{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T00:29:13Z","timestamp":1766449753822,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":80,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,3,9]],"date-time":"2020-03-09T00:00:00Z","timestamp":1583712000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1725734"],"award-info":[{"award-number":["1725734"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,3,9]]},"DOI":"10.1145\/3373376.3378462","type":"proceedings-article","created":{"date-parts":[[2020,3,13]],"date-time":"2020-03-13T22:37:01Z","timestamp":1584139021000},"page":"35-52","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["Game of Threads"],"prefix":"10.1145","author":[{"given":"Jose Rodrigo","family":"Sanchez Vicarte","sequence":"first","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana-Champaign, IL, USA"}]},{"given":"Benjamin","family":"Schreiber","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana-Champaign, IL, USA"}]},{"given":"Riccardo","family":"Paccagnella","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana-Champaign, IL, USA"}]},{"given":"Christopher W.","family":"Fletcher","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana-Champaign, IL, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,3,13]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2016. Google Machine Learning. https:\/\/cloud.google.com\/products\/ machine-learning\/.  2016. Google Machine Learning. https:\/\/cloud.google.com\/products\/ machine-learning\/."},{"key":"e_1_3_2_1_2_1","unstructured":"2017. Amazon Machine Learning. https:\/\/aws.amazon.com\/machinelearning\/.  2017. Amazon Machine Learning. https:\/\/aws.amazon.com\/machinelearning\/."},{"key":"e_1_3_2_1_3_1","unstructured":"2018. Intel(R) Math Kernel Library for Deep Neural Networks. https: \/\/github.com\/intel\/mkl-dnn.  2018. Intel(R) Math Kernel Library for Deep Neural Networks. https: \/\/github.com\/intel\/mkl-dnn."},{"key":"e_1_3_2_1_4_1","unstructured":"2019. Apache MXNet. https:\/\/mxnet.apache.org\/.  2019. Apache MXNet. https:\/\/mxnet.apache.org\/."},{"key":"e_1_3_2_1_5_1","unstructured":"2019. PyTorch Hogwild Implementation for DNNs. https:\/\/github. com\/pytorch\/examples\/tree\/master\/mnist_hogwild.  2019. PyTorch Hogwild Implementation for DNNs. https:\/\/github. com\/pytorch\/examples\/tree\/master\/mnist_hogwild."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3212734.3212763"},{"key":"e_1_3_2_1_7_1","volume-title":"Trustzone: Integrated hardware and software security. ARM white paper","author":"Alves T","year":"2004","unstructured":"T Alves and D Felton . 2004 . Trustzone: Integrated hardware and software security. ARM white paper (2004). T Alves and D Felton. 2004. Trustzone: Integrated hardware and software security. ARM white paper (2004)."},{"key":"e_1_3_2_1_8_1","volume-title":"SCONE: Secure Linux Containers with Intel SGX. In OSDI'16","author":"Arnautov Sergei","year":"2016","unstructured":"Sergei Arnautov , Bohdan Trach , Franz Gregor , Thomas Knauth , Andre Martin , Christian Priebe , Joshua Lind , Divya Muthukumaran , Mark L Stillwell , David Goltzsche , David Eyers , Peter Pietzuch , and Christof Fetzer . 2016 . SCONE: Secure Linux Containers with Intel SGX. In OSDI'16 . Sergei Arnautov, Bohdan Trach, Franz Gregor, Thomas Knauth, Andre Martin, Christian Priebe, Joshua Lind, Divya Muthukumaran, Mark L Stillwell, David Goltzsche, David Eyers, Peter Pietzuch, and Christof Fetzer. 2016. SCONE: Secure Linux Containers with Intel SGX. In OSDI'16."},{"key":"e_1_3_2_1_9_1","volume-title":"OSDI'14","author":"Baumann Andrew","year":"2014","unstructured":"Andrew Baumann , Marcus Peinado , and Galen Hunt . 2014 . Shielding applications from an untrusted cloud with Haven . In OSDI'14 . Andrew Baumann, Marcus Peinado, and Galen Hunt. 2014. Shielding applications from an untrusted cloud with Haven. In OSDI'14."},{"key":"e_1_3_2_1_10_1","volume-title":"ICML'12","author":"Biggio Battista","year":"2012","unstructured":"Battista Biggio , Blaine Nelson , and Pavel Laskov . 2012 . Poisoning attacks against support vector machines . In ICML'12 . Battista Biggio, Blaine Nelson, and Pavel Laskov. 2012. Poisoning attacks against support vector machines. In ICML'12."},{"key":"e_1_3_2_1_11_1","volume-title":"NIPS'17","author":"Blanchard Peva","year":"2017","unstructured":"Peva Blanchard , El Mahdi El Mhamdi , Rachid Guerraoui , and Julien Stainer . 2017 . Machine learning with adversaries: Byzantine tolerant gradient descent . In NIPS'17 . Peva Blanchard, El Mahdi El Mhamdi, Rachid Guerraoui, and Julien Stainer. 2017. Machine learning with adversaries: Byzantine tolerant gradient descent. In NIPS'17."},{"key":"e_1_3_2_1_12_1","volume-title":"WOOT'17","author":"Brasser Ferdinand","year":"2017","unstructured":"Ferdinand Brasser , Urs M\u00fcller , Alexandra Dmitrienko , Kari Kostiainen , Srdjan Capkun , and Ahmad-Reza Sadeghi . 2017 . Software grand exposure: SGX cache attacks are practical . In WOOT'17 . Ferdinand Brasser, Urs M\u00fcller, Alexandra Dmitrienko, Kari Kostiainen, Srdjan Capkun, and Ahmad-Reza Sadeghi. 2017. Software grand exposure: SGX cache attacks are practical. In WOOT'17."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.502"},{"key":"e_1_3_2_1_14_1","volume-title":"ICML'18","author":"Chen Lingjiao","year":"2018","unstructured":"Lingjiao Chen , Hongyi Wang , Zachary Charles , and Dimitris Papailiopoulos . 2018 . DRACO: Byzantine-resilient distributed training via redundant gradients . In ICML'18 . Lingjiao Chen, Hongyi Wang, Zachary Charles, and Dimitris Papailiopoulos. 2018. DRACO: Byzantine-resilient distributed training via redundant gradients. In ICML'18."},{"key":"e_1_3_2_1_15_1","volume-title":"OSDI'14","author":"Chilimbi Trishul","year":"2014","unstructured":"Trishul Chilimbi , Yutaka Suzue , Johnson Apacible , and Karthik Kalyanaraman . 2014 . Project Adam: Building an Efficient and Scalable Deep Learning Training System . In OSDI'14 . Trishul Chilimbi, Yutaka Suzue, Johnson Apacible, and Karthik Kalyanaraman. 2014. Project Adam: Building an Efficient and Scalable Deep Learning Training System. In OSDI'14."},{"key":"e_1_3_2_1_16_1","volume-title":"Intel SGX Explained. In IACR'16","author":"Costan Victor","year":"2016","unstructured":"Victor Costan and Srinivas Devadas . 2016 . Intel SGX Explained. In IACR'16 . Victor Costan and Srinivas Devadas. 2016. Intel SGX Explained. In IACR'16."},{"key":"e_1_3_2_1_17_1","unstructured":"Wei Dai. 2018. Learning with Staleness.  Wei Dai. 2018. Learning with Staleness."},{"key":"e_1_3_2_1_18_1","volume-title":"GossipGraD: Scalable Deep Learning using Gossip Communication based Asynchronous Gradient Descent. arXiv","author":"Daily Jeff","year":"2018","unstructured":"Jeff Daily , Abhinav Vishnu , Charles Siegel , Thomas Warfel , and Vinay Amatya . 2018. GossipGraD: Scalable Deep Learning using Gossip Communication based Asynchronous Gradient Descent. arXiv ( 2018 ). Jeff Daily, Abhinav Vishnu, Charles Siegel, Thomas Warfel, and Vinay Amatya. 2018. GossipGraD: Scalable Deep Learning using Gossip Communication based Asynchronous Gradient Descent. arXiv (2018)."},{"key":"e_1_3_2_1_19_1","volume-title":"ICML'18","author":"Damaskinos Georgios","year":"2018","unstructured":"Georgios Damaskinos , El Mahdi El Mhamdi , Rachid Guerraoui , Rhicheek Patra , and Mahsa Taziki . 2018 . Asynchronous byzantine machine learning (the case of sgd) . In ICML'18 . Georgios Damaskinos, El Mahdi El Mhamdi, Rachid Guerraoui, Rhicheek Patra, and Mahsa Taziki. 2018. Asynchronous byzantine machine learning (the case of sgd). In ICML'18."},{"key":"e_1_3_2_1_20_1","volume-title":"ISCA'17","author":"Sa Christopher De","year":"2017","unstructured":"Christopher De Sa , Matthew Feldman , Christopher R\u00e9 , and Kunle Olukotun . 2017 . Understanding and optimizing asynchronous lowprecision stochastic gradient descent . In ISCA'17 . Christopher De Sa, Matthew Feldman, Christopher R\u00e9, and Kunle Olukotun. 2017. Understanding and optimizing asynchronous lowprecision stochastic gradient descent. In ISCA'17."},{"volume-title":"NIPS'12","author":"Dean Jeffrey","key":"e_1_3_2_1_21_1","unstructured":"Jeffrey Dean , Greg S. Corrado , Rajat Monga , Kai Chen , Matthieu Devin , Quoc V. Le , Mark Z. Mao , Marc Aurelio Ranzato , Andrew Senior , Paul Tucker , Ke Yang , and Andrew Y. Ng . 2012. Large scale distributed deep networks . In NIPS'12 . Jeffrey Dean, Greg S. Corrado, Rajat Monga, Kai Chen, Matthieu Devin, Quoc V. Le, Mark Z. Mao, Marc Aurelio Ranzato, Andrew Senior, Paul Tucker, Ke Yang, and Andrew Y. Ng. 2012. Large scale distributed deep networks. In NIPS'12."},{"key":"e_1_3_2_1_22_1","volume-title":"JMLR'11","author":"Duchi John","year":"2011","unstructured":"John Duchi , Elad Hazan , and Yoram Singer . 2011 . Adaptive subgradient methods for online learning and stochastic optimization . In JMLR'11 . John Duchi, Elad Hazan, and Yoram Singer. 2011. Adaptive subgradient methods for online learning and stochastic optimization. In JMLR'11."},{"key":"e_1_3_2_1_23_1","volume-title":"NIPS'13","author":"Duchi John C.","year":"2013","unstructured":"John C. Duchi , Michael I. Jordan , and H. Brendan McMahan . 2013 . Estimation, optimization, and parallelism when data is sparse . In NIPS'13 . John C. Duchi, Michael I. Jordan, and H. Brendan McMahan. 2013. Estimation, optimization, and parallelism when data is sparse. In NIPS'13."},{"key":"e_1_3_2_1_24_1","volume-title":"JCEN'16","author":"Ge Qian","year":"2016","unstructured":"Qian Ge , Yuval Yarom , David Cock , and Gernot Heiser . 2016 . A survey of microarchitectural timing attacks and countermeasures on contemporary hardware . In JCEN'16 . Qian Ge, Yuval Yarom, David Cock, and Gernot Heiser. 2016. A survey of microarchitectural timing attacks and countermeasures on contemporary hardware. In JCEN'16."},{"key":"e_1_3_2_1_25_1","volume-title":"Anatomy of High-Performance Deep Learning Convolutions on SIMD Architectures. In SC'18","author":"Georganas Evangelos","year":"2018","unstructured":"Evangelos Georganas , Sasikanth Avancha , Kunal Banerjee , Dhiraj Kalamkar , Greg Henry , Hans Pabst , and Alexander Heinecke . 2018 . Anatomy of High-Performance Deep Learning Convolutions on SIMD Architectures. In SC'18 . Evangelos Georganas, Sasikanth Avancha, Kunal Banerjee, Dhiraj Kalamkar, Greg Henry, Hans Pabst, and Alexander Heinecke. 2018. Anatomy of High-Performance Deep Learning Convolutions on SIMD Architectures. In SC'18."},{"key":"e_1_3_2_1_26_1","volume-title":"SparseTrain: Leveraging dynamic sparsity in training DNNs on general-purpose SIMD processors. arXiv","author":"Gong Zhangxiaowen","year":"2019","unstructured":"Zhangxiaowen Gong , Houxiang Ji , Christopher Fletcher , Christopher Hughes , and Josep Torrellas . 2019. SparseTrain: Leveraging dynamic sparsity in training DNNs on general-purpose SIMD processors. arXiv ( 2019 ). Zhangxiaowen Gong, Houxiang Ji, Christopher Fletcher, Christopher Hughes, and Josep Torrellas. 2019. SparseTrain: Leveraging dynamic sparsity in training DNNs on general-purpose SIMD processors. arXiv (2019)."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"Johannes Gotzfried Moritz Eckert Sebastian Schinzel and Tilo Mller. 2017. Cache attacks on intel SGX. In EuroSec'17.  Johannes Gotzfried Moritz Eckert Sebastian Schinzel and Tilo Mller. 2017. Cache attacks on intel SGX. In EuroSec'17.","DOI":"10.1145\/3065913.3065915"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.22"},{"key":"e_1_3_2_1_29_1","volume-title":"ATC'17","author":"H\u00e4hnel Marcus","year":"2017","unstructured":"Marcus H\u00e4hnel , Weidong Cui , and Marcus Peinado . 2017 . Highresolution side channels for untrusted operating systems . In ATC'17 . Marcus H\u00e4hnel, Weidong Cui, and Marcus Peinado. 2017. Highresolution side channels for untrusted operating systems. In ATC'17."},{"key":"e_1_3_2_1_30_1","volume-title":"Deep residual learning for image recognition. arXiv","author":"He Kaiming","year":"2015","unstructured":"Kaiming He , Xiangyu Zhang , Shaoqing Ren , and Jian Sun . 2015. Deep residual learning for image recognition. arXiv ( 2015 ). Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. 2015. Deep residual learning for image recognition. arXiv (2015)."},{"volume-title":"NIPS'13","author":"Ho Qirong","key":"e_1_3_2_1_31_1","unstructured":"Qirong Ho , James Cipar , Henggang Cui , Jin Kyu Kim , Seunghak Lee , Phillip B. Gibbons , Garth A. Gibson , Gregory R. Ganger , and Eric P. Xing . 2013. More effective distributed ML via a stale synchronous parallel parameter server . In NIPS'13 . Qirong Ho, James Cipar, Henggang Cui, Jin Kyu Kim, Seunghak Lee, Phillip B. Gibbons, Garth A. Gibson, Gregory R. Ganger, and Eric P. Xing. 2013. More effective distributed ML via a stale synchronous parallel parameter server. In NIPS'13."},{"key":"e_1_3_2_1_32_1","volume-title":"Hsiang Fu Yu, and Inderjit S. Dhillon","author":"Hsieh Cho Jui","year":"2015","unstructured":"Cho Jui Hsieh , Hsiang Fu Yu, and Inderjit S. Dhillon . 2015 . PASSCoDe: Parallel asynchronous stochastic dual co-ordinate descent. In ICML '15. Cho Jui Hsieh, Hsiang Fu Yu, and Inderjit S. Dhillon. 2015. PASSCoDe: Parallel asynchronous stochastic dual co-ordinate descent. In ICML'15."},{"key":"e_1_3_2_1_33_1","volume-title":"Chiron: Privacy-preserving Machine Learning as a Service. arXiv","author":"Hunt Tyler","year":"2018","unstructured":"Tyler Hunt , Congzheng Song , Reza Shokri , Vitaly Shmatikov , and Emmett Witchel . 2018 . Chiron: Privacy-preserving Machine Learning as a Service. arXiv (2018). Tyler Hunt, Congzheng Song, Reza Shokri, Vitaly Shmatikov, and Emmett Witchel. 2018. Chiron: Privacy-preserving Machine Learning as a Service. arXiv (2018)."},{"key":"e_1_3_2_1_34_1","volume-title":"Efficient Deep Learning on Multi-Source Private Data. arXiv","author":"Hynes Nick","year":"2018","unstructured":"Nick Hynes , Raymond Cheng , and Dawn Song . 2018. Efficient Deep Learning on Multi-Source Private Data. arXiv ( 2018 ). Nick Hynes, Raymond Cheng, and Dawn Song. 2018. Efficient Deep Learning on Multi-Source Private Data. arXiv (2018)."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3297858.3304021"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3035918.3035933"},{"key":"e_1_3_2_1_38_1","volume-title":"Kingma and Jimmy Lei Ba","author":"Diederik","year":"2015","unstructured":"Diederik P. Kingma and Jimmy Lei Ba . 2015 . Adam : A method for stochastic optimization. In ICLR '15. Diederik P. Kingma and Jimmy Lei Ba. 2015. Adam: A method for stochastic optimization. In ICLR'15."},{"key":"e_1_3_2_1_39_1","unstructured":"Alex Krizhevsky. 2009. Learning multiple layers of features from tiny images. (2009).  Alex Krizhevsky. 2009. Learning multiple layers of features from tiny images. (2009)."},{"volume-title":"NIPS'12","author":"Krizhevsky Alex","key":"e_1_3_2_1_40_1","unstructured":"Alex Krizhevsky , Ilya Sutskever , and Geoffrey E. Hinton . 2012. ImageNet classification with deep convolutional neural networks . In NIPS'12 . Alex Krizhevsky, Ilya Sutskever, and Geoffrey E. Hinton. 2012. ImageNet classification with deep convolutional neural networks. In NIPS'12."},{"key":"e_1_3_2_1_41_1","volume-title":"AISTATS'17","author":"Leblond R\u00e9mi","year":"2017","unstructured":"R\u00e9mi Leblond , Fabian Pedregosa , and Simon Lacoste-Julien . 2017 . ASAGA: Asynchronous parallel saga . In AISTATS'17 . R\u00e9mi Leblond, Fabian Pedregosa, and Simon Lacoste-Julien. 2017. ASAGA: Asynchronous parallel saga. In AISTATS'17."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2640087.2644155"},{"key":"e_1_3_2_1_44_1","volume-title":"Jordan","author":"Mania Horia","year":"2017","unstructured":"Horia Mania , Xinghao Pan , Dimitris Papailiopoulos , Benjamin Recht , Kannan Ramchandran , and Michael I . Jordan . 2017 . Perturbed iterate analysis for asynchronous stochastic optimization. In SIAM '17. Horia Mania, Xinghao Pan, Dimitris Papailiopoulos, Benjamin Recht, Kannan Ramchandran, and Michael I. Jordan. 2017. Perturbed iterate analysis for asynchronous stochastic optimization. In SIAM'17."},{"key":"e_1_3_2_1_45_1","volume-title":"Savagaonkar","author":"McKeen Frank","year":"2013","unstructured":"Frank McKeen , Ilya Alexandrovich , Alex Berenzon , Carlos V. Rozas , Hisham Shafi , Vedvyas Shanbhogue , and Uday R . Savagaonkar . 2013 . Innovative Instructions and Software Model for Isolated Execution . Frank McKeen, Ilya Alexandrovich, Alex Berenzon, Carlos V. Rozas, Hisham Shafi, Vedvyas Shanbhogue, and Uday R. Savagaonkar. 2013. Innovative Instructions and Software Model for Isolated Execution."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"crossref","unstructured":"Ioannis Mitliagkas Ce Zhang Stefan Hadjis and Christopher Re. 2016. Asynchrony begets momentum with an application to deep learning. In Allerton'16.  Ioannis Mitliagkas Ce Zhang Stefan Hadjis and Christopher Re. 2016. Asynchrony begets momentum with an application to deep learning. In Allerton'16.","DOI":"10.1109\/ALLERTON.2016.7852343"},{"key":"e_1_3_2_1_47_1","volume-title":"CacheZoom: How SGX amplifies the power of cache attacks. arXiv","author":"Moghimi Ahmad","year":"2017","unstructured":"Ahmad Moghimi , Gorka Irazoqui , and Thomas Eisenbarth . 2017. CacheZoom: How SGX amplifies the power of cache attacks. arXiv ( 2017 ). Ahmad Moghimi, Gorka Irazoqui, and Thomas Eisenbarth. 2017. CacheZoom: How SGX amplifies the power of cache attacks. arXiv (2017)."},{"key":"e_1_3_2_1_48_1","volume-title":"Anthony D. Joseph, Benjamin I.P. Rubinstein, Udam Saini, Charles Sutton, J. D. Tygar, and Kai Xia.","author":"Nelson Blaine","year":"2008","unstructured":"Blaine Nelson , Marco Barreno , Fuching Jack Chi , Anthony D. Joseph, Benjamin I.P. Rubinstein, Udam Saini, Charles Sutton, J. D. Tygar, and Kai Xia. 2008 . Exploiting machine learning to subvert your spam filter. In LEET '08. Blaine Nelson, Marco Barreno, Fuching Jack Chi, Anthony D. Joseph, Benjamin I.P. Rubinstein, Udam Saini, Charles Sutton, J. D. Tygar, and Kai Xia. 2008. Exploiting machine learning to subvert your spam filter. In LEET'08."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"crossref","unstructured":"Andrew Newell Rahul Potharaju Luojie Xiang and Cristina Nita- Rotaru. 2014. On the practicality of integrity attacks on document-level sentiment analysis. In AISec'14.  Andrew Newell Rahul Potharaju Luojie Xiang and Cristina Nita- Rotaru. 2014. On the practicality of integrity attacks on document-level sentiment analysis. In AISec'14.","DOI":"10.1145\/2666652.2666661"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1007\/11856214_5"},{"key":"e_1_3_2_1_51_1","volume":"201","author":"Niu Feng","unstructured":"Feng Niu , Benjamin Recht , Christopher R\u00e9 , and Stephen J. Wright. 201 1. HOGWILD!: A lock-free approach to parallelizing Stochastic Gradient Descent. In NIPS'11. Feng Niu, Benjamin Recht, Christopher R\u00e9, and Stephen J. Wright. 2011. HOGWILD!: A lock-free approach to parallelizing Stochastic Gradient Descent. In NIPS'11.","journal-title":"Stephen J. Wright."},{"key":"e_1_3_2_1_52_1","volume-title":"Faster Asynchronous SGD. arXiv","author":"Odena Augustus","year":"2016","unstructured":"Augustus Odena . 2016. Faster Asynchronous SGD. arXiv ( 2016 ). Augustus Odena. 2016. Faster Asynchronous SGD. arXiv (2016)."},{"key":"e_1_3_2_1_53_1","unstructured":"Olga Ohrimenko Felix Schuster C\u00e9dric Fournet Sebastian Nowozin Kapil Vaswani Manuel Costa and Aastha Mehta. 2016. SGX-enabled oblivious machine learning. In Security'16.  Olga Ohrimenko Felix Schuster C\u00e9dric Fournet Sebastian Nowozin Kapil Vaswani Manuel Costa and Aastha Mehta. 2016. SGX-enabled oblivious machine learning. In Security'16."},{"key":"e_1_3_2_1_54_1","unstructured":"Olga Ohrimenko Felix Schuster C\u00e9dric Fournet Sebastian Nowozin Kapil Vaswani Manuel Costa Aastha Mehta Sebastian Nowozin Kapil Vaswani and Manuel Costa. 2016. Oblivious multi-party machine learning on trusted processors. In Security'16.  Olga Ohrimenko Felix Schuster C\u00e9dric Fournet Sebastian Nowozin Kapil Vaswani Manuel Costa Aastha Mehta Sebastian Nowozin Kapil Vaswani and Manuel Costa. 2016. Oblivious multi-party machine learning on trusted processors. In Security'16."},{"key":"e_1_3_2_1_55_1","volume-title":"NIPS'16","author":"Pan Xinghao","year":"2016","unstructured":"Xinghao Pan , Maximilian Lam , Stephen Tu , Dimitris Papailiopoulos , Ce Zhang , Michael I. Jordan , Kannan Ramchandran , Chris Re , and Benjamin Recht . 2016 . CYCLADES: Conflict-free asynchronous machine learning . In NIPS'16 . Xinghao Pan, Maximilian Lam, Stephen Tu, Dimitris Papailiopoulos, Ce Zhang, Michael I. Jordan, Kannan Ramchandran, Chris Re, and Benjamin Recht. 2016. CYCLADES: Conflict-free asynchronous machine learning. In NIPS'16."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.26"},{"key":"e_1_3_2_1_57_1","volume-title":"Raccoon: Closing Digital Side-Channels through Obfuscated Execution. In Security'15.","author":"Rane Ashay","year":"2015","unstructured":"Ashay Rane , Calvin Lin , and Mohit Tiwari . 2015 . Raccoon: Closing Digital Side-Channels through Obfuscated Execution. In Security'15. Ashay Rane, Calvin Lin, and Mohit Tiwari. 2015. Raccoon: Closing Digital Side-Channels through Obfuscated Execution. In Security'15."},{"key":"e_1_3_2_1_58_1","volume-title":"High Performance Parallel Stochastic Gradient Descent in Shared Memory. In IPDPS'16","author":"Sallinen Scott","year":"2016","unstructured":"Scott Sallinen , Nadathur Satish , Mikhail Smelyanskiy , Samantika S. Sury , and Christopher Re . 2016 . High Performance Parallel Stochastic Gradient Descent in Shared Memory. In IPDPS'16 . Scott Sallinen, Nadathur Satish, Mikhail Smelyanskiy, Samantika S. Sury, and Christopher Re. 2016. High Performance Parallel Stochastic Gradient Descent in Shared Memory. In IPDPS'16."},{"key":"e_1_3_2_1_59_1","volume-title":"Fletcher","author":"Sasy Sajin","year":"2018","unstructured":"Sajin Sasy , Sergey Gorbunov , and Christopher W . Fletcher . 2018 . Zero- Trace : Oblivious memory primitives from Intel SGX. In NDSS '18. Sajin Sasy, Sergey Gorbunov, and Christopher W. Fletcher. 2018. Zero- Trace: Oblivious memory primitives from Intel SGX. In NDSS'18."},{"key":"e_1_3_2_1_60_1","volume-title":"T-SGX: Eradicating Controlled-Channel Attacks Against Enclave Programs. In NDSS'17","author":"Shih Ming-Wei","year":"2017","unstructured":"Ming-Wei Shih , Sangho Lee , Taesoo Kim , and Marcus Peinado . 2017 . T-SGX: Eradicating Controlled-Channel Attacks Against Enclave Programs. In NDSS'17 . Ming-Wei Shih, Sangho Lee, Taesoo Kim, and Marcus Peinado. 2017. T-SGX: Eradicating Controlled-Channel Attacks Against Enclave Programs. In NDSS'17."},{"key":"e_1_3_2_1_61_1","volume-title":"Panoply: Low-TCB Linux Applications with SGX Enclaves. In NDSS'17","author":"Shinde Shweta","year":"2017","unstructured":"Shweta Shinde , Dat Le Tien , Shruti Tople , and Prateek Saxena . 2017 . Panoply: Low-TCB Linux Applications with SGX Enclaves. In NDSS'17 . Shweta Shinde, Dat Le Tien, Shruti Tople, and Prateek Saxena. 2017. Panoply: Low-TCB Linux Applications with SGX Enclaves. In NDSS'17."},{"key":"e_1_3_2_1_62_1","volume-title":"Fletcher","author":"Skarlatos Dimitrios","year":"2019","unstructured":"Dimitrios Skarlatos , Mengjia Yan , Bhargava Gopireddy , Read Sprabery , Josep Torrellas , and Christopher W . Fletcher . 2019 . MicroScope: Enabling microarchitectural replay attacks. In ISCA '19. Dimitrios Skarlatos, Mengjia Yan, Bhargava Gopireddy, Read Sprabery, Josep Torrellas, and Christopher W. Fletcher. 2019. MicroScope: Enabling microarchitectural replay attacks. In ISCA'19."},{"key":"e_1_3_2_1_63_1","volume-title":"ICLR'15","author":"Springenberg Jost Tobias","year":"2015","unstructured":"Jost Tobias Springenberg , Alexey Dosovitskiy , Thomas Brox , and Martin Riedmiller . 2015 . Striving for simplicity: The all convolutional net . In ICLR'15 . Jost Tobias Springenberg, Alexey Dosovitskiy, Thomas Brox, and Martin Riedmiller. 2015. Striving for simplicity: The all convolutional net. In ICLR'15."},{"volume-title":"CCS'17","author":"Subramanyan Pramod","key":"e_1_3_2_1_64_1","unstructured":"Pramod Subramanyan , Rohit Sinha , Ilia Lebedev , Srinivas Devadas , and Sanjit A. Seshia . 2017. A formal foundation for secure remote execution of enclaves . In CCS'17 . Pramod Subramanyan, Rohit Sinha, Ilia Lebedev, Srinivas Devadas, and Sanjit A. Seshia. 2017. A formal foundation for secure remote execution of enclaves. In CCS'17."},{"key":"e_1_3_2_1_65_1","volume-title":"Nehal Bandi, Bhushan Jain, William Jannen, Jitin John, Harry A. Kalodner, Vrushali Kulkarni, Daniela Oliveira, and Donald E. Porter.","author":"Tsai Chia Che","year":"2014","unstructured":"Chia Che Tsai , Kumar Saurabh Arora , Nehal Bandi, Bhushan Jain, William Jannen, Jitin John, Harry A. Kalodner, Vrushali Kulkarni, Daniela Oliveira, and Donald E. Porter. 2014 . Cooperation and security isolation of library OSes for multi-process applications. In EUROSYS ' 14. Chia Che Tsai, Kumar Saurabh Arora, Nehal Bandi, Bhushan Jain, William Jannen, Jitin John, Harry A. Kalodner, Vrushali Kulkarni, Daniela Oliveira, and Donald E. Porter. 2014. Cooperation and security isolation of library OSes for multi-process applications. In EUROSYS' 14."},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"crossref","unstructured":"Jo Van Bulck Frank Piessens and Raoul Strackx. 2017. SGX-step: A practical attack framework for precise enclave execution control. In SysTEX'17.  Jo Van Bulck Frank Piessens and Raoul Strackx. 2017. SGX-step: A practical attack framework for precise enclave execution control. In SysTEX'17.","DOI":"10.1145\/3152701.3152706"},{"key":"e_1_3_2_1_67_1","volume-title":"ICML'13","author":"Wan Li","year":"2013","unstructured":"Li Wan , Matthew Zeiler , Sixin Zhang , Yann LeCun , and Rob Fergus . 2013 . Regularization of neural networks using DropConnect . In ICML'13 . Li Wan, Matthew Zeiler, Sixin Zhang, Yann LeCun, and Rob Fergus. 2013. Regularization of neural networks using DropConnect. In ICML'13."},{"volume-title":"CCS'17","author":"Chen Guoxing","key":"e_1_3_2_1_68_1","unstructured":"WenhaoWang, Guoxing Chen , Xiaorui Pan , Yinqian Zhang , Xiao Feng Wang , Vincentchenguo Bindschaedler , Haixu Tang , and Carl A. Gunter . 2017. Leaky cauldron on the dark land: Understanding memory sidechannel hazards in SGX . In CCS'17 . WenhaoWang, Guoxing Chen, Xiaorui Pan, Yinqian Zhang, Xiao Feng Wang, Vincentchenguo Bindschaedler, Haixu Tang, and Carl A. Gunter. 2017. Leaky cauldron on the dark land: Understanding memory sidechannel hazards in SGX. In CCS'17."},{"key":"e_1_3_2_1_69_1","volume-title":"Parallel and Distributed Block-coordinate Frank-Wolfe Algorithms. In ICML'16","author":"Wang Yu-Xiang","year":"2016","unstructured":"Yu-Xiang Wang , Veeranjaneyulu Sadhanala , Wei Dai , Willie Neiswanger , Suvrit Sra , and Eric P Xing . 2016 . Parallel and Distributed Block-coordinate Frank-Wolfe Algorithms. In ICML'16 . Yu-Xiang Wang, Veeranjaneyulu Sadhanala, Wei Dai, Willie Neiswanger, Suvrit Sra, and Eric P Xing. 2016. Parallel and Distributed Block-coordinate Frank-Wolfe Algorithms. In ICML'16."},{"volume-title":"Raul Castro Fernandez, and Peter Pietzuch.","year":"2016","key":"e_1_3_2_1_70_1","unstructured":"PijikaWatcharapichat , Victoria Lopez Morales , Raul Castro Fernandez, and Peter Pietzuch. 2016 . Ako : Decentralised deep learning with partial gradient exchange. In SoCC '16. PijikaWatcharapichat, Victoria Lopez Morales, Raul Castro Fernandez, and Peter Pietzuch. 2016. Ako: Decentralised deep learning with partial gradient exchange. In SoCC'16."},{"key":"e_1_3_2_1_71_1","volume-title":"IJCAI'16","author":"Wei Zhang","year":"2016","unstructured":"Zhang Wei , Suyog Gupta , Xiangru Lian , and Ji Liu . 2016 . Stalenessaware async-SGD for distributed deep learning . In IJCAI'16 . Zhang Wei, Suyog Gupta, Xiangru Lian, and Ji Liu. 2016. Stalenessaware async-SGD for distributed deep learning. In IJCAI'16."},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45744-4_22"},{"key":"e_1_3_2_1_73_1","volume-title":"ICML'15","author":"Xiao Huang","year":"2015","unstructured":"Huang Xiao , Battista Biggio , Gavin Brown , Giorgio Fumera , Claudia Eckert , and Fabio Roli . 2015 . Is feature selection secure against training data poisoning? . In ICML'15 . Huang Xiao, Battista Biggio, Gavin Brown, Giorgio Fumera, Claudia Eckert, and Fabio Roli. 2015. Is feature selection secure against training data poisoning?. In ICML'15."},{"key":"e_1_3_2_1_74_1","volume-title":"SP'15","author":"Xu Yuanzhong","year":"2015","unstructured":"Yuanzhong Xu , Weidong Cui , and Marcus Peinado . 2015 . Controlledchannel attacks: Deterministic side channels for untrusted operating systems . In SP'15 . Yuanzhong Xu, Weidong Cui, and Marcus Peinado. 2015. Controlledchannel attacks: Deterministic side channels for untrusted operating systems. In SP'15."},{"volume-title":"NDSS'19","author":"Yu Jiyong","key":"e_1_3_2_1_75_1","unstructured":"Jiyong Yu , Lucas Hsiung , Mohamad El'Hajj , and Christopher W. Fletcher . 2019. Data oblivious ISA extensions for side channel-resistant and high performance computing . In NDSS'19 . Jiyong Yu, Lucas Hsiung, Mohamad El'Hajj, and Christopher W. Fletcher. 2019. Data oblivious ISA extensions for side channel-resistant and high performance computing. In NDSS'19."},{"key":"e_1_3_2_1_76_1","volume-title":"Cho Jui Hsieh, S. V.N. Vishwanathan, and Inderjit Dhillon.","author":"Yun Hyokun","year":"2014","unstructured":"Hyokun Yun , Hsiang Fu Yu , Cho Jui Hsieh, S. V.N. Vishwanathan, and Inderjit Dhillon. 2014 . NOMAD : Nonlocking, stochastic multi-machine algorithm for asynchronous and decentralized matrix completion. In VLDB '14. Hyokun Yun, Hsiang Fu Yu, Cho Jui Hsieh, S. V.N. Vishwanathan, and Inderjit Dhillon. 2014. NOMAD: Nonlocking, stochastic multi-machine algorithm for asynchronous and decentralized matrix completion. In VLDB'14."},{"key":"e_1_3_2_1_77_1","volume-title":"ADADELTA: An Adaptive Learning Rate Method. arXiv","author":"Zeiler Matthew D.","year":"2012","unstructured":"Matthew D. Zeiler . 2012 . ADADELTA: An Adaptive Learning Rate Method. arXiv (2012). Matthew D. Zeiler. 2012. ADADELTA: An Adaptive Learning Rate Method. arXiv (2012)."},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2018.00020"},{"key":"e_1_3_2_1_79_1","volume-title":"NIPS'15","author":"Zhang Sixin","year":"2015","unstructured":"Sixin Zhang , Anna Choromanska , and Yann Lecun . 2015 . Deep learning with elastic averaging SGD . In NIPS'15 . Sixin Zhang, Anna Choromanska, and Yann Lecun. 2015. Deep learning with elastic averaging SGD. In NIPS'15."},{"key":"e_1_3_2_1_80_1","volume-title":"ICML'17","author":"Zheng Shuxin","year":"2017","unstructured":"Shuxin Zheng , Qi Meng , Taifeng Wang , Wei Chen , Nenghai Yu , Zhi Ming Ma , and Tie Yan Liu . 2017 . Asynchronous stochastic gradient descent with delay compensation . In ICML'17 . Shuxin Zheng, Qi Meng, Taifeng Wang, Wei Chen, Nenghai Yu, Zhi Ming Ma, and Tie Yan Liu. 2017. Asynchronous stochastic gradient descent with delay compensation. In ICML'17."}],"event":{"name":"ASPLOS '20: Architectural Support for Programming Languages and Operating Systems","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGOPS ACM Special Interest Group on Operating Systems","SIGARCH ACM Special Interest Group on Computer Architecture","SIGBED ACM Special Interest Group on Embedded Systems"],"location":"Lausanne Switzerland","acronym":"ASPLOS '20"},"container-title":["Proceedings of the Twenty-Fifth International Conference on Architectural Support for Programming Languages and Operating Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3373376.3378462","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3373376.3378462","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3373376.3378462","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:32:59Z","timestamp":1750199579000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3373376.3378462"}},"subtitle":["Enabling Asynchronous Poisoning Attacks"],"short-title":[],"issued":{"date-parts":[[2020,3,9]]},"references-count":80,"alternative-id":["10.1145\/3373376.3378462","10.1145\/3373376"],"URL":"https:\/\/doi.org\/10.1145\/3373376.3378462","relation":{},"subject":[],"published":{"date-parts":[[2020,3,9]]},"assertion":[{"value":"2020-03-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}