RAW image serves as the foundation for camera imaging, which resides at the very beginning of the pipeline that generates sRGB images. Unfortunately, owing to special considerations, the information-rich RAW images ar...
详细信息
We consider the problem of target range-angle imaging using distributed arrays. high resolution imaging requires a large array aperture. However, due to the limited number of array elements, the subarrays are usually ...
详细信息
Distributed data analytics platforms (i.e., Apache Spark, Hadoop) provide high-level APIs to programmatically write analytics tasks that are run distributedly in multiple computing nodes. The design of these framework...
详细信息
ISBN:
(纸本)9798400708862
Distributed data analytics platforms (i.e., Apache Spark, Hadoop) provide high-level APIs to programmatically write analytics tasks that are run distributedly in multiple computing nodes. The design of these frameworks was primarily motivated by performance and usability. Thus, the security takes a back seat. Consequently, they do not inherently support fine-grained access control or offer any plugin mechanism to enable it, making them risky to be used in multi-tier organizational settings. There have been attempts to build "add-on" solutions to enable fine-grained access control for distributed data analytics platforms. In this paper, first, we show that straightforward enforcement of "add-on" access control is insecure under adversarial code execution. Specifically, we show that an attacker can abuse platform-provided APIs to evade access controls without leaving any traces. Second, we designed a two-layered (i.e., proactive and reactive) defense system to protect against API abuses. On submission of a user code, our proactive security layer statically screens it to find potential attack signatures prior to its execution. The reactive security layer employs code instrumentation-based runtime checks and sandboxed execution to throttle any exploits at runtime. Next, we propose a new fine-grained access control framework with an enhanced policy language that supports map and filter primitives. Finally, we build a system named SECUREDL with our new access control framework and defense system on top of Apache Spark, which ensures secure access control policy enforcement under adversaries capable of executing code. To the best of our knowledge, this is the first fine-grained attribute-based access control framework for distributed data analytics platforms that is secure against platform API abuse attacks. performance evaluation showed that the overhead due to added security is low.
Traditional Deep Learning (DL) method is increasingly used in vehicular Intrusion Detection Systems (IDSs). However, there are still some limitations. It combines various models, resulting in a massive model size and ...
详细信息
In this work, we present MILQ, a quantum unrelated parallel machines scheduler and cutter. The setting of unrelated parallel machines considers independent hardware backends, each distinguished by differing setup and ...
In this work, we present MILQ, a quantum unrelated parallel machines scheduler and cutter. The setting of unrelated parallel machines considers independent hardware backends, each distinguished by differing setup and processing times. MILQ optimizes the total execution time of a batch of circuits scheduled on multiple quantum devices. It leverages state-of-the-art circuit-cutting techniques to fit circuits onto the devices and schedules them based on a mixed-integer linear program. Our results show a total improvement of up to 26 % compared to a baseline approach.
Hyperledger Fabric, a prominent permissioned blockchain platform, offers concurrent transaction processing via its Optimistic Concurrency Control (OCC) feature. However, conflicts arise when multiple transactions acce...
详细信息
Software Engineering for Artificial Intelligence (SE4A) uses SE principles to design and maintain AI systems, requiring analytical thinking for software complexity, while AI demands mathematical knowledge and algorith...
详细信息
The heavy-haul railways plays a crucial role in facilitating the transportation of large-scale goods, yet the challenging operational conditions significantly increase the occurrence of rail defects. Despite the growi...
详细信息
Anomaly detection on attributed networks is intended to find instances that dramatically different from other instances in terms of attributes or structure. However, most existing methods ignore the adverse effects of...
详细信息
Convolutional Neural Networks (CNN) have shown outstanding performance in many computer vision applications. However, CNN Inference on mobile and edge devices is challenging due to high computation demands. Recently, ...
详细信息
暂无评论