towards tools for data inspection, training supervision
TRANSCRIPT
Towards Tools for Data Inspection, Training Supervision, and Model
Evaluation For Deep Neural Networks
IoT produces >2.5 EiB/day of data
Domain experts will need to make data-driven decisions from their devices, but current ML tools are targeted towards experts
Open question: what does an end-user development environment for ML look like in this context?
Eldon Schoop UC Berkeley
How to privately process video
streams at frame rate on an untrusted
platform?
Visor: Private Video Analytics as a Cloud Service
Video stream
Client source MLaaS Cloud
platform
Solution: Visor
1 Hybrid enclave (CPU + GPU) for secure computation
2 Data-oblivious algorithms to prevent side-channel leakage
Rishabh Poddar1, Ganesh Ananthanarayan2, Srinath Setty2, Stavros Volos2, Raluca Ada Popa1 — 1 UC Berkeley 2 Microsoft Research
JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoTSam Kumar, Yuncong Hu, Michael P Andersen, Raluca Ada Popa, David E. Culler
JEDI is an end-to-end encryption protocol for large-scale IoT systems.
It supports:• Decoupled communication (e.g., pub/sub)• Decentralized delegation for access control• Lightweight operation for resource-
constrained devices
Pub/Sub BrokerTemperature
Sensor
Cloud Services
Person
Methods for Quantifying Host-Liveness Dynamics(Internet Measurement)
• Internet scanning allows us to empirically analyze active IoT devices around the world (e.g., find vulnerabilities, weak default credentials)
• Internet scanning algorithms are not optimized to detect changes in hosts and networks
To develop more intelligent scanning, we present methods that predict and quantitatively characterize temporal patterns
Tota
l Num
ber o
f Hos
ts
Cor
rela
tions
Time (h) Time (h) Time (h) Time (h)
Time (h) Time (h) Time (h) Time (h)
China Telecom (AS 4134) Telecom Italia (AS 3269) JGU Mainz (AS 2857) AWS (AS 16509)
Correlation Standard Error
X Autocorrelative Peaks
Host Count Trend
24 48
24 168
168
Results Preview:
• Autocorrelation accurately and non-parametrically extracts periodic patterns in noisy networks
• 40% of hosts are a part of a network that shrinks on the weekend
From Laptop to Lambda: Outsourcing Everyday Jobs to Thousands of Transient Functional Containers
• Serverless: thousands of cloud-functions in parallel:10,000 core supercomputer billed by the second. • ExCamera, Sprocket, PyWren, etc.
• But, building applications on top of these platforms is hard:
• Lambda functions are stateless and unreliable; the performance is variable; round-trips are costly; on-worker storage is limited but much faster than off-worker storage, etc.
• gg is a system designed to help application developers manage the challenges of creating burst-parallel cloud-functions applications.
Continual Learning Improves Internet Video Streaming
Hudson Ayers, Francis Y. Yan, Chenzhi Zhu, Sadjad Fouladi, James Hong, Keyi Zhang
- Puffer: A public ABR testbed- Fugu: A continual learning,
model based RL algorithm for bitrate selection in streaming video
- Results →
� Study insight: system architecture level design is where most interesting design work happens requires support for ambiguity
� Concept designs: Block diagram style GUI with modeling Hardware construction language defines blocks
� PCB design tools largely unchanged from the 1980s
� How do designers build PCBs today, and can we build improved tools?
GooSigsDan Boneh, Chris Jeffrey, Joseph Poon, Riad S. Wahby
RSA signatures that hide signer iden�ty
Cryptocurrency airdropsAnonymous creden�als Signature escrow
CESEL• IoT needs crypto acceleration +
flexibility
• Our solution: CESEL• Flexible hardware accelerator for
cryptography• Wide SIMD + long word support• Special instructions (permute,
bitslice)• No data-dependent control flow
• Significant energy savings compared to software• ~5x for most ciphers• 1.5x longer deployment time
Porting Tock OS to RISC-V
• As interest in developing processors with RISC-V increases, it’s important for Tock to have support
• Implemented the syscall interface• Modified old interface to be better
suited to both RISC-V and Cortex-M• We can run the Blink and Hello
World apps• Switches between user and machine
mode• Runs on the SiFive E21 Core
Samyukta Venkat, Brad Campbell
Unlicensed LPWANs Are Not Yet the Pathto Ubiquitous Connectivity
Low-power wide-area networks are emerging to meet IoT communication needs.
● What are LPWANs?● How do we measure LPWAN capability?● Do LPWANs meet application needs?
○ Two problems with unlicensed LPWANs:■ Low throughput capacity■ No coexistence strategy
Branden Ghena, Joshua Adkins, Longfei Shangguan, Kyle Jamieson, Phil Levis, and Prabal Dutta
True2F: Backdoor-resistant authentication tokensThe U2F protocol protects against phishing and browser compromise
… but what if the token itself is vulnerable?
True2F● Augments U2F to protect against faulty tokens● Backwards-compatible with U2F servers● Practical on commodity hardware tokens Emma Dauterman, Henry Corrigan-Gibbs,
David Mazières, Dan Boneh, Dominic Rizzo