Arutyun Avetisyan

Arutyun Avetisyan
Russian Academy of Sciences | RAS · Institute for System Programming of the Russian Academy of Sciences

Ph.D.

About

89
Publications
15,112
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,002
Citations
Citations since 2017
38 Research Items
558 Citations
2017201820192020202120222023020406080100120
2017201820192020202120222023020406080100120
2017201820192020202120222023020406080100120
2017201820192020202120222023020406080100120
Introduction
I am Director of the Ivannikov Institute for System Programming of the Russian Academy of Sciences (ISP RAS). I am Professor, Doctor of Physics and Mathematics, Academician of the RAS. I am Head of the System Programming Departments in Moscow State University (the Faculty of Computational Mathematics and Cybernetics), Moscow Institute of Physics and Technology, and Higher School of Economics. My research interests are Compiler technologies, software security, program analysis and transformation.

Publications

Publications (89)
Article
Full-text available
Homomorphic encryption with the ability to compute over encrypted data without access to the secret key provides benefits for the secure and powerful computation, storage, and communication of resources in the cloud. One of its important applications is fast-growing robot control systems for building lightweight, low-cost, smarter robots with intel...
Article
Full-text available
Fully Homomorphic Encryption (FHE) permits processing information in the form of ciphertexts without decryption. It can ensure the security of information in common technologies used today, such as cloud computing, the Internet of Things, and machine learning, among others. A primary disadvantage for its practical application is the low efficiency...
Article
Full-text available
Containers have emerged as a more portable and efficient solution than virtual machines for cloud infrastructure providing both a flexible way to build and deploy applications. The quality of service, security, performance, energy consumption, among others, are essential aspects of their deployment, management, and orchestration. Inappropriate reso...
Article
Full-text available
Error detection and correction codes based on redundant residue number systems are powerful tools to control and correct arithmetic processing and data transmission errors. Decoding the magnitude and location of a multiple error is a complex computational problem: it requires verifying a huge number of different possible combinations of erroneous r...
Article
Full-text available
Storage-as-a-service offers cost savings, convenience, mobility, scalability, redundant locations with a backup solution, on-demand with just-in-time capacity, syncing and updating, etc. While this type of cloud service has opened many opportunities, there are important considerations. When one uses a cloud provider, their data are no longer on the...
Chapter
Data encryption has become a vital mechanism for data protection. One of the main challenges and an important target for optimization is the encryption/decryption speed. In this paper, we propose techniques for speeding up the software performance of several important cryptographic primitives based on the Residue Number System (RNS) and Finite Ring...
Conference Paper
Full-text available
Ensuring reliable data storage in a cloud environment is a challenging problem. One of the efficient mechanisms used to solve it is the Redundant Residue Number System (RRNS) with the projection method, a commonly used mechanism for detecting errors. However, the error correction based on the projection method has exponential complexity depending o...
Conference Paper
Full-text available
The protection of data processing is emerging as an essential aspect of data analytics, machine learning, delegation of computation, Internet of Things, medical and financial analysis, smart cities, genomics, non-disclosure searching, among others. Often, they use sensitive information that cannot be protected by traditional cryptosystems. Homomorp...
Article
Full-text available
Classical machine learning modeling demands considerable computing power for internal calculations and training with big data in a reasonable amount of time. In recent years, clouds provide services to facilitate this process, but it introduces new security threats of data breaches. Modern encryption techniques ensure security and are considered as...
Article
Full-text available
Effective solving complex mathematical modeling problems is based on the use of high-performance computing. Clouds, grids, and public access supercomputer centers are commonly used platforms. Their integration into a unified environment provides possibilities for carrying out mass large-scale scientific experiments and efficient scalable resource a...
Article
Full-text available
Number comparison has long been recognized as one of the most fundamental non-modular arithmetic operations to be executed in a non-positional Residue Number System (RNS). In this paper, a new technique for designing comparators of RNS numbers represented in an arbitrary moduli set is presented. It is based on a newly introduced modified diagonal f...
Conference Paper
Full-text available
The security of data storage, transmission, and processing is emerging as an important consideration in many data analytics techniques and technologies. For instance, in machine learning, the datasets could contain sensitive information that cannot be protected by traditional encryption approaches. Homomorphic encryption schemes and secure multi-pa...
Article
Full-text available
IoT environment has a dynamic nature with high risks of confidentiality, integrity, and availability violations. The loss of information, denial of access, information leakage, collusion, technical failures, and data security breaches are difficult to predict and anticipate in advance. These types of non-stationarity are one of the main issues in t...
Chapter
Full-text available
Cloud storage is one of the most popular models of cloud computing. It benefits from a shared set of configurable resources without limitations of local data storage infrastructures. However, it brings several cybersecurity issues. In this work, we address the methods of mitigating risks of confidentiality, integrity, availability, information leak...
Book
This volume gathers the latest advances, innovations, and applications in the field of intelligent systems such as robots, cyber-physical and embedded systems, as presented by leading international researchers and engineers at the International Conference on Intelligent Technologies in Robotics (ITR), held in Moscow, Russia on October 21-23, 2019....
Article
Full-text available
Cloud storage as service is the mainstream technology used to retain digital data. However, there are significant risks for confidentiality, integrity, and availability violation associated with the loss of information, denial of access, technical failures, etc. In this article, we propose a two-level 2Lbp-RRNS scheme based on a Redundant Residue N...
Chapter
Full-text available
Cities host more than half of the population in only 2% of the earth’s surface and consume 75% of the resources extracted from the planet, this abrupt demographic growth in urban areas has worsened the level of pollution in the city, as well as the problems of road congestion. Therefore, smart cities propose the incorporation of technologies to opt...
Article
Full-text available
Properties of redundant residue number system (RRNS) are used for detecting and correcting errors during the data storing, processing and transmission. However, detection and correction of a single error require significant decoding time due to the iterative calculations needed to locate the error. In this paper, we provide a performance evaluation...
Article
Full-text available
Software developers often resort to borrowing code both within one project and from another. Due to the possible content of errors in the source code snippet, this can lead to error propagation across program. Libraries used without source code may also contain potential errors. The purpose of this work is developing methods for analyzing the natur...
Chapter
Full-text available
Security issues related to cloud computing as well as all solutions proposed in the literature are one of the high topics for research. However, there are many unsolved problems regarded to cloud storage. In this paper, we focused on an adaptive model of data storage based on Secret Sharing Schemes (SSS) and Residue Number System (RNS). We proposed...
Article
Full-text available
Knowing the mobility patterns of citizens using public transportation is an important issue for modern smart cities. Mobility information is crucial for designing and planning an urban transportation system able to provide good service to citizens. We address two relevant problems related to public transportation systems: the analysis of mobility p...
Conference Paper
Full-text available
Lightweight virtualization technology has emerged as an alternative to traditional hypervisor-based virtualization. Containers based on an operating system level virtualization have shown superior performance and more flexibility than virtual machines. Both factors encourage their fast adoption and wide use in cloud environments. Container technolo...
Article
Full-text available
Cloud security issues are important factors for data storage and processing. Apart from the existing security and reliability problems of traditional distributed computing, there are new security and reliability problems. They include attacks on a virtual machine, attacks on the synchronization keys, and so on. According to the assessment of intern...
Conference Paper
Full-text available
In this paper, we propose a new approach to the construction of computationally secure secret sharing scheme based on the simultaneous use of the Residue Number System (RNS), as the symmetric encryption, and the perfect Asmuth-Bloom secret sharing scheme. We combine the useful features of Redundant RNS to design space efficient secret sharing schem...
Article
Full-text available
In this paper, we present a Big Data analysis paradigm related to smart cities using cloud computing infrastructures. The proposed architecture follows the MapReduce parallel model implemented using the Hadoop framework. We analyse two case studies: a quality-of-service assessment of public transportation system using historical bus location data,...
Conference Paper
Full-text available
Cloud technologies are widely used for storage services. However, the single cloud cannot ensure the reliability of data. To solve the security issue, we present a multi-cloud based storage architecture called WA-RRNS that combines weighted access scheme and threshold secret sharing redundant residue number system with multiple failure detection/re...
Chapter
This paper presents the formalism for multiple level static analysis for defect detection in source code. The first level has the program and memory model that are suitable for AST-level checks. The following levels address detection of critical errors: on the second level interprocedural partially context-sensitive analysis is performed via datafl...
Conference Paper
Full-text available
Cloud data storages are functioning in the presence of the risks of confidentiality, integrity, and availability related with the loss of information, denial of access for a long time, information leakage, conspiracy and technical failures. In this paper, we provide analysis of reliable, scalable, and confidential distributed data storage based on...
Conference Paper
Full-text available
In this paper, we propose an adaptive model of data storage in a heterogeneous distributed cloud environment. Our system utilizes the methods of secret sharing schemes and error correction codes based on Redundant Residue Number System (RRNS). We consider data uploading, storing and downloading. To minimize data access, we use data transfer mechani...
Article
Full-text available
In this paper, we address energy-aware online scheduling of jobs with resource contention. We propose an optimization model and present new approach to resource allocation with job concentration taking into account types of applications and heterogeneous workloads that could include CPU-intensive, diskintensive, I/O-intensive, memory-intensive, net...
Article
A technology of the deterministic replay of an execution process in virtual machines can be used for debugging, improving reliability and robustness, software development and incident investigation (including reverse engineering of malware). The paper describes an implementation of deterministic replay for guest machines based on IA-32 in the emula...
Article
A detailed description of a method for detection of code clones is described. This method is based on the semantic analysis of programs and on new algorithms that make it scalable without affecting its accuracy. The proposed method involves two phases. In the first phase, the program dependence graph (PDG) is constructed while the program is compil...
Article
Full-text available
In this paper, we present a Big Data analysis paradigm related to smart cities using cloud computing infrastructures. The proposed architecture follows the MapReduce parallel model implemented using the Hadoop framework. We analyse two case studies: a quality-of-service assessment of public transportation system using historical bus location data,...
Conference Paper
Full-text available
In this paper, we address power aware online scheduling of jobs with resource contention. We propose an optimization model and present new approach to resource allocation with job concentration taking into account types of applications. Heterogeneous workloads include CPU intensive, disk I/O intensive, memory intensive, network I/O intensive and ot...
Conference Paper
Full-text available
In this paper, we present an energy optimization model of Cloud computing, and formulate novel energy-aware resource allocation problem that provides energy-efficiency by heterogeneous job consolidation taking into account types of applications. Data centers process heterogeneous workloads that include CPU intensive, disk I/O intensive, memory inte...
Conference Paper
Existed methods of code clones detection have some restrictions. Textual and lexical approaches cannot detect strongly modified fragments of code. Syntactic and metrics based approaches detect strong modifications with low accuracy. On the contrary, semantic approach accurately detects the cloned fragments of code with small changes as well as the...
Article
Full-text available
Nowadays OpenStack platform is a leading solution in cloud computing field. Keystone, the OpenStack Identity Service is one of its major components. In this paper we demonstrate the problem of Keystone performance degradation during constant load. In order to find source of the problem we have tested Keystone with different backends (PostgreSQL, Ma...
Article
Full-text available
This paper describes Svace, a tool for static program analysis developed at the Institute for Systems Programming, Russian Academy of Sciences. This tool allows one to find defects and potential vulnerabilities in the source program code written in C/C++ languages. The main features of the tool are simplicity of use, wide variety of supported types...
Article
Full-text available
The paper describes the methods for obfuscating C/C++ programs to prevent applying static analyzers to them. The methods are implemented within the well-known LLVM compiler infrastructure. Experimental results presenting resulting program slowdown and used memory growth are given.
Article
Full-text available
The paper describes the workflow for optimizing programs for performance targeting the fixed hardware architecture with static compilation using GCC and LLVM compilers as examples. We present some of the optimizations performed and the corresponding evaluation results. We also describe TACT, a tool for automatic compiler tuning for the given applic...
Article
Full-text available
The article proposes methods for supporting development of efficient programs for modern parallel architectures, including hybrid systems. Specialized profiling methods designed for programmers tasked with parallelizing existing code are proposed. The problem of automatic parallel code generation for hybrid architectures is discussed. In cases wher...
Article
Full-text available
Prospects for applying virtualization technology in high-performance computations on the x64 systems are studied. Principal reasons for performance degradation when parallel programs are running in virtual environments are considered. The KVM/QEMU and Palacios virtualization systems are considered in detail, with the HPC Challenge and NAS Parallel...
Conference Paper
This paper describes the two-stage compilation system based on LLVM compiler infrastructure and the performance optimizations made possible by this deployment technique.
Article
Full-text available
There is pronounced interest to cloud computing in the scientific community. However, current cloud computing offerings are rarely suitable for highperformance computing, in large part due to an overhead level of underlying virtualization components. The purpose of this paper is to propose a design and implementation of a cloud system that possesse...
Conference Paper
In this paper we explore the potential of virtualization being applied to High Performance Computing (HPC). We demonstrate the importance of proper NUMA architecture emulation when running HPC task inside virtual machines on multiple NUMA hosts. We assess KVM/QEMU and Palacios hypervisors and, with proper tuning of hypervisor (including NUMA emulat...
Conference Paper
In this paper we explore the prospects of virtualization technologies being applied to high performance computing tasks. We use an extensive set of HPC benchmarks to evaluate virtualization overhead, including HPC Challenge, NAS Parallel Benchmarks and SPEC MPI2007. We assess KVM and Palacios hypervisors and, with proper tuning of hypervisor, we re...
Article
Full-text available
In this paper we consider the problem of recovery of binary data formats and describe the format recovery system implemented in ISP RAS. First, we enumerate general approaches to this problem, their advantages and constraints: static, dynamic and network trace analysis. Here we also describe the fundamental dynamic analysis constraint (incomplete c...
Article
Full-text available
We describe the approach for instruction scheduling and software pipelining based on a two-stage extensible architecture of detecting and using the available instruction level parallelism. The detection stage is based on a selective scheduling approach and consists of a kernel supporting instruction movement with bookkeeping code creation and instr...
Article
Full-text available
We describe the approach for two-stage compilation of C/C++ programs using the LLVM compiler infrastructure that allows optimizing programs taking into account the user profile and his/her target machine features, as well as deploying programs in a cloud storage while transparently optimizing and checking for defects. The notable features of the ap...
Article
Full-text available
This paper investigates the process of binary code analysis. To achieve typical goals (such as extracting algorithm and data formats, exploiting vulnerabilities, revealing backdoors and undocumented features) a security analyst needs to explore control and data flow, reconstruct functions and variables, identify input and output data. Traditionally...
Conference Paper
Full-text available
Graphics processors are increasingly used in scientific applications due to their high computational power, which comes from hardware with multiple-level parallelism and memory hierarchy. Sparse matrix computations frequently arise in scientific applications, for example, when solving PDEs on unstructured grids. However, traditional sparse matrix a...
Article
The aim of the paper is to develop a scalable parallel program for numerical solution of the equation set that simulates processes and origin conditions of intensive atmospheric vortices (IAV) in 3D compressible atmosphere based on the theory of mesovortice turbulence by Nikolaevskii. The original system of nonlinear differential equations and its...
Conference Paper
We discuss implementing blocked sparse matrix-vector multiplication for NVIDIA GPUs. We outline an algorithm and various optimizations, and identify potential future improvements and challenging tasks. In comparison with previously published implementation, our implementation is faster on matrices having many high fill-ratio blocks but slower on ma...
Article
A technology of the iterative development of parallel programs and the corresponding development tools on the basis of the ParJava environment are considered. A benefit of the ParJava environment is that the the most part of the work can be done on a development computer using a model of the parallel program to be developed. This considerably reduc...
Article
The implementation of the ParJava development environment is considered that enables one to develop parallel applications in the modern programming language Java within the industrial standard MPI. The internal representation of the SPMD program model is described, which is constructed so as to place as much of the interpretation work of a parallel...
Article
The interaction of turbulent motion of air leads to the energy transition over the hierarchy of scales. At a specific ratio of the energy of mesoeddies and macroeddies ( E mes / E mac ) [2], an avalanche increase of intense atmospheric vortices (IAV) is observed. However, when the energy of mesoeddies is exhausted, a slow reverse process of energy...
Conference Paper
The paper considers the model of a parallel program, which can be effectively interpreted using an instrumental computer, allowing for fairly exact prediction of the actual runtime of a parallel program on a specific parallel computing system. The model has been developed for parallel Java-programs with explicit exchange of messages by means of the...
Article
A model of parallel program that can be effectively interpreted on the development computer guaranteeing the possibility of a sufficiently precise prediction of real run time for a simulated parallel program at the prescribed computer system is studied. The model is worked out for parallel programs with explicit message passing written in the Java...
Conference Paper
The goal of the paper is development of a scalable parallel program calculating the numerical solution of the system of equations modeling the processes and origin conditions of intensive atmospheric vortices (IAV) in 3D compressible atmosphere according to the theory of mesovortice turbulence by Nikolaevskiy. Original system of non-linear equatio...
Article
This paper considers a model of a parallel program that can efficiently be interpreted on an instrumental computer, providing a means for a sufficiently accurate prediction of the actual time needed for execution of the parallel program on a given parallel computational system. The model is designed for parallel programs with explicit message passi...
Conference Paper
Full-text available
We address parallel jobs scheduling problem for computational GRID systems. We concentrate on two-level hierarchy scheduling: at the first level broker allocates computational jobs to parallel computers. At the second level each computer generates schedules of the parallel jobs assigned to it by its own local scheduler. Selection, allocation strate...
Article
This chapter discusses checkpointing improvement in ParJava environment. ParJava supports development and maintenance of data parallel programs. ParJava environment provides developers of a data parallel program a wide set of tools allowing analysis of its properties. These tools allow getting precise estimates of program execution time as a functi...