Search
Results
-
Photons: Lambdas on a diet
(2020)Proceedings of the 11th ACM Symposium on Cloud Computing (SoCC '20)Serverless computing allows users to create short, stateless functions and invoke hundreds of them concurrently to tackle massively parallel workloads. We observe that even though most of the footprint of a serverless function is fixed across its invocations - - language runtime, libraries, and other application state - - today's serverless platforms do not exploit this redundancy. Such an inefficiency has cascading negative impacts: ...Conference Paper -
PISKES: Pragmatic Internet-Scale Key-Establishment System
(2020)Proceedings of the 15th ACM Asia Conference on Computer and Communications SecurityDenial-of-service attacks have become increasingly prevalent in the Internet. In many cases they are enabled or facilitated by the lack of source authentication?it is often easy for an attacker to spoof its own IP address and thus launch reflection attacks or evade detection. There have been attempts in the past to resolve this issue through filtering or cryptography-based techniques; however, there is still no sufficiently strong system ...Conference Paper -
ACE: Asynchronous and Concurrent Execution of Complex Smart Contracts
(2020)Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications SecuritySmart contracts are programmable, decentralized and transparent financial applications. Because smart contract platforms typically support Turing-complete programming languages, such systems are often said to enable arbitrary applications. However, the current permissionless smart contract systems impose heavy restrictions on the types of computations that can be implemented. For example, the globally-replicated and sequential execution ...Conference Paper -
Speculative Probing: Hacking Blind in the Spectre Era
(2020)Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications SecurityTo defeat ASLR or more advanced fine-grained and leakage-resistant code randomization schemes, modern software exploits rely on information disclosure to locate gadgets inside the victim's code. In the absence of such info-leak vulnerabilities, attackers can still hack blind and derandomize the address space by repeatedly probing the victim's memory while observing crash side effects, but doing so is only feasible for crash-resistant ...Conference Paper -
Practical Lattice-Based Zero-Knowledge Proofs for Integer Relations
(2020)Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications SecurityWe present a novel lattice-based zero-knowledge proof system for showing that (arbitrary-sized) committed integers satisfy additive and multiplicative relationships. The proof sizes of our schemes are between two to three orders of magnitude smaller than in the lattice proof system of Libert et al. (CRYPTO 2018) for the same relations. Because the proof sizes of our protocols grow linearly in the integer length, our proofs will eventually ...Conference Paper -
Kalman-Based Virtual Sensing for Improvement of Service Response Replication in Environmental Tests
(2020)Conference Proceedings of the Society for Experimental Mechanics Series ~ Model Validation and Uncertainty Quantification, Volume 3Environmental tests are typically conducted in order to reproduce the operational response of a system. Non-realistic excitation mechanisms and mismatches between operational and test boundary conditions, represent relevant limitations of the currently adopted testing procedures. The Boundary Condition Challenge (BCC) addresses the assessment of a testing practice that allows to reproduce structural responses, which better represent the ...Conference Paper -
Tilt-Responsive Techniques for Digital Drawing Boards
(2020)Proceedings of the 33rd Annual ACM Symposium on User Interface Software and Technology (UIST 2020)Drawing boards offer a self-stable work surface that is continuously adjustable. On digital displays, such as the Microsoft Surface Studio, these properties open up a class of techniques that sense and respond to tilt adjustments. Each display posture-whether angled high, low, or somewhere in-between-affords some activities, but not others. Because what is appropriate also depends on the application and task, we explore a range of ...Conference Paper -
Incentivizing High-Quality Data Sets in Construction Using Blockchain: A Feasibility Study in the Swiss Industry
(2020)ISARC Proceedings ~ Proceedings of the 37th International Symposium on Automation and Robotics in Construction (ISARC)Data sets are often incomplete and low-quality at the end of a construction project. This creates rework or hinders opportunities to use data during future activities of the facility lifecycle (e.g. facility management, renovation, demolition). This research prototypes and evaluates a novel process to use blockchain and smart contracts in construction projects to incentivize high quality data sets. The proposed solution is defined in ...Conference Paper -
Integrated Benchmarking and Design for Reproducible and Accessible Evaluation of Robotic Agents
(2020)As robotics matures and increases in complexity, it is more necessary than ever that robot autonomy research be reproducible. Compared to other sciences, there are specific challenges to benchmarking autonomy, such as the complexity of the software stacks, the variability of the hardware and the reliance on data-driven techniques, amongst others. In this paper, we describe a new concept for reproducible robotics research that integrates ...Conference Paper -
A Bird's Eye View of the World's Fastest Networks
(2020)Proceedings of the ACM Internet Measurement ConferenceLow latency is of interest for a variety of applications. The most stringent latency requirements arise in financial trading, where sub-microsecond differences matter. As a result, firms in the financial technology sector are pushing networking technology to its limits, giving a peek into the future of consumer-grade terrestrial microwave networks. Here, we explore the world's most competitive network design race, which has played out ...Conference Paper