Distributed Applications and Interoperable Systems

Computing systems are becoming ever more complex, encompassing autonomous control of physical processes, stochasticity and inference from sensor data. This lecture will demonstrate the versatility of quantitative modelling and verification to aid the design of cyber-physical systems with machine learning components. Topics discussed will include recent advances in probabilistic/quantitative verification, template-based model synthesis, resource-performance trade off analysis, attacks on biometric security, and robustness guarantees for machine learning components. The lecture will conclude by giving an overview of future challenges in this field. ALGORAND – The Distributed Ledger for the Borderless Economy

[1]  Valerio Schiavoni,et al.  Security, Performance and Energy Trade-Offs of Hardware-Assisted Memory Protection Mechanisms , 2018, 2018 IEEE 37th Symposium on Reliable Distributed Systems (SRDS).

[2]  Sarvar Patel,et al.  Practical Secure Aggregation for Federated Learning on User-Held Data , 2016, ArXiv.

[3]  Márk Jelasity,et al.  Defining and understanding smartphone churn over the internet: A measurement study , 2014, 14-th IEEE International Conference on Peer-to-Peer Computing.

[4]  Scott Shenker,et al.  Spark: Cluster Computing with Working Sets , 2010, HotCloud.

[5]  Márk Jelasity,et al.  PeerSim: A scalable P2P simulator , 2009, 2009 IEEE Ninth International Conference on Peer-to-Peer Computing.

[6]  Carlos V. Rozas,et al.  Innovative instructions and software model for isolated execution , 2013, HASP '13.

[7]  István Hegedüs,et al.  Gossip learning with linear models on fully distributed data , 2011, Concurr. Comput. Pract. Exp..

[8]  Valerio Schiavoni,et al.  SAFETHINGS: Data Security by Design in the IoT , 2017, 2017 13th European Dependable Computing Conference (EDCC).

[9]  Reynold Xin,et al.  Apache Spark , 2016 .

[10]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[11]  Blaise Agüera y Arcas,et al.  Communication-Efficient Learning of Deep Networks from Decentralized Data , 2016, AISTATS.

[12]  István Hegedüs,et al.  Robust Fully Distributed Minibatch Gradient Descent with Privacy Preservation , 2018, Secur. Commun. Networks.

[13]  Patrick Th. Eugster,et al.  STYX: Stream Processing with Trustworthy Cloud-based Execution , 2016, SoCC.

[14]  Anne-Marie Kermarrec,et al.  Gossip-based peer sampling , 2007, TOCS.

[15]  Fahimuddin Shaik,et al.  Signal and Image Processing in Medical Applications , 2016 .

[16]  A. Malliani,et al.  Heart rate variability. Standards of measurement, physiological interpretation, and clinical use , 1996 .

[17]  Marc'Aurelio Ranzato,et al.  Large Scale Distributed Deep Networks , 2012, NIPS.

[18]  Bobby Bhattacharjee,et al.  SeCloak: ARM Trustzone-based Mobile Peripheral Control , 2018, MobiSys.

[19]  Daniel Gruss,et al.  Nethammer: Inducing Rowhammer Faults through Network Requests , 2018, 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).

[20]  Thomas F. Wenisch,et al.  Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution , 2018, USENIX Security Symposium.

[21]  Shay Gueron,et al.  A Memory Encryption Engine Suitable for General Purpose Processors , 2016, IACR Cryptol. ePrint Arch..

[22]  A. Asuncion,et al.  UCI Machine Learning Repository, University of California, Irvine, School of Information and Computer Sciences , 2007 .

[23]  Davide Anguita,et al.  A Public Domain Dataset for Human Activity Recognition using Smartphones , 2013, ESANN.

[24]  Jinjun Chen,et al.  DPBSV -- An Efficient and Secure Scheme for Big Sensing Data Stream , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.

[25]  M. Nash,et al.  ECG signal classification for the detection of cardiac arrhythmias using a convolutional recurrent neural network , 2018, Physiological measurement.

[26]  Brigitte Leeners,et al.  Respiratory and cardiac monitoring at night using a wrist wearable optical system , 2017, 2018 40th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC).

[27]  Alexander L. Wolf,et al.  SABER: Window-Based Hybrid Stream Processing for Heterogeneous Architectures , 2016, SIGMOD Conference.

[28]  Stefan Mangard,et al.  Malware Guard Extension: Using SGX to Conceal Cache Attacks , 2017, DIMVA.

[29]  Srinivas Devadas,et al.  Intel SGX Explained , 2016, IACR Cryptol. ePrint Arch..

[30]  Ali Ghodsi,et al.  Drizzle: Fast and Adaptable Stream Processing at Scale , 2017, SOSP.

[31]  Peter Richtárik,et al.  Federated Learning: Strategies for Improving Communication Efficiency , 2016, ArXiv.

[32]  Jim Dowling,et al.  Through the wormhole: Low cost, fresh peer sampling for the Internet , 2013, IEEE P2P 2013 Proceedings.

[33]  Craig Gentry,et al.  Fully homomorphic encryption using ideal lattices , 2009, STOC '09.

[34]  Gábor Danner,et al.  Token Account Algorithms: The Best of the Proactive and Reactive Worlds , 2018, 2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS).

[35]  Gábor Danner,et al.  Robust Decentralized Mean Estimation with Limited Communication , 2018, Euro-Par.

[36]  Scott Shenker,et al.  Discretized Streams: An Efficient and Fault-Tolerant Model for Stream Processing on Large Clusters , 2012, HotCloud.

[37]  Hongyu Miao,et al.  StreamBox: Modern Stream Processing on a Multicore Machine , 2017, USENIX Annual Technical Conference.

[38]  Rupak Majumdar,et al.  MrCrypt: static analysis for secure cloud computations , 2013, OOPSLA.

[39]  Joseph K. Bradley,et al.  Spark SQL: Relational Data Processing in Spark , 2015, SIGMOD Conference.

[40]  F. Shaffer,et al.  An Overview of Heart Rate Variability Metrics and Norms , 2017, Front. Public Health.

[41]  Olivier Chételat,et al.  Classification of Cardiac Arrhythmias from Single Lead ECG with a Convolutional Recurrent Neural Network , 2019, BIOSIGNALS.

[42]  Craig Gentry,et al.  Homomorphic Evaluation of the AES Circuit , 2012, IACR Cryptol. ePrint Arch..

[43]  N. Asokan,et al.  Open-TEE -- An Open Virtual Trusted Execution Environment , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.

[44]  Periyasamy Paramasivam,et al.  Mobile secure data protection using eMMC RPMB partition , 2015, 2015 International Conference on Computing and Network Communications (CoCoNet).

[45]  Valerio Schiavoni,et al.  SecureStreams: A Reactive Middleware Framework for Secure Data Stream Processing , 2017, DEBS.

[46]  JelasityMárk,et al.  Robust Decentralized Low-Rank Matrix Decomposition , 2016 .

[47]  Adrian Tarniceriu,et al.  Evaluation of the beat-to-beat detection accuracy of PulseOn wearable optical heart rate monitor , 2015, 2015 37th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC).