

    Journal ref: IEEE ICC 2019

  17. arXiv:1901.11068  [pdf

    cs.IT

    Caching or No Caching in Dense HetNets?

    Authors: M. G. Khoshkholgh, Keivan Navaie, Kang G. Shin, V. C. M. Leung, Halim Yanikomeroglu

    Abstract: Caching the content closer to the user equipments (UEs) in heterogenous cellular networks (HetNets) improves user-perceived Quality-of-Service (QoS) while lowering the operators backhaul usage/costs. Nevertheless, under the current networking strategy that promotes aggressive densification, it is unclear whether cache-enabled HetNets preserve the claimed cost-effectiveness and the potential benefi… ▽ More

    Submitted 30 January, 2019; originally announced January 2019.

  18. arXiv:1802.02561  [pdf, other

    cs.CL cs.CR cs.HC

    Polisis: Automated Analysis and Presentation of Privacy Policies Using Deep Learning

    Authors: Hamza Harkous, Kassem Fawaz, Rémi Lebret, Florian Schaub, Kang G. Shin, Karl Aberer

    Abstract: Privacy policies are the primary channel through which companies inform users about their data collection and sharing practices. These policies are often long and difficult to comprehend. Short notices based on information extracted from privacy policies have been shown to be useful but face a significant scalability hurdle, given the number of policies and their evolution over time. Companies, us… ▽ More

    Submitted 29 June, 2018; v1 submitted 7 February, 2018; originally announced February 2018.

    Comments: Published at USENIX Security 2018; associated website: https://pribot.org

  19. arXiv:1801.07741  [pdf, other

    cs.CR

    Who Killed My Parked Car?

    Authors: Kyong-Tak Cho, Yuseung Kim, Kang G. Shin

    Abstract: We find that the conventional belief of vehicle cyber attacks and their defenses---attacks are feasible and thus defenses are required only when the vehicle's ignition is turned on---does not hold. We verify this fact by discovering and applying two new practical and important attacks: battery-drain and Denial-of-Body-control (DoB). The former can drain the vehicle battery while the latter can pre… ▽ More

    Submitted 23 January, 2018; originally announced January 2018.

  20. arXiv:1801.00145  [pdf, other

    cs.IT

    Dynamic Interference Steering in Heterogeneous Cellular Networks

    Authors: Zhao Li, Canyu Shu, Fengjuan Guo, Kang G. Shin, Jia Liu

    Abstract: With the development of diverse wireless communication technologies, interference has become a key impediment in network performance, thus making effective interference management (IM) essential to accommodate a rapidly increasing number of subscribers with diverse services. Although there have been numerous IM schemes proposed thus far, none of them are free of some form of cost. It is, therefore… ▽ More

    Submitted 30 December, 2017; originally announced January 2018.

  21. arXiv:1712.07810  [pdf, other

    cs.IT

    Interference Steering to Manage Interference

    Authors: Zhao Li, Fengjuan Guo, Kang G Shin, Yinghou Liu, Jia Liu

    Abstract: To enable densely deployed base stations (BSs) or access points (APs) to serve an increasing number of users and provide diverse mobile services, we need to improve spectrum utilization in wireless communication networks. Although spectral efficiency (SE) can be enhanced via smart and dynamic resource allocation, interference has become a major impediment in improving SE. There have been numerous… ▽ More

    Submitted 21 December, 2017; originally announced December 2017.

  22. arXiv:1711.03651  [pdf, ps, other

    eess.SP cs.OH

    How Long Will My Phone Battery Last?

    Authors: Liang He, Kang G. Shin

    Abstract: Mobile devices are only as useful as their battery lasts. Unfortunately, the operation and life of a mobile device's battery degrade over time and usage. The state-of-health (SoH) of batteries quantifies their degradation, but mobile devices are unable to support its accurate estimation -- despite its importance -- due mainly to their limited hardware and dynamic usage patterns, causing various pr… ▽ More

    Submitted 9 November, 2017; originally announced November 2017.

  23. arXiv:1710.04578  [pdf, other

    cs.CR cs.CY

    Mobile IMUs Reveal Driver's Identity From Vehicle Turns

    Authors: Dongyao Chen, Kyong-Tak Cho, Kang G. Shin

    Abstract: As vehicle maneuver data becomes abundant for assisted or autonomous driving, their implication of privacy invasion/leakage has become an increasing concern. In particular, the surface for fingerprinting a driver will expand significantly if the driver's identity can be linked with the data collected from his mobile or wearable devices which are widely deployed worldwide and have increasing sensin… ▽ More

    Submitted 12 October, 2017; originally announced October 2017.

    Comments: 15 pages, 15 figures

  24. arXiv:1706.01160  [pdf, other

    cs.NI

    Scalable Real-time Transport of Baseband Traffic

    Authors: Krishna C. Garikipati, Kang G. Shin

    Abstract: In wireless deployments, such as Massive-MIMO, where radio front-ends and back-end processing are connected through a transport network, meeting the real-time processing requirements is essential to realize the capacity gains from network scaling. While simple forms of baseband transport have been implemented, their real-time analysis at much larger scale is lacking. Towards this, we present the… ▽ More

    Submitted 29 January, 2018; v1 submitted 4 June, 2017; originally announced June 2017.

  25. arXiv:1701.04507  [pdf, other

    cs.CR

    Continuous Authentication for Voice Assistants

    Authors: Huan Feng, Kassem Fawaz, Kang G. Shin

    Abstract: Voice has become an increasingly popular User Interaction (UI) channel, mainly contributing to the ongoing trend of wearables, smart vehicles, and home automation systems. Voice assistants such as Siri, Google Now and Cortana, have become our everyday fixtures, especially in scenarios where touch interfaces are inconvenient or even dangerous to use, such as driving or exercising. Nevertheless, the… ▽ More

    Submitted 16 January, 2017; originally announced January 2017.

  26. arXiv:1604.06964  [pdf, ps, other

    cs.CR

    BinderCracker: Assessing the Robustness of Android System Services

    Authors: Huan Feng, Kang G. Shin

    Abstract: In Android, communications between apps and system services are supported by a transaction-based Inter-Process Communication (IPC) mechanism. Binder, as the cornerstone of this IPC mechanism, separates two communicating parties as client and server. As with any client-server model, the server should not make any assumption on the validity (sanity) of client-side transaction. To our surprise, we fi… ▽ More

    Submitted 23 April, 2016; originally announced April 2016.

  27. arXiv:1302.3554  [pdf

    cs.AI

    Plan Development using Local Probabilistic Models

    Authors: Ella M. Atkins, Edmund H. Durfee, Kang G. Shin

    Abstract: Approximate models of world state transitions are necessary when building plans for complex systems operating in dynamic environments. External event probabilities can depend on state feature values as well as time spent in that particular state. We assign temporally -dependent probability functions to state transitions. These functions are used to locally compute state probabilities, which are… ▽ More

    Submitted 13 February, 2013; originally announced February 2013.

    Comments: Appears in Proceedings of the Twelfth Conference on Uncertainty in Artificial Intelligence (UAI1996)

    Report number: UAI-P-1996-PG-49-56

  28. Attack Prevention for Collaborative Spectrum Sensing in Cognitive Radio Networks

    Authors: Lingjie Duan, Alexander W. Min, Jianwei Huang, Kang G. Shin

    Abstract: Collaborative spectrum sensing can significantly improve the detection performance of secondary unlicensed users (SUs). However, the performance of collaborative sensing is vulnerable to sensing data falsification attacks, where malicious SUs (attackers) submit manipulated sensing reports to mislead the fusion center's decision on spectrum occupancy. Moreover, attackers may not follow the fusion c… ▽ More

    Submitted 5 September, 2011; originally announced September 2011.

    Comments: 37 pages including 7 figures and 2 tables; IEEE Journal on Selected Areas in Communications with special issue in Cooperative Networking - Challenges and Applications (2012 expected)