25 research outputs found

    Immersion on the Edge: A Cooperative Framework for Mobile Immersive Computing

    Full text link
    Immersive computing (IC) technologies such as virtual reality and augmented reality are gaining tremendous popularity. In this poster, we present CoIC, a Cooperative framework for mobile Immersive Computing. The design of CoIC is based on a key insight that IC tasks among different applications or users might be similar or redundant. CoIC enhances the performance of mobile IC applications by caching and sharing computation-intensive IC results on the edge. Our preliminary evaluation results on an AR application show that CoIC can reduce the recognition and rendering latency by up to 52.28% and 75.86% respectively on current mobile devices.Comment: This poster has been accepted by the SIGCOMM in June 201

    One-bit Flip is All You Need: When Bit-flip Attack Meets Model Training

    Full text link
    Deep neural networks (DNNs) are widely deployed on real-world devices. Concerns regarding their security have gained great attention from researchers. Recently, a new weight modification attack called bit flip attack (BFA) was proposed, which exploits memory fault inject techniques such as row hammer to attack quantized models in the deployment stage. With only a few bit flips, the target model can be rendered useless as a random guesser or even be implanted with malicious functionalities. In this work, we seek to further reduce the number of bit flips. We propose a training-assisted bit flip attack, in which the adversary is involved in the training stage to build a high-risk model to release. This high-risk model, obtained coupled with a corresponding malicious model, behaves normally and can escape various detection methods. The results on benchmark datasets show that an adversary can easily convert this high-risk but normal model to a malicious one on victim's side by \textbf{flipping only one critical bit} on average in the deployment stage. Moreover, our attack still poses a significant threat even when defenses are employed. The codes for reproducing main experiments are available at \url{https://github.com/jianshuod/TBA}.Comment: This work is accepted by the ICCV 2023. 14 page

    There Is Always a Way Out! Destruction-Resistant Key Management: Formal Definition and Practical Instantiation

    Get PDF
    A central advantage of deploying cryptosystems is that the security of large high-sensitive data sets can be reduced to the security of a very small key. The most popular way to manage keys is to use a (t,n)−(t,n)-threshold secret sharing scheme: a user splits her/his key into nn shares, distributes them among nn key servers, and can recover the key with the aid of any tt of them. However, it is vulnerable to device destruction: if all key servers and user\u27s devices break down, the key will be permanently lost. We propose a D‾\mathrm{\underline{D}}estruction-R‾\mathrm{\underline{R}}esistant K‾\mathrm{\underline{K}}ey M‾\mathrm{\underline{M}}anagement scheme, dubbed DRKM, which ensures the key availability even if destruction occurs. In DRKM, a user utilizes her/his n∗n^{*} personal identification factors (PIFs) to derive a cryptographic key but can retrieve the key using any t∗t^{*} of the n∗n^{*} PIFs. As most PIFs can be retrieved by the user per se\textit{per se} without requiring stateful\textit{stateful} devices, destruction resistance is achieved. With the integration of a (t,n)−(t,n)-threshold secret sharing scheme, DRKM also provides portable\textit{portable} key access for the user (with the aid of any tt of nn key servers) before destruction occurs. DRKM can be utilized to construct a destruction-resistant cryptosystem (DRC) in tandem with any backup system. We formally prove the security of DRKM, implement a DRKM prototype, and conduct a comprehensive performance evaluation to demonstrate its high efficiency. We further utilize Cramer\u27s Rule to reduce the required buffer to retrieve a key from 25 MB to 40 KB (for 256-bit security)

    Futuristic 6G Pervasive On-Demand Services:Integrating Space Edge Computing With Terrestrial Networks

    Get PDF
    Futuristic 6G technologies will integrate emerging low-Earth orbit (LEO) megaconstellations into terrestrial networks, promising to provide ubiquitous, low-latency and high-throughput network services on-demand. However, several unique characteristics of satellites (e.g., high dynamics and error-prone operational environments) make it very challenging to unleash the potential of megacons-tellations and accomplish these aforementioned promises

    A First Look at Mobile Intelligence: Architecture, Experimentation and Challenges

    No full text

    TailCutter: Wisely Cutting Tail Latency in Cloud CDNs Under Cost Constraints

    No full text

    Effects of alirocumab on types of myocardial infarction: insights from the ODYSSEY OUTCOMES trial

    No full text

    Effect of Alirocumab on Lipoprotein(a) and Cardiovascular Risk After Acute Coronary Syndrome

    No full text
    corecore