Loading…
VAP: The Vulnerability-Adaptive Protection Paradigm Toward Reliable Autonomous Machines
The next ubiquitous computing platform, following personal computers and smartphones, is poised to be inherently autonomous, encompassing technologies like drones, robots, and self-driving cars. Ensuring reliability for these autonomous machines is critical. However, current resiliency solutions mak...
Saved in:
Published in: | arXiv.org 2024-09 |
---|---|
Main Authors: | , , , , , |
Format: | Article |
Language: | English |
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | |
container_end_page | |
container_issue | |
container_start_page | |
container_title | arXiv.org |
container_volume | |
creator | Wan, Zishen Gan, Yiming Yu, Bo Liu, Shaoshan Raychowdhury, Arijit Zhu, Yuhao |
description | The next ubiquitous computing platform, following personal computers and smartphones, is poised to be inherently autonomous, encompassing technologies like drones, robots, and self-driving cars. Ensuring reliability for these autonomous machines is critical. However, current resiliency solutions make fundamental trade-offs between reliability and cost, resulting in significant overhead in performance, energy consumption, and chip area. This is due to the "one-size-fits-all" approach commonly used, where the same protection scheme is applied throughout the entire software computing stack. This paper presents the key insight that to achieve high protection coverage with minimal cost, we must leverage the inherent variations in robustness across different layers of the autonomous machine software stack. Specifically, we demonstrate that various nodes in this complex stack exhibit different levels of robustness against hardware faults. Our findings reveal that the front-end of an autonomous machine's software stack tends to be more robust, whereas the back-end is generally more vulnerable. Building on these inherent robustness differences, we propose a Vulnerability-Adaptive Protection (VAP) design paradigm. In this paradigm, the allocation of protection resources - whether spatially (e.g., through modular redundancy) or temporally (e.g., via re-execution) - is made inversely proportional to the inherent robustness of tasks or algorithms within the autonomous machine system. Experimental results show that VAP provides high protection coverage while maintaining low overhead in both autonomous vehicle and drone systems. |
format | article |
fullrecord | <record><control><sourceid>proquest</sourceid><recordid>TN_cdi_proquest_journals_3111723765</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>3111723765</sourcerecordid><originalsourceid>FETCH-proquest_journals_31117237653</originalsourceid><addsrcrecordid>eNqNyk0LgjAcgPERBEn5HQadBbelRjeJoksgIXaUqf9yMjfbS9G3r0MfoNNz-D0zFFDGSLTdULpAobVDHMc0zWiSsABdq7zY4bIHXHmpwPBGSOHeUd7xyYkn4MJoB60TWuGCG96J-4hL_eKmwxeQgjcScO6dVnrU3uIzb3uhwK7Q_MalhfDXJVofD-X-FE1GPzxYVw_aG_WlmhFCMsqyNGH_XR8pLEFq</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>3111723765</pqid></control><display><type>article</type><title>VAP: The Vulnerability-Adaptive Protection Paradigm Toward Reliable Autonomous Machines</title><source>Publicly Available Content Database</source><creator>Wan, Zishen ; Gan, Yiming ; Yu, Bo ; Liu, Shaoshan ; Raychowdhury, Arijit ; Zhu, Yuhao</creator><creatorcontrib>Wan, Zishen ; Gan, Yiming ; Yu, Bo ; Liu, Shaoshan ; Raychowdhury, Arijit ; Zhu, Yuhao</creatorcontrib><description>The next ubiquitous computing platform, following personal computers and smartphones, is poised to be inherently autonomous, encompassing technologies like drones, robots, and self-driving cars. Ensuring reliability for these autonomous machines is critical. However, current resiliency solutions make fundamental trade-offs between reliability and cost, resulting in significant overhead in performance, energy consumption, and chip area. This is due to the "one-size-fits-all" approach commonly used, where the same protection scheme is applied throughout the entire software computing stack. This paper presents the key insight that to achieve high protection coverage with minimal cost, we must leverage the inherent variations in robustness across different layers of the autonomous machine software stack. Specifically, we demonstrate that various nodes in this complex stack exhibit different levels of robustness against hardware faults. Our findings reveal that the front-end of an autonomous machine's software stack tends to be more robust, whereas the back-end is generally more vulnerable. Building on these inherent robustness differences, we propose a Vulnerability-Adaptive Protection (VAP) design paradigm. In this paradigm, the allocation of protection resources - whether spatially (e.g., through modular redundancy) or temporally (e.g., via re-execution) - is made inversely proportional to the inherent robustness of tasks or algorithms within the autonomous machine system. Experimental results show that VAP provides high protection coverage while maintaining low overhead in both autonomous vehicle and drone systems.</description><identifier>EISSN: 2331-8422</identifier><language>eng</language><publisher>Ithaca: Cornell University Library, arXiv.org</publisher><subject>Algorithms ; Autonomous cars ; Energy consumption ; Personal computers ; Redundancy ; Reliability ; Robustness (mathematics) ; Software ; Ubiquitous computing</subject><ispartof>arXiv.org, 2024-09</ispartof><rights>2024. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://www.proquest.com/docview/3111723765?pq-origsite=primo$$EHTML$$P50$$Gproquest$$Hfree_for_read</linktohtml><link.rule.ids>776,780,25731,36989,44566</link.rule.ids></links><search><creatorcontrib>Wan, Zishen</creatorcontrib><creatorcontrib>Gan, Yiming</creatorcontrib><creatorcontrib>Yu, Bo</creatorcontrib><creatorcontrib>Liu, Shaoshan</creatorcontrib><creatorcontrib>Raychowdhury, Arijit</creatorcontrib><creatorcontrib>Zhu, Yuhao</creatorcontrib><title>VAP: The Vulnerability-Adaptive Protection Paradigm Toward Reliable Autonomous Machines</title><title>arXiv.org</title><description>The next ubiquitous computing platform, following personal computers and smartphones, is poised to be inherently autonomous, encompassing technologies like drones, robots, and self-driving cars. Ensuring reliability for these autonomous machines is critical. However, current resiliency solutions make fundamental trade-offs between reliability and cost, resulting in significant overhead in performance, energy consumption, and chip area. This is due to the "one-size-fits-all" approach commonly used, where the same protection scheme is applied throughout the entire software computing stack. This paper presents the key insight that to achieve high protection coverage with minimal cost, we must leverage the inherent variations in robustness across different layers of the autonomous machine software stack. Specifically, we demonstrate that various nodes in this complex stack exhibit different levels of robustness against hardware faults. Our findings reveal that the front-end of an autonomous machine's software stack tends to be more robust, whereas the back-end is generally more vulnerable. Building on these inherent robustness differences, we propose a Vulnerability-Adaptive Protection (VAP) design paradigm. In this paradigm, the allocation of protection resources - whether spatially (e.g., through modular redundancy) or temporally (e.g., via re-execution) - is made inversely proportional to the inherent robustness of tasks or algorithms within the autonomous machine system. Experimental results show that VAP provides high protection coverage while maintaining low overhead in both autonomous vehicle and drone systems.</description><subject>Algorithms</subject><subject>Autonomous cars</subject><subject>Energy consumption</subject><subject>Personal computers</subject><subject>Redundancy</subject><subject>Reliability</subject><subject>Robustness (mathematics)</subject><subject>Software</subject><subject>Ubiquitous computing</subject><issn>2331-8422</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><sourceid>PIMPY</sourceid><recordid>eNqNyk0LgjAcgPERBEn5HQadBbelRjeJoksgIXaUqf9yMjfbS9G3r0MfoNNz-D0zFFDGSLTdULpAobVDHMc0zWiSsABdq7zY4bIHXHmpwPBGSOHeUd7xyYkn4MJoB60TWuGCG96J-4hL_eKmwxeQgjcScO6dVnrU3uIzb3uhwK7Q_MalhfDXJVofD-X-FE1GPzxYVw_aG_WlmhFCMsqyNGH_XR8pLEFq</recordid><startdate>20240930</startdate><enddate>20240930</enddate><creator>Wan, Zishen</creator><creator>Gan, Yiming</creator><creator>Yu, Bo</creator><creator>Liu, Shaoshan</creator><creator>Raychowdhury, Arijit</creator><creator>Zhu, Yuhao</creator><general>Cornell University Library, arXiv.org</general><scope>8FE</scope><scope>8FG</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>HCIFZ</scope><scope>L6V</scope><scope>M7S</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PTHSS</scope></search><sort><creationdate>20240930</creationdate><title>VAP: The Vulnerability-Adaptive Protection Paradigm Toward Reliable Autonomous Machines</title><author>Wan, Zishen ; Gan, Yiming ; Yu, Bo ; Liu, Shaoshan ; Raychowdhury, Arijit ; Zhu, Yuhao</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-proquest_journals_31117237653</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Algorithms</topic><topic>Autonomous cars</topic><topic>Energy consumption</topic><topic>Personal computers</topic><topic>Redundancy</topic><topic>Reliability</topic><topic>Robustness (mathematics)</topic><topic>Software</topic><topic>Ubiquitous computing</topic><toplevel>online_resources</toplevel><creatorcontrib>Wan, Zishen</creatorcontrib><creatorcontrib>Gan, Yiming</creatorcontrib><creatorcontrib>Yu, Bo</creatorcontrib><creatorcontrib>Liu, Shaoshan</creatorcontrib><creatorcontrib>Raychowdhury, Arijit</creatorcontrib><creatorcontrib>Zhu, Yuhao</creatorcontrib><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>Materials Science & Engineering Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Engineering Collection</collection><collection>Engineering Database</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Engineering collection</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Wan, Zishen</au><au>Gan, Yiming</au><au>Yu, Bo</au><au>Liu, Shaoshan</au><au>Raychowdhury, Arijit</au><au>Zhu, Yuhao</au><format>book</format><genre>document</genre><ristype>GEN</ristype><atitle>VAP: The Vulnerability-Adaptive Protection Paradigm Toward Reliable Autonomous Machines</atitle><jtitle>arXiv.org</jtitle><date>2024-09-30</date><risdate>2024</risdate><eissn>2331-8422</eissn><abstract>The next ubiquitous computing platform, following personal computers and smartphones, is poised to be inherently autonomous, encompassing technologies like drones, robots, and self-driving cars. Ensuring reliability for these autonomous machines is critical. However, current resiliency solutions make fundamental trade-offs between reliability and cost, resulting in significant overhead in performance, energy consumption, and chip area. This is due to the "one-size-fits-all" approach commonly used, where the same protection scheme is applied throughout the entire software computing stack. This paper presents the key insight that to achieve high protection coverage with minimal cost, we must leverage the inherent variations in robustness across different layers of the autonomous machine software stack. Specifically, we demonstrate that various nodes in this complex stack exhibit different levels of robustness against hardware faults. Our findings reveal that the front-end of an autonomous machine's software stack tends to be more robust, whereas the back-end is generally more vulnerable. Building on these inherent robustness differences, we propose a Vulnerability-Adaptive Protection (VAP) design paradigm. In this paradigm, the allocation of protection resources - whether spatially (e.g., through modular redundancy) or temporally (e.g., via re-execution) - is made inversely proportional to the inherent robustness of tasks or algorithms within the autonomous machine system. Experimental results show that VAP provides high protection coverage while maintaining low overhead in both autonomous vehicle and drone systems.</abstract><cop>Ithaca</cop><pub>Cornell University Library, arXiv.org</pub><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | EISSN: 2331-8422 |
ispartof | arXiv.org, 2024-09 |
issn | 2331-8422 |
language | eng |
recordid | cdi_proquest_journals_3111723765 |
source | Publicly Available Content Database |
subjects | Algorithms Autonomous cars Energy consumption Personal computers Redundancy Reliability Robustness (mathematics) Software Ubiquitous computing |
title | VAP: The Vulnerability-Adaptive Protection Paradigm Toward Reliable Autonomous Machines |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-08T06%3A08%3A21IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=document&rft.atitle=VAP:%20The%20Vulnerability-Adaptive%20Protection%20Paradigm%20Toward%20Reliable%20Autonomous%20Machines&rft.jtitle=arXiv.org&rft.au=Wan,%20Zishen&rft.date=2024-09-30&rft.eissn=2331-8422&rft_id=info:doi/&rft_dat=%3Cproquest%3E3111723765%3C/proquest%3E%3Cgrp_id%3Ecdi_FETCH-proquest_journals_31117237653%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=3111723765&rft_id=info:pmid/&rfr_iscdi=true |