Skip to main content

Showing 1–17 of 17 results for author: Singer, J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2506.04062  [pdf, ps, other

    cs.DC

    Energy-Aware Workflow Execution: An Overview of Techniques for Saving Energy and Emissions in Scientific Compute Clusters

    Authors: Lauritz Thamsen, Yehia Elkhatib, Paul Harvey, Syed Waqar Nabi, Jeremy Singer, Wim Vanderbauwhede

    Abstract: Scientific research in many fields routinely requires the analysis of large datasets, and scientists often employ workflow systems to leverage clusters of computers for their data analysis. However, due to their size and scale, these workflow applications can have a considerable environmental footprint in terms of compute resource use, energy consumption, and carbon emissions. Mitigating this is c… ▽ More

    Submitted 4 June, 2025; originally announced June 2025.

    Comments: Partially supported by the Engineering and Physical Sciences Research Council under grant number UKRI154

  2. arXiv:2505.15327  [pdf, ps, other

    cs.PL

    Let's Take Esoteric Programming Languages Seriously

    Authors: Jeremy Singer, Steve Draper

    Abstract: Esoteric programming languages are challenging to learn, but their unusual features and constraints may serve to improve programming ability. From languages designed to be intentionally obtuse (e.g. INTERCAL) to others targeting artistic expression (e.g. Piet) or exploring the nature of computation (e.g. Fractan), there is rich variety in the realm of esoteric programming languages. This essay exa… ▽ More

    Submitted 21 May, 2025; originally announced May 2025.

    Comments: 13 pages, 7 figures

    ACM Class: D.3.0

  3. arXiv:2504.02322  [pdf, other

    cs.CR cs.DC

    Distributed Log-driven Anomaly Detection System based on Evolving Decision Making

    Authors: Zhuoran Tan, Qiyuan Wang, Christos Anagnostopoulos, Shameem P. Parambath, Jeremy Singer, Sam Temple

    Abstract: Effective anomaly detection from logs is crucial for enhancing cybersecurity defenses by enabling the early identification of threats. Despite advances in anomaly detection, existing systems often fall short in areas such as post-detection validation, scalability, and effective maintenance. These limitations not only hinder the detection of new threats but also impair overall system performance. T… ▽ More

    Submitted 3 April, 2025; originally announced April 2025.

    Comments: This paper has been accepted at 45th IEEE International Conference on Distributed Computing Systems

  4. arXiv:2504.02313  [pdf, other

    cs.CR cs.DC

    Distributed Temporal Graph Learning with Provenance for APT Detection in Supply Chains

    Authors: Zhuoran Tan, Christos Anagnostopoulos, Jeremy Singer

    Abstract: Cyber supply chain, encompassing digital asserts, software, hardware, has become an essential component of modern Information and Communications Technology (ICT) provisioning. However, the growing inter-dependencies have introduced numerous attack vectors, making supply chains a prime target for exploitation. In particular, advanced persistent threats (APTs) frequently leverage supply chain vulner… ▽ More

    Submitted 3 April, 2025; originally announced April 2025.

    Comments: This paper has been accepted at 45th IEEE International Conference on Distributed Computing Systems

  5. arXiv:2503.08973  [pdf, other

    cs.LG cs.CR cs.PF

    Quantitative Analysis of Deeply Quantized Tiny Neural Networks Robust to Adversarial Attacks

    Authors: Idris Zakariyya, Ferheen Ayaz, Mounia Kharbouche-Harrari, Jeremy Singer, Sye Loong Keoh, Danilo Pau, José Cano

    Abstract: Reducing the memory footprint of Machine Learning (ML) models, especially Deep Neural Networks (DNNs), is imperative to facilitate their deployment on resource-constrained edge devices. However, a notable drawback of DNN models lies in their susceptibility to adversarial attacks, wherein minor input perturbations can deceive them. A primary challenge revolves around the development of accurate, re… ▽ More

    Submitted 11 March, 2025; originally announced March 2025.

    Comments: arXiv admin note: substantial text overlap with arXiv:2304.12829

  6. arXiv:2411.15354  [pdf, other

    cs.SE

    Unified Semantic Log Parsing and Causal Graph Construction for Attack Attribution

    Authors: Zhuoran Tan, Christos Anagnostopoulos, Shameem P. Parambath, Jeremy Singer

    Abstract: Multi-source logs provide a comprehensive overview of ongoing system activities, allowing for in-depth analysis to detect potential threats. A practical approach for threat detection involves explicit extraction of entity triples (subject, action, object) towards building provenance graphs to facilitate the analysis of system behavior. However, current log parsing methods mainly focus on retrievin… ▽ More

    Submitted 22 November, 2024; originally announced November 2024.

  7. arXiv:2411.14829  [pdf, other

    cs.CR

    OSPtrack: A Labeled Dataset Targeting Simulated Execution of Open-Source Software

    Authors: Zhuoran Tan, Christos Anagnosstopoulos, Jeremy Singer

    Abstract: Open-source software serves as a foundation for the internet and the cyber supply chain, but its exploitation is becoming increasingly prevalent. While advances in vulnerability detection for OSS have been significant, prior research has largely focused on static code analysis, often neglecting runtime indicators. To address this shortfall, we created a comprehensive dataset spanning five ecosyste… ▽ More

    Submitted 28 November, 2024; v1 submitted 22 November, 2024; originally announced November 2024.

  8. arXiv:2309.13175  [pdf

    cs.IR

    American Family Cohort, a data resource description

    Authors: Deepa Balraj, Ayin Vala, Shiying Hao, Melanie Philofsky, Anna Tsvetkova, Elena Trach, Shravani Priya Narra, Oleg Zhuk, Mary Shamkhorskaya, Jim Singer, Joseph Mesterhazy, Somalee Datta, Isabella Chu, David Rehkopf

    Abstract: This manuscript is a research resource description and presents a large and novel Electronic Health Records (EHR) data resource, American Family Cohort (AFC). The AFC data is derived from Centers for Medicare and Medicaid Services (CMS) certified American Board of Family Medicine (ABFM) PRIME registry. The PRIME registry is the largest national Qualified Clinical Data Registry (QCDR) for Primary C… ▽ More

    Submitted 22 September, 2023; originally announced September 2023.

  9. arXiv:2308.05076  [pdf, other

    cs.PL cs.CY

    CHERI Performance Enhancement for a Bytecode Interpreter

    Authors: Duncan Lowther, Dejice Jacob, Jeremy Singer

    Abstract: During our port of the MicroPython bytecode interpreter to the CHERI-based Arm Morello platform, we encountered a number of serious performance degradations. This paper explores several of these performance issues in detail, in each case we characterize the cause of the problem, the fix, and the corresponding interpreter performance improvement over a set of standard Python benchmarks. While we… ▽ More

    Submitted 12 September, 2023; v1 submitted 9 August, 2023; originally announced August 2023.

    Comments: 9 pages, 9 figures

  10. arXiv:2307.14556  [pdf, other

    cs.AI cs.SE

    Reinforcement learning guided fuzz testing for a browser's HTML rendering engine

    Authors: Martin Sablotny, Bjørn Sand Jensen, Jeremy Singer

    Abstract: Generation-based fuzz testing can uncover various bugs and security vulnerabilities. However, compared to mutation-based fuzz testing, it takes much longer to develop a well-balanced generator that produces good test cases and decides where to break the underlying structure to exercise new code paths. We propose a novel approach to combine a trained test case generator deep learning model with a d… ▽ More

    Submitted 26 July, 2023; originally announced July 2023.

  11. arXiv:2304.12829  [pdf, other

    cs.LG cs.CR cs.PF

    Improving Robustness Against Adversarial Attacks with Deeply Quantized Neural Networks

    Authors: Ferheen Ayaz, Idris Zakariyya, José Cano, Sye Loong Keoh, Jeremy Singer, Danilo Pau, Mounia Kharbouche-Harrari

    Abstract: Reducing the memory footprint of Machine Learning (ML) models, particularly Deep Neural Networks (DNNs), is essential to enable their deployment into resource-constrained tiny devices. However, a disadvantage of DNN models is their vulnerability to adversarial attacks, as they can be fooled by adding slight perturbations to the inputs. Therefore, the challenge is how to create accurate, robust, an… ▽ More

    Submitted 25 April, 2023; originally announced April 2023.

    Comments: Accepted at IJCNN 2023. 8 pages, 5 figures

  12. arXiv:2303.15130  [pdf, other

    cs.SE cs.CR cs.PL

    Picking a CHERI Allocator: Security and Performance Considerations

    Authors: Jacob Bramley, Dejice Jacob, Andrei Lascu, Jeremy Singer, Laurence Tratt

    Abstract: Several open-source memory allocators have been ported to CHERI, a hardware capability platform. In this paper we examine the security and performance of these allocators when run under CheriBSD on Arm's experimental Morello platform. We introduce a number of security attacks and show that all but one allocator are vulnerable to some of the attacks - including the default CheriBSD allocator. We th… ▽ More

    Submitted 15 May, 2023; v1 submitted 27 March, 2023; originally announced March 2023.

  13. arXiv:2209.10896  [pdf

    cs.LG

    mini-ELSA: using Machine Learning to improve space efficiency in Edge Lightweight Searchable Attribute-based encryption for Industry 4.0

    Authors: Jawhara Aljabri, Anna Lito Michala, Jeremy Singer, Ioannis Vourganas

    Abstract: In previous work a novel Edge Lightweight Searchable Attribute-based encryption (ELSA) method was proposed to support Industry 4.0 and specifically Industrial Internet of Things applications. In this paper, we aim to improve ELSA by minimising the lookup table size and summarising the data records by integrating Machine Learning (ML) methods suitable for execution at the edge. This integration wil… ▽ More

    Submitted 22 September, 2022; originally announced September 2022.

  14. arXiv:2207.08019  [pdf, other

    cs.PL cs.SE

    Do Fewer Tiers Mean Fewer Tears? Eliminating Web Stack Components to Improve Interoperability

    Authors: Adrian Ramsingh, Jeremy Singer, Phil Trinder

    Abstract: Web applications are structured as multi-tier stacks of components. Each component may be written in a different language and interoperate using a variety of protocols. Such interoperation increases developer effort, can introduce security vulnerabilities, may reduce performance and require additional resources. A range of approaches have been explored to minimise web stack interoperation. This… ▽ More

    Submitted 16 July, 2022; originally announced July 2022.

  15. arXiv:1902.03656  [pdf, other

    cs.DC

    Cloud Futurology

    Authors: Blesson Varghese, Philipp Leitner, Suprio Ray, Kyle Chard, Adam Barker, Yehia Elkhatib, Herry Herry, Cheol-Ho Hong, Jeremy Singer, Fung Po Tso, Eiko Yoneki, Mohamed-Faten Zhani

    Abstract: The Cloud has become integral to most Internet-based applications and user gadgets. This article provides a brief history of the Cloud and presents a researcher's view of the prospects for innovating at the infrastructure, middleware, and application and delivery levels of the already crowded Cloud computing stack.

    Submitted 10 February, 2019; originally announced February 2019.

    Comments: Accepted to IEEE Computer, 2019

  16. Functional Baby Talk: Analysis of Code Fragments from Novice Haskell Programmers

    Authors: Jeremy Singer, Blair Archibald

    Abstract: What kinds of mistakes are made by novice Haskell developers, as they learn about functional programming? Is it possible to analyze these errors in order to improve the pedagogy of Haskell? In 2016, we delivered a massive open online course which featured an interactive code evaluation environment. We captured and analyzed 161K interactions from learners. We report typical novice developer behavio… ▽ More

    Submitted 14 May, 2018; originally announced May 2018.

    Comments: In Proceedings TFPIE 2017, arXiv:1805.04255

    ACM Class: K.3.1; D.3.2

    Journal ref: EPTCS 270, 2018, pp. 37-51

  17. Backbone Fragility and the Local Search Cost Peak

    Authors: I. P. Gent, J. Singer, A. Smaill

    Abstract: The local search algorithm WSat is one of the most successful algorithms for solving the satisfiability (SAT) problem. It is notably effective at solving hard Random 3-SAT instances near the so-called `satisfiability threshold', but still shows a peak in search cost near the threshold and large variations in cost over different instances. We make a number of significant contribution… ▽ More

    Submitted 1 June, 2011; originally announced June 2011.

    Journal ref: Journal Of Artificial Intelligence Research, Volume 12, pages 235-270, 2000