Skip to main content

Showing 1–11 of 11 results for author: Caulfield, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2506.05290  [pdf, ps, other

    cs.CR

    Big Bird: Privacy Budget Management for W3C's Privacy-Preserving Attribution API

    Authors: Pierre Tholoniat, Alison Caulfield, Giorgio Cavicchioli, Mark Chen, Nikos Goutzoulias, Benjamin Case, Asaf Cidon, Roxana Geambasu, Mathias Lécuyer, Martin Thomson

    Abstract: Privacy-preserving advertising APIs like Privacy-Preserving Attribution (PPA) are designed to enhance web privacy while enabling effective ad measurement. PPA offers an alternative to cross-site tracking with encrypted reports governed by differential privacy (DP), but current designs lack a principled approach to privacy budget management, creating uncertainty around critical design decisions. We… ▽ More

    Submitted 5 June, 2025; originally announced June 2025.

  2. arXiv:2411.10855  [pdf, other

    cs.CR

    On the Verification of Control Flow Attestation Evidence

    Authors: Adam Caulfield, Norrathep Rattanavipanon, Ivan De Oliveira Nunes

    Abstract: Remote run-time attestation methods, including Control Flow Attestation (CFA) and Data Flow Attestation (DFA), have been proposed to generate precise evidence of execution's control flow path (in CFA) and optionally execution data inputs (in DFA) on a remote and potentially compromised embedded device, hereby referred to as a Prover (Prv). Recent advances in run-time attestation architectures are… ▽ More

    Submitted 28 April, 2025; v1 submitted 16 November, 2024; originally announced November 2024.

  3. arXiv:2409.19125  [pdf, other

    cs.CR

    TRACES: TEE-based Runtime Auditing for Commodity Embedded Systems

    Authors: Adam Caulfield, Antonio Joia Neto, Norrathep Rattanavipanon, Ivan De Oliveira Nunes

    Abstract: Control Flow Attestation (CFA) offers a means to detect control flow hijacking attacks on remote devices, enabling verification of their runtime trustworthiness. CFA generates a trace (CFLog) containing the destination of all branching instructions executed. This allows a remote Verifier (Vrf) to inspect the execution control flow on a potentially compromised Prover (Prv) before trusting that a va… ▽ More

    Submitted 27 September, 2024; originally announced September 2024.

  4. arXiv:2409.18403  [pdf, other

    cs.CR

    SpecCFA: Enhancing Control Flow Attestation/Auditing via Application-Aware Sub-Path Speculation

    Authors: Adam Caulfield, Liam Tyler, Ivan De Oliveira Nunes

    Abstract: At the edge of modern cyber-physical systems, Micro-Controller Units (MCUs) are responsible for safety-critical sensing/actuation. However, MCU cost constraints rule out the usual security mechanisms of general-purpose computers. Thus, various low-cost security architectures have been proposed to remotely verify MCU software integrity. Control Flow Attestation (CFA) enables a Verifier (Vrf) to rem… ▽ More

    Submitted 26 September, 2024; originally announced September 2024.

  5. arXiv:2408.10200  [pdf, other

    cs.CR

    SoK: Runtime Integrity

    Authors: Mahmoud Ammar, Adam Caulfield, Ivan De Oliveira Nunes

    Abstract: This paper provides a systematic exploration of Control Flow Integrity (CFI) and Control Flow Attestation (CFA) mechanisms, examining their differences and relationships. It addresses crucial questions about the goals, assumptions, features, and design spaces of CFI and CFA, including their potential coexistence on the same platform. Through a comprehensive review of existing defenses, this paper… ▽ More

    Submitted 21 October, 2024; v1 submitted 19 August, 2024; originally announced August 2024.

  6. Wavefront Threading Enables Effective High-Level Synthesis

    Authors: Blake Pelton, Adam Sapek, Ken Eguro, Daniel Lo, Alessandro Forin, Matt Humphrey, Jinwen Xi, David Cox, Rajas Karandikar, Johannes de Fine Licht, Evgeny Babin, Adrian Caulfield, Doug Burger

    Abstract: Digital systems are growing in importance and computing hardware is growing more heterogeneous. Hardware design, however, remains laborious and expensive, in part due to the limitations of conventional hardware description languages (HDLs) like VHDL and Verilog. A longstanding research goal has been programming hardware like software, with high-level languages that can generate efficient hardware… ▽ More

    Submitted 10 June, 2024; v1 submitted 29 May, 2024; originally announced May 2024.

    Comments: Accepted to PLDI'24

  7. arXiv:2404.01630  [pdf, other

    cs.NI

    FASTFLOW: Flexible Adaptive Congestion Control for High-Performance Datacenters

    Authors: Tommaso Bonato, Abdul Kabbani, Daniele De Sensi, Rong Pan, Yanfang Le, Costin Raiciu, Mark Handley, Timo Schneider, Nils Blach, Ahmad Ghalayini, Daniel Alves, Michael Papamichael, Adrian Caulfield, Torsten Hoefler

    Abstract: The increasing demand of machine learning (ML) workloads in datacenters places significant stress on current congestion control (CC) algorithms, many of which struggle to maintain performance at scale. These workloads generate bursty, synchronized traffic that requires both rapid response and fairness across flows. Unfortunately, existing CC algorithms that rely heavily on delay as a primary conge… ▽ More

    Submitted 20 September, 2024; v1 submitted 2 April, 2024; originally announced April 2024.

  8. arXiv:2309.13421  [pdf, other

    math.OC cs.AI cs.LG

    Penalties and Rewards for Fair Learning in Paired Kidney Exchange Programs

    Authors: Margarida Carvalho, Alison Caulfield, Yi Lin, Adrian Vetta

    Abstract: A kidney exchange program, also called a kidney paired donation program, can be viewed as a repeated, dynamic trading and allocation mechanism. This suggests that a dynamic algorithm for transplant exchange selection may have superior performance in comparison to the repeated use of a static algorithm. We confirm this hypothesis using a full scale simulation of the Canadian Kidney Paired Donation… ▽ More

    Submitted 23 September, 2023; originally announced September 2023.

    Comments: Shorter version accepted in WINE 2023

  9. arXiv:2308.12819  [pdf, other

    cs.AR

    DiCA: A Hardware-Software Co-Design for Differential Checkpointing in Intermittently Powered Devices

    Authors: Antonio Joia Neto, Adam Caulfield, Chistabelle Alvares, Ivan De Oliveira Nunes

    Abstract: Intermittently powered devices rely on opportunistic energy-harvesting to function, leading to recurrent power interruptions. This paper introduces DiCA, a proposal for a hardware/software co-design to create differential check-points in intermittent devices. DiCA leverages an affordable hardware module that simplifies the check-pointing process, reducing the check-point generation time and energy… ▽ More

    Submitted 25 August, 2023; v1 submitted 24 August, 2023; originally announced August 2023.

    Comments: 8 pages and 7 figures. To be published at IEEE/ACM International Conference on Computer-Aided Design (ICCAD) 2023

  10. arXiv:2303.16282  [pdf, other

    cs.CR

    ACFA: Secure Runtime Auditing & Guaranteed Device Healing via Active Control Flow Attestation

    Authors: Adam Caulfield, Norrathep Rattanavipanon, Ivan De Oliveira Nunes

    Abstract: Low-end embedded devices are increasingly used in various smart applications and spaces. They are implemented under strict cost and energy budgets, using microcontroller units (MCUs) that lack security features available in general-purpose processors. In this context, Remote Attestation (RA) was proposed as an inexpensive security service to enable a verifier (Vrf) to remotely detect illegal modif… ▽ More

    Submitted 19 October, 2023; v1 submitted 28 March, 2023; originally announced March 2023.

    Comments: In 29th USENIX Security Symposium (USENIX Security 23), 2023

  11. arXiv:2206.02894  [pdf, other

    cs.CR cs.AR

    ASAP: Reconciling Asynchronous Real-Time Operations and Proofs of Execution in Simple Embedded Systems

    Authors: Adam Caulfield, Norrathep Rattanavipanon, Ivan De Oliveira Nunes

    Abstract: Embedded devices are increasingly ubiquitous and their importance is hard to overestimate. While they often support safety-critical functions (e.g., in medical devices and sensor-alarm combinations), they are usually implemented under strict cost/energy budgets, using low-end microcontroller units (MCUs) that lack sophisticated security mechanisms. Motivated by this issue, recent work developed ar… ▽ More

    Submitted 6 June, 2022; originally announced June 2022.

    Comments: 2022 59th ACM/IEEE Design Automation Conference (DAC)