{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,8]],"date-time":"2025-07-08T05:14:24Z","timestamp":1751951664236,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":52,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,3,16]],"date-time":"2020-03-16T00:00:00Z","timestamp":1584316800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["13-30491, 14-08944"],"award-info":[{"award-number":["13-30491, 14-08944"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,3,16]]},"DOI":"10.1145\/3374664.3375743","type":"proceedings-article","created":{"date-parts":[[2020,3,13]],"date-time":"2020-03-13T17:06:53Z","timestamp":1584119213000},"page":"307-318","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["A Hypothesis Testing Approach to Sharing Logs with Confidence"],"prefix":"10.1145","author":[{"given":"Yunhui","family":"Long","sequence":"first","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Champaign, IL, USA"}]},{"given":"Le","family":"Xu","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Champaign, IL, USA"}]},{"given":"Carl A.","family":"Gunter","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Champaign, IL, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,3,16]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Apache spark. https:\/\/spark.apache.org\/."},{"key":"e_1_3_2_1_2_1","first-page":"469","volume-title":"14th $$USENIX$$ Symposium on Networked Systems Design and Implementation ($$NSDI$$ 17)","author":"Alipourfard O.","year":"2017","unstructured":"O. Alipourfard, H. H. Liu, J. Chen, S. Venkataraman, M. Yu, and M. Zhang. Cherrypick: Adaptively unearthing the best cloud configurations for big data analytics. In 14th $$USENIX$$ Symposium on Networked Systems Design and Implementation ($$NSDI$$ 17), pages 469--482, 2017."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.97"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/645838.670727"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44702-4_10"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2015.20"},{"key":"e_1_3_2_1_7_1","volume-title":"Do baseline p-values follow a uniform distribution in randomised trials? PloS one, 8(10):e76010","author":"Bland M.","year":"2013","unstructured":"M. Bland. Do baseline p-values follow a uniform distribution in randomised trials? PloS one, 8(10):e76010, 2013."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2016.09.014"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508148.2485970"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243818"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2016.0103"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/1791834.1791836"},{"key":"e_1_3_2_1_13_1","volume-title":"Statistical methods for research workers","author":"Fisher R. A.","year":"2006","unstructured":"R. A. Fisher. Statistical methods for research workers. Genesis Publishing Pvt Ltd, 2006."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243834"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2013.13"},{"key":"e_1_3_2_1_16_1","volume-title":"A kernel two-sample test. Journal of Machine Learning Research, 13(Mar):723--773","author":"Gretton A.","year":"2012","unstructured":"A. Gretton, K. M. Borgwardt, M. J. Rasch, B. Sch\u00f6lkopf, and A. Smola. A kernel two-sample test. Journal of Machine Learning Research, 13(Mar):723--773, 2012."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2017.2762673"},{"key":"e_1_3_2_1_18_1","first-page":"484","volume-title":"Proceedings of the 2005 International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS 2005","author":"Kalibera T.","year":"2005","unstructured":"T. Kalibera, L. Bulej, and P. Tuma. Benchmark precision and random initial state. In Proceedings of the 2005 International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS 2005), pages 484--490, 2005."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00002"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516686"},{"key":"e_1_3_2_1_21_1","first-page":"383","volume-title":"12th $$USENIX$$ Symposium on Operating Systems Design and Implementation ($$OSDI$$ 16)","author":"Lion D.","year":"2016","unstructured":"D. Lion, A. Chiu, H. Sun, X. Zhuang, N. Grcevski, and D. Yuan. Don't get caught in the cold, warm-up your $$JVM$$: Understand and eliminate $$JVM$$ warm-up overhead in data-parallel systems. In 12th $$USENIX$$ Symposium on Operating Systems Design and Implementation ($$OSDI$$ 16), pages 383--400, 2016."},{"key":"e_1_3_2_1_22_1","first-page":"973","volume-title":"27th $$USENIX$$ Security Symposium ($$USENIX$$ Security 18)","author":"Lipp M.","year":"2018","unstructured":"M. Lipp, M. Schwarz, D. Gruss, T. Prescher, W. Haas, A. Fogh, J. Horn, S. Mangard, P. Kocher, D. Genkin, et al. Meltdown: Reading kernel memory from user space. In 27th $$USENIX$$ Security Symposium ($$USENIX$$ Security 18), pages 973--990, 2018."},{"key":"e_1_3_2_1_23_1","volume-title":"Recent Advances in Intrusion Detection","author":"Lundin E.","year":"1999","unstructured":"E. Lundin and E. Jonsson. Privacy vs. intrusion detection analysis. In Recent Advances in Intrusion Detection, 1999."},{"issue":"303","key":"e_1_3_2_1_24_1","first-page":"690","article-title":"Chi-square tests with one degree of freedom; extensions of the mantel-haenszel procedure","volume":"58","author":"Mantel N.","year":"1963","unstructured":"N. Mantel. Chi-square tests with one degree of freedom; extensions of the mantel-haenszel procedure. Journal of the American Statistical Association, 58(303):690--700, 1963.","journal-title":"Journal of the American Statistical Association"},{"key":"e_1_3_2_1_25_1","first-page":"409","volume-title":"13th $$USENIX$$ Symposium on Operating Systems Design and Implementation ($$OSDI$$ 18)","author":"Maricq A.","year":"2018","unstructured":"A. Maricq, D. Duplyakin, I. Jimenez, C. Maltzahn, R. Stutsman, and R. Ricci. Taming performance variability. In 13th $$USENIX$$ Symposium on Operating Systems Design and Implementation ($$OSDI$$ 18), pages 409--425, 2018."},{"key":"e_1_3_2_1_26_1","volume-title":"Generalized linear mixed models. Encyclopedia of biostatistics, 4","author":"McCulloch C. E.","year":"2005","unstructured":"C. E. McCulloch and J. M. Neuhaus. Generalized linear mixed models. Encyclopedia of biostatistics, 4, 2005."},{"key":"e_1_3_2_1_27_1","volume-title":"Vernacular resistance to data collection and analysis: A political theory. First Monday, 16(5)","author":"Nissenbaum H.","year":"2011","unstructured":"H. Nissenbaum and F. Brunton. Vernacular resistance to data collection and analysis: A political theory. First Monday, 16(5), 2011."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132766"},{"key":"e_1_3_2_1_29_1","first-page":"293","volume-title":"12th $$USENIX$$ Symposium on Networked Systems Design and Implementation ($$NSDI$$ 15)","author":"Ousterhout K.","year":"2015","unstructured":"K. Ousterhout, R. Rasti, S. Ratnasamy, S. Shenker, and B.-G. Chun. Making sense of performance in data analytics frameworks. In 12th $$USENIX$$ Symposium on Networked Systems Design and Implementation ($$NSDI$$ 15), pages 293--307, 2015."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517840.2517847"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2016.1"},{"key":"e_1_3_2_1_32_1","unstructured":"C. Reiss J. Wilkes and J. L. Hellerstein. Google cluster-usage traces: format"},{"volume-title":"Technical report","year":"2011","key":"e_1_3_2_1_33_1","unstructured":"schema. Technical report, Google Inc., Mountain View, CA, USA, Nov. 2011. Revised 2014--11--17 for version 2.1. Posted at https:\/\/github.com\/google\/cluster-data."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2012.6212064"},{"key":"e_1_3_2_1_35_1","volume-title":"A statistical test suite for random and pseudorandom number generators for cryptographic applications. Technical report","author":"Rukhin A.","year":"2001","unstructured":"A. Rukhin, J. Soto, J. Nechvatal, M. Smid, and E. Barker. A statistical test suite for random and pseudorandom number generators for cryptographic applications. Technical report, Booz-Allen and Hamilton Inc Mclean Va, 2001."},{"key":"e_1_3_2_1_36_1","first-page":"53","volume-title":"USENIX Security Symposium","volume":"98","author":"Schneier B.","year":"1998","unstructured":"B. Schneier and J. Kelsey. Cryptographic support for secure logs on untrusted machines. In USENIX Security Symposium, volume 98, pages 53--62, 1998."},{"issue":"39","key":"e_1_3_2_1_37_1","first-page":"63","article-title":"Characterizing machines lifecycle in google data centers","volume":"126","author":"Sebastio S.","year":"2018","unstructured":"S. Sebastio, K. S. Trivedi, and J. Alonso. Characterizing machines lifecycle in google data centers. Performance Evaluation, 126:39 -- 63, 2018.","journal-title":"Performance Evaluation"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2015-0024"},{"key":"e_1_3_2_1_39_1","volume-title":"Hilbert space embeddings and metrics on probability measures. Journal of Machine Learning Research, 11(Apr):1517--1561","author":"Sriperumbudur B. K.","year":"2010","unstructured":"B. K. Sriperumbudur, A. Gretton, K. Fukumizu, B. Sch\u00f6lkopf, and G. R. Lanckriet. Hilbert space embeddings and metrics on probability measures. Journal of Machine Learning Research, 11(Apr):1517--1561, 2010."},{"key":"e_1_3_2_1_40_1","volume-title":"Edf statistics for goodness of fit and some comparisons. Journal of the American statistical Association, 69(347):730--737","author":"Stephens M. A.","year":"1974","unstructured":"M. A. Stephens. Edf statistics for goodness of fit and some comparisons. Journal of the American statistical Association, 69(347):730--737, 1974."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.2307\/2331554"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1142\/S021848850200165X"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66332-6_13"},{"key":"e_1_3_2_1_44_1","first-page":"363","volume-title":"13th $$USENIX$$ Symposium on Networked Systems Design and Implementation ($$NSDI$$ 16)","author":"Venkataraman S.","year":"2016","unstructured":"S. Venkataraman, Z. Yang, M. Franklin, B. Recht, and I. Stoica. Ernest: efficient performance prediction for large-scale advanced analytics. In 13th $$USENIX$$ Symposium on Networked Systems Design and Implementation ($$NSDI$$ 16), pages 363--378, 2016."},{"key":"e_1_3_2_1_45_1","first-page":"5","volume-title":"NDSS","volume":"4","author":"Waters B. R.","year":"2004","unstructured":"B. R. Waters, D. Balfanz, G. Durfee, and D. K. Smetters. Building an encrypted and searchable audit log. In NDSS, volume 4, pages 5--6, 2004."},{"key":"e_1_3_2_1_46_1","volume-title":"Nov.","author":"Wilkes J.","year":"2011","unstructured":"J. Wilkes. More Google cluster data. Google research blog, Nov. 2011. Posted at http:\/\/googleresearch.blogspot.com\/2011\/11\/more-google-cluster-data.html."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2008.41"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813645"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/505202.505234"},{"key":"e_1_3_2_1_50_1","first-page":"280","volume-title":"Network Protocols, 2002. Proceedings. 10th IEEE International Conference on","author":"Xu J.","year":"2002","unstructured":"J. Xu, J. Fan, M. H. Ammar, and S. B. Moon. Prefix-preserving ip address anonymization: Measurement-based security evaluation and a new cryptography-based scheme. In Network Protocols, 2002. Proceedings. 10th IEEE International Conference on, pages 280--289. IEEE, 2002."},{"key":"e_1_3_2_1_51_1","first-page":"4","volume-title":"Proceedings of the 11th European Workshop on Systems Security","author":"Xu M.","unstructured":"M. Xu, A. Papadimitriou, A. Feldman, and A. Haeberlen. Using differential privacy to efficiently mitigate side channels in distributed analytics. In Proceedings of the 11th European Workshop on Systems Security, page 4. ACM, 2018."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2213836.2213910"}],"event":{"name":"CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"New Orleans LA USA","acronym":"CODASPY '20"},"container-title":["Proceedings of the Tenth ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3374664.3375743","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3374664.3375743","content-type":"text\/html","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3374664.3375743","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3374664.3375743","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:33:08Z","timestamp":1750199588000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3374664.3375743"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3,16]]},"references-count":52,"alternative-id":["10.1145\/3374664.3375743","10.1145\/3374664"],"URL":"https:\/\/doi.org\/10.1145\/3374664.3375743","relation":{},"subject":[],"published":{"date-parts":[[2020,3,16]]},"assertion":[{"value":"2020-03-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}