Skip to main content

Showing 1–6 of 6 results for author: Vaswani, K

Searching in archive cs. Search in all archives.
.
  1. arXiv:2503.14611  [pdf, other

    cs.CR cs.NI

    Transparent Attested DNS for Confidential Computing Services

    Authors: Antoine Delignat-Lavaud, Cédric Fournet, Kapil Vaswani, Manuel Costa, Sylvan Clebsch, Christoph M. Wintersteiger

    Abstract: Confidential services running in hardware-protected Trusted Execution Environments (TEEs) can provide higher security assurance, but this requires custom clients and protocols to distribute, update, and verify their attestation evidence. Compared with classic Internet security, built upon universal abstractions such as domain names, origins, and certificates, this puts a significant burden on serv… ▽ More

    Submitted 18 March, 2025; originally announced March 2025.

    MSC Class: 68M25

  2. arXiv:2412.10537  [pdf, other

    cs.CR cs.DC cs.LG

    ExclaveFL: Providing Transparency to Federated Learning using Exclaves

    Authors: Jinnan Guo, Kapil Vaswani, Andrew Paverd, Peter Pietzuch

    Abstract: In federated learning (FL), data providers jointly train a model without disclosing their training data. Despite its privacy benefits, a malicious data provider can simply deviate from the correct training protocol without being detected, thus attacking the trained model. While current solutions have explored the use of trusted execution environment (TEEs) to combat such attacks, there is a mismat… ▽ More

    Submitted 13 December, 2024; originally announced December 2024.

  3. arXiv:2205.09005  [pdf, other

    cs.CR cs.AI cs.AR

    Confidential Machine Learning within Graphcore IPUs

    Authors: Kapil Vaswani, Stavros Volos, Cédric Fournet, Antonio Nino Diaz, Ken Gordon, Balaji Vembu, Sam Webster, David Chisnall, Saurabh Kulkarni, Graham Cunningham, Richard Osborne, Dan Wilkinson

    Abstract: We present IPU Trusted Extensions (ITX), a set of experimental hardware extensions that enable trusted execution environments in Graphcore's AI accelerators. ITX enables the execution of AI workloads with strong confidentiality and integrity guarantees at low performance overheads. ITX isolates workloads from untrusted hosts, and ensures their data and models remain encrypted at all times except… ▽ More

    Submitted 20 May, 2022; v1 submitted 18 May, 2022; originally announced May 2022.

  4. arXiv:2110.01001  [pdf, other

    cs.MM cs.SD eess.AS

    Multimodal Fusion Based Attentive Networks for Sequential Music Recommendation

    Authors: Kunal Vaswani, Yudhik Agrawal, Vinoo Alluri

    Abstract: Music has the power to evoke intense emotional experiences and regulate the mood of an individual. With the advent of online streaming services, research in music recommendation services has seen tremendous progress. Modern methods leveraging the listening histories of users for session-based song recommendations have overlooked the significance of features extracted from lyrics and acoustic conte… ▽ More

    Submitted 3 October, 2021; originally announced October 2021.

  5. arXiv:1605.01092  [pdf, other

    cs.DB cs.CR

    Information Flows in Encrypted Databases

    Authors: Kapil Vaswani, Ravi Ramamurthy, Ramarathnam Venkatesan

    Abstract: In encrypted databases, sensitive data is protected from an untrusted server by encrypting columns using partially homomorphic encryption schemes, and storing encryption keys in a trusted client. However, encrypting columns and protecting encryption keys does not ensure confidentiality - sensitive data can leak during query processing due to information flows through the trusted client. In this pa… ▽ More

    Submitted 3 May, 2016; originally announced May 2016.

  6. arXiv:1107.4422  [pdf, other

    cs.PL cs.LO cs.SE

    Logical Concurrency Control from Sequential Proofs

    Authors: Jyotirmoy Deshmukh, G. Ramalingam, Venkatesh-Prasad Ranganath, Kapil Vaswani

    Abstract: We are interested in identifying and enforcing the isolation requirements of a concurrent program, i.e., concurrency control that ensures that the program meets its specification. The thesis of this paper is that this can be done systematically starting from a sequential proof, i.e., a proof of correctness of the program in the absence of concurrent interleavings. We illustrate our thesis by pres… ▽ More

    Submitted 1 September, 2011; v1 submitted 22 July, 2011; originally announced July 2011.

    ACM Class: D.1.3, D.2.4, F.3.1

    Journal ref: Logical Methods in Computer Science, Volume 7, Issue 3 (September 2, 2011) lmcs:986