towards tools for data inspection, training supervision

13
Towards Tools for Data Inspection, Training Supervision, and Model Evaluation For Deep Neural Networks IoT produces >2.5 EiB/day of data Domain experts will need to make data-driven decisions from their devices, but current ML tools are targeted towards experts Open question: what does an end- user development environment for ML look like in this context? Eldon Schoop UC Berkeley [email protected]

Upload: others

Post on 20-Dec-2021

2 views

Category:

Documents


0 download

TRANSCRIPT

Towards Tools for Data Inspection, Training Supervision, and Model

Evaluation For Deep Neural Networks

IoT produces >2.5 EiB/day of data

Domain experts will need to make data-driven decisions from their devices, but current ML tools are targeted towards experts

Open question: what does an end-user development environment for ML look like in this context?

Eldon Schoop UC Berkeley

[email protected]

How to privately process video

streams at frame rate on an untrusted

platform?

Visor: Private Video Analytics as a Cloud Service

Video stream

Client source MLaaS Cloud

platform

Solution: Visor

1 Hybrid enclave (CPU + GPU) for secure computation

2 Data-oblivious algorithms to prevent side-channel leakage

Rishabh Poddar1, Ganesh Ananthanarayan2, Srinath Setty2, Stavros Volos2, Raluca Ada Popa1 — 1 UC Berkeley 2 Microsoft Research

JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoTSam Kumar, Yuncong Hu, Michael P Andersen, Raluca Ada Popa, David E. Culler

JEDI is an end-to-end encryption protocol for large-scale IoT systems.

It supports:• Decoupled communication (e.g., pub/sub)• Decentralized delegation for access control• Lightweight operation for resource-

constrained devices

Pub/Sub BrokerTemperature

Sensor

Cloud Services

Person

Methods for Quantifying Host-Liveness Dynamics(Internet Measurement)

• Internet scanning allows us to empirically analyze active IoT devices around the world (e.g., find vulnerabilities, weak default credentials)

• Internet scanning algorithms are not optimized to detect changes in hosts and networks

To develop more intelligent scanning, we present methods that predict and quantitatively characterize temporal patterns

Tota

l Num

ber o

f Hos

ts

Cor

rela

tions

Time (h) Time (h) Time (h) Time (h)

Time (h) Time (h) Time (h) Time (h)

China Telecom (AS 4134) Telecom Italia (AS 3269) JGU Mainz (AS 2857) AWS (AS 16509)

Correlation Standard Error

X Autocorrelative Peaks

Host Count Trend

24 48

24 168

168

Results Preview:

• Autocorrelation accurately and non-parametrically extracts periodic patterns in noisy networks

• 40% of hosts are a part of a network that shrinks on the weekend

From Laptop to Lambda: Outsourcing Everyday Jobs to Thousands of Transient Functional Containers

• Serverless: thousands of cloud-functions in parallel:10,000 core supercomputer billed by the second. • ExCamera, Sprocket, PyWren, etc.

• But, building applications on top of these platforms is hard:

• Lambda functions are stateless and unreliable; the performance is variable; round-trips are costly; on-worker storage is limited but much faster than off-worker storage, etc.

• gg is a system designed to help application developers manage the challenges of creating burst-parallel cloud-functions applications.

Continual Learning Improves Internet Video Streaming

Hudson Ayers, Francis Y. Yan, Chenzhi Zhu, Sadjad Fouladi, James Hong, Keyi Zhang

- Puffer: A public ABR testbed- Fugu: A continual learning,

model based RL algorithm for bitrate selection in streaming video

- Results →

� Study insight: system architecture level design is where most interesting design work happens requires support for ambiguity

� Concept designs: Block diagram style GUI with modeling Hardware construction language defines blocks

� PCB design tools largely unchanged from the 1980s

� How do designers build PCBs today, and can we build improved tools?

GooSigsDan Boneh, Chris Jeffrey, Joseph Poon, Riad S. Wahby

RSA signatures that hide signer iden�ty

Cryptocurrency airdropsAnonymous creden�als Signature escrow

CESEL• IoT needs crypto acceleration +

flexibility

• Our solution: CESEL• Flexible hardware accelerator for

cryptography• Wide SIMD + long word support• Special instructions (permute,

bitslice)• No data-dependent control flow

• Significant energy savings compared to software• ~5x for most ciphers• 1.5x longer deployment time

Porting Tock OS to RISC-V

• As interest in developing processors with RISC-V increases, it’s important for Tock to have support

• Implemented the syscall interface• Modified old interface to be better

suited to both RISC-V and Cortex-M• We can run the Blink and Hello

World apps• Switches between user and machine

mode• Runs on the SiFive E21 Core

Samyukta Venkat, Brad Campbell

Unlicensed LPWANs Are Not Yet the Pathto Ubiquitous Connectivity

Low-power wide-area networks are emerging to meet IoT communication needs.

● What are LPWANs?● How do we measure LPWAN capability?● Do LPWANs meet application needs?

○ Two problems with unlicensed LPWANs:■ Low throughput capacity■ No coexistence strategy

Branden Ghena, Joshua Adkins, Longfei Shangguan, Kyle Jamieson, Phil Levis, and Prabal Dutta

True2F: Backdoor-resistant authentication tokensThe U2F protocol protects against phishing and browser compromise

… but what if the token itself is vulnerable?

True2F● Augments U2F to protect against faulty tokens● Backwards-compatible with U2F servers● Practical on commodity hardware tokens Emma Dauterman, Henry Corrigan-Gibbs,

David Mazières, Dan Boneh, Dominic Rizzo

Power Clocks: Dynamic Multi-Clock Management for Embedded Systems

Problem:● Dynamically changing the

clock can provide significant energy savings

● Manually specifying clock changes is difficult

Solution: manage clock changs in the kernel