Reading Group Archives

Reading Group for Dependable Computing Systems Lab – Fall 2020

We will be meeting on Zoom on Tuesdays 11:30 AM – 1:00 PM.
URL: https://purdue-edu.zoom.us/j/93810013621?pwd=MWRPTUpjSUZsUG1BbzZURU5lRi80Zz09
Meeting ID: 938 1001 3621
Passcode: 878001

DatesTopicSuggested papersPresentersRecording
Sep 8Intro, Paper writing techniquesSaurabhLink
Sep 15Own work: Byzantine-robust federated learningAtul
Sep 22Own work: Approximate streaming analytics for the edgeRan
Sep 29, Oct 6Binary analysis of embedded softwareVulnerability Detection in IoT Firmware: A Survey - ICPADS, 2017. A broad overview of IoT firmware vulnerability detection coupled with a novel static analysis technique to detect authentication bypass flaws.

FirmUp: Precise Static Detection of Common Vulnerabilities in Firmware - ASPLOS 2018. A new static analysis technique for finding CVEs in stripped firmware binaries.
Austin, Abe
Oct 13Own work: Behavioral Decision-Making in Security of interdependent systemsMustafa
Oct 20, 27Reliability of autonomous systems- Pei, Kexin, Yinzhi Cao, Junfeng Yang, and Suman Jana. "Deepxplore: Automated whitebox testing of deep learning systems." In proceedings of the 26th Symposium on Operating Systems Principles (SOSP), pp. 1-18. 2017.
- Mishra, N., Imes, C., Lafferty, J.D. and Hoffmann, H., “CALOREE: Learning control for predictable latency and low energy.” ASPLOS, pp.184-198, 2018.
Ashraf, Pengcheng
Nov 3Reliability of edge computing systems“Edge-SLAM: Edge-Assisted Visual Simultaneous Localization and Mapping” Ali J. Ben Ali, Zakieh Sadat Hashemifar, Karthik Dantu
University of Buffalo, Mobisys 2020.
HengLink
Nov 10, 17Performance predictability of ML processingEdgardo, Josh
Nov 24How to write good evaluation sectionSaurabh
Dec 1Adversarial MLRuqi
Dec 8Embedded testbed setupShristi, Jay

Reading Group for Dependable Computing Systems Lab – Spring 2020

We will be meeting in EE 118 on Wednesdays 12:30 – 2:00 PM.

DatesTopicPapersPresenter(s)Presentation
Feb 12Paper writing analysis & Own workHeng Zhang, Michael A. Roth, Rajesh K. Panta, He Wang, Saurabh Bagchi. CrowdBind: Fairness Enhanced Late Binding Task Scheduling in
Mobile Crowdsensing, EWSN '20, Best Paper Finalist
Saurabh, Heng
Feb 19, 26Distributed Machine Learning under AttacksReza Shokri and Vitaly Shmatikov. 2015. Privacy-Preserving Deep Learning. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security ( CCS ’15). Association for Computing Machinery, New York, NY, USA, 1310–1321.

Bhagoji, Arjun Nitin, Supriyo Chakraborty, P. Mittal, and S. Calo. "Model Poisoning Attacks in Federated Learning." In In Workshop on Security in Machine Learning (SecML), collocated with the 32nd Conference on Neural Information Processing Systems (NeurIPS’18). 2018.
Atul, ManishAtul Slides
Mar 4Own workApproximate ML for embedded systems with reliability and performance guaranteesRan
Mar 11Symbolic execution for verification of systemsNelson L, Bornholt J, Gu R, Baumann A, Torlak E, Wang X. Scaling symbolic evaluation for automated verification of systems code with Serval. InProceedings of the 27th ACM Symposium on Operating Systems Principles 2019 Oct 27 (SOSP '19) (pp. 225-242).

KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs, Cristian Cadar, Daniel Dunbar, and Dawson Engler (Stanford University) (OSDI '08)
Austin
Mar 25Own workServerless computing: reliability and performance guaranteesAshraf
Apr 1Attacks and Defenses against Cyber Physical Systems Choi, Hongjun, Wen-Chuan Lee, Yousra Aafer, Fan Fei, Zhan Tu, Xiangyu Zhang, Dongyan Xu, and Xinyan Deng. "Detecting attacks against robotic vehicles: A control invariant approach." In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (CCS '18), pp. 801-816. 2018.

Sun, Pengfei, Luis Garcia, and Saman Zonouz. "Tell Me More Than Just Assembly! Reversing Cyber-Physical Execution Semantics of Embedded IoT Controller Software Binaries." In 2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN '19), pp. 349-361. IEEE, 2019.
Apr 8Own work"Anomaly detection through sensing data with missing data values"Sean
Apr 15Big-Data Programming Models & FrameworksFang, Minghong, Xiaoyu Cao, Jinyuan Jia, and Neil Zhenqiang Gong. "Local model poisoning attacks to Byzantine-robust federated learning." pp. 1--18, Usenix Security 2020.

J. E. Gonzalez, Y. Low, H. Gu, D. Bickson, and C. Guestrin. PowerGraph: Distributed graph-parallel computation on natural graphs. In (OSDI '12), pages 17–30, 2012.
AtulAtul Slides
Apr 22Own workPrivacy preserving inferencing from distributed sensor data in a battlefield environmentShams
Apr 29Approximation for ML Algorithms Belabbas, M.A. and Wolfe, P.J., 2009. Spectral methods in machine learning and new strategies for very large datasets. Proceedings of the National Academy of Sciences, 106(2), pp.369-374.Pengcheng

Reading Group for Dependable Computing Systems Lab – Fall 2019

We will be meeting in EE 118 on Thursdays 5:00 – 6:30 PM.

DatesTopicPapersPresenter(s)Presentation
Aug 22Paper writing analysisSaurabh
Aug 29, Sep 5Testing ML programsPei, Kexin, Yinzhi Cao, Junfeng Yang, and Suman Jana. "Deepxplore: Automated whitebox testing of deep learning systems." In Proceedings of the 26th Symposium on Operating Systems Principles (SOSP), pp. 1-18. ACM, 2017.
Sun, Youcheng, Min Wu, Wenjie Ruan, Xiaowei Huang, Marta Kwiatkowska, and Daniel Kroening. "Concolic testing for deep neural networks." In Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering (ASE), pp. 109-119. ACM, 2018.
Sep 12Own work
Sep 19, 26ML at the edgeJiang, Junchen, Ganesh Ananthanarayanan, Peter Bodik, Siddhartha Sen, and Ion Stoica. "Chameleon: scalable adaptation of video analytics." SIGCOMM 2018.
Luyang Liu, Hongyu Li, Marco Gruteser "Edge Assisted Real-time Object Detection for Mobile Augmented Reality." 25th Annual International Conference on Mobile Computing and Networking (Mobicom), 2019.
Oct 3Own work
Oct 10, 17Security of autonomous embedded platformsChoi, H., Lee, W.C., Aafer, Y., Fei, F., Tu, Z., Zhang, X., Xu, D. and Xinyan, X., 2018, October. Detecting attacks against robotic vehicles: A control invariant approach. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (CCS) (pp. 801-816). ACM.
He, Zhijian, Yao Chen, Enyan Huang, Qixin Wang, Yu Pei, and Haidong Yuan. "A system identification based Oracle for control-CPS software fault localization." In Proceedings of the 41st International Conference on Software Engineering (ICSE), pp. 116-127. IEEE Press, 2019.
Oct 24Own work
Oct 31, Nov 7Distributed systems for accelerating MLCui, Henggang, Hao Zhang, Gregory R. Ganger, Phillip B. Gibbons, and Eric P. Xing. "Geeps: Scalable deep learning on distributed gpus with a gpu-specialized parameter server." In Proceedings of the Eleventh European Conference on Computer Systems (Eurosys), p. 4. ACM, 2016.
Hsieh, Kevin, Aaron Harlap, Nandita Vijaykumar, Dimitris Konomis, Gregory R. Ganger, Phillip B. Gibbons, and Onur Mutlu. "Gaia: Geo-Distributed Machine Learning Approaching {LAN} Speeds." In 14th {USENIX} Symposium on Networked Systems Design and Implementation (NSDI), pp. 629-647. 2017.
Nov 14Own work
Nov 21, 28Adversarial example detection for ML modelsSong, Yang, Taesup Kim, Sebastian Nowozin, Stefano Ermon, and Nate Kushman. "Pixeldefend: Leveraging generative models to understand and defend against adversarial examples." International Conference on Learning Representations (ICLR), 2017.
Xu, Weilin, David Evans, and Yanjun Qi. "Feature squeezing: Detecting adversarial examples in deep neural networks." Network and Distributed System Security Symposium (NDSS), 2017.

Reading Group for Dependable Computing Systems Lab – Fall 2018

We will be meeting in EE 118 on Wednesdays 5:00 – 6:30 PM.

DatesTopicPapersPresenter(s)Presentation
Aug 29Paper writing analysisSaurabh
Sep 5Paper writing analysisSaurabh
Sep 12Own workHeng
Sep 19, 26Debugging ML stacks"Why Should I Trust You?": Explaining the Predictions of Any Classifier - Ribeiro, Singh, Guestrin. KDD 16.
"Interpretable Convolutional Neural Networks," Zhang, Wu, Zhu, CVPR 2018.
Jinkyu, ChandanJinkyu PDF
Chandan PDF
Oct 3Own workMustafa
Oct 10, 17Debugging distributed systemsD3S: Debugging Deployed Distributed Systems, Kaashoek et al. NSDI-08.
Debugging Distributed Systems, Ernst et al. ACM Queue-16.
Ran, Shikhar
Oct 24Own workCharitha
Oct 31, Nov 7Attacks against online learning, transfer learningWith Great Training Comes Great Vulnerability: Practical Attacks against Transfer Learning, Ben Zhao et al. Usenix Security-18.
The space of transferable adversarial examples, McDaniel et al. Arxiv-17.
Ashraf, Rakesh
Nov 14Own workEdgardo
Nov 21Own workChris W

Reading Group for Dependable Computing Systems Lab – Spring 2018

We will be meeting in EE 118 on Thursdays 5.30 – 7:00 PM.

DatesTopicPapersPresenter(s)Presentation
Feb 22Own workCharitha
Feb 15, Mar 1Configuration management in distributed systems"Borg, Omega, and Kubernetes" IEEE Queue, Mar 2016; Unikernels, ASPLOS 2013. Ashraf, Rakesh
Mar 8Own workSubramaniyam
Mar 22, 29Security implications and debugging in MLSOSP 17 paper from Columbia; Papernot et al. AsiaCCS 17
Jinkyu, Paul
Apr 5Own workNaif
Apr 12, 19Wearable devicesMobicom 17 paper from U Buffalo; Mobisys 16 paper from Felix Edgardo, Heng
Apr 26Own workRan, Peter

Reading Group for Dependable Computing Systems Lab – Fall 2017

We will be meeting in EE 118 on Thursdays 5.30 – 7:00 PM.

DatesTopicPapersPresenter(s)Presentation
Aug 31Introduction
Logistics
Paper writing tips
Saurabh
Sep 14, 21Vulnerability discovery through static analysis or dynamic analysisCharitha, Jinkyu
Sep 28Own workHeng
Oct 5, 12Programming accelerators (GPU, DSP, FPGA, neuromorphic chips)Paul, Saurabh
Oct 19Own workNaif
Oct 26, Nov 2Smart contracts and smart moneyAbe, Aniket's student
Nov 9Own workAshraf
Nov 16Own workChris W
Nov 30, Dec 7Reliability challenges in new wireless technologies: UWB, 5G, cognitive radioMustafa, Heng

Reading Group for Dependable Computing Systems Lab – Fall 2016

We will be meeting in MSEE 239 on Thursdays 6.00 – 7:30 PM.

DatesTopicPapersPresenter(s)Presentation
Sep 1Own workTara
Sep 8, 15Debugging distributed systemsScott-NSDI16, Kasikci-SOSP15Subrata, Charitha
Sep 22Own workChris G, Tom
Sep 29, Oct 6Infrastructure for large-scale machine learningGoogle-OSDI16, Google-NIPS12Ashraf, Jinkyu
Oct 13Own workNawanol
Oct 20, 27Security bug finding through static analysisLivshits-UsenixSec05, Costin-UsenixSec14Chris W, Abe
Nov 3Own workAyush
Nov 10, 17Distributed processing using acceleratorsKaleem-PACT14, Kim-OSDI14Paul, Ranvijay
Dec 1Own workAshraf
Dec 8, 15Security in crowdsourced systemsWang-Mobisys16, Tran-NSDI09Ayush, Heng

Reading Group for Dependable Computing Systems Lab – Spring 2016

We will be meeting in EE 118 on Thursdays 6.00 – 7:30 PM.

DatesTopicPapersPresenter(s)Presentation
Feb 18DoS in Control SystemsPaul
Feb 25Own WorkChris
Mar 03
Mar 10
Network Function Virtualization ReliabilitySaurabh, AyushPowerpoint (Saurabh)
Powerpoint (Ayush)
Mar 24Own WorkKanak
Mar 31
Apr 07
Streaming Data analytics in IoTSubrata, Akshay
Apr 14Own WorkChris W
Apr 21
Apr 28
Randomization for Security for Embedded devicesRavi, Abe
May 05Own workTara

History of DCSL Reading group

2015, 2014, 2013, 2012, 2010, 2009, 2008, 2007, 2006, 2005, 2004, 2003, 2002

Last modified: March 8, 2021