Download as pdf or txt
Download as pdf or txt
You are on page 1of 5

practice

DOI:10.1145/ 3024928
such as the DAO vulnerability in June

Article development led by
queue.acm.org
2016—have captured the public imagi-
nation and the eye of the popular press.
In the meantime, academics have been
Expert-curated guides to busy, delivering new results in main-
the best of CS research. taining anonymity, ensuring usability,
detecting errors, and reasoning about

Research
decentralized markets, all through the
lens of these modern cryptocurrency
systems. It is a pleasure having two
academic experts deliver the latest up-

for Practice:
dates from the burgeoning body of aca-
demic research on this subject.
Next, Song Han provides an over-
view of hardware trends related to an-

Cryptocurrencies,
other long-studied academic problem
that has recently seen an explosion in
popularity: deep learning. Fueled by
large amounts of training data and in-

Blockchains, and
expensive parallel and scale-out com-
pute, deep-learning-model architec-
tures have seen a massive resurgence

Smart Contracts;
of interest based on their excellent
performance on traditionally diffi-
cult tasks such as image recognition.

Hardware for
These deep networks are compute-
intensive to train and evaluate, and
many of the best minds in computer

Deep Learning
systems (for example, the team that
developed MapReduce) and AI are
working to improve them. As a result,
Song has provided a fantastic over-
view of recent advances devoted to
using hardware and hardware-aware
techniques to compress networks,
improve their performance, and re-
duce their often large amounts of en-
ergy consumption.
As always, our goal in this column is
OUR FOURTH INSTALLMENT of Research for Practice covers to allow our readers to become experts
in the latest topics in computer science
two of the hottest topics in computer science research research in a weekend afternoon’s
and practice: cryptocurrencies and deep learning. worth of reading. To facilitate this
First, Arvind Narayanan and Andrew Miller, co- process, as always, we have provided
open access to the ACM Digital Library
authors of the increasingly popular open access Bitcoin for the relevant citations from these
textbook, provide an overview of ongoing research in selections so you can read the research
results in full. Please enjoy!
cryptocurrencies. This is a topic with a long history —Peter Bailis
in the academic literature that has recently come to
prominence with the rise of Bitcoin, blockchains, and Peter Bailis is an assistant professor of computer science
at Stanford University. His research in the Future Data
similar implementations of advanced, decentralized Systems group (futuredata.stanford.edu/) focuses on
the design and implementation of next-generation data-
protocols. These developments—and colorful exploits intensive systems.

48 COMMUNICATIO NS O F TH E AC M | M AY 201 7 | VO L . 60 | NO. 5


even creating a new address for each
transaction. But this paper demon-
strates that “address clustering” can
be very effective, applying a combina-
tion of heuristics to link together all the
pseudo-identities controlled by an indi- Bitcoin itself
Cryptocurrencies, Blockchains,
and Smart Contracts
vidual or entity.
Anonymity in cryptocurrencies is a
came from
By Arvind Narayanan matter of not just personal privacy, but outside academia.
and Andrew Miller
Research into cryptocurrencies has a
also confidentiality for enterprises. Giv-
en advanced transaction graph analysis
Researchers,
decades-long pedigree in academia, techniques, without precautions, the however, have
but decentralized cryptocurrencies
(starting with Bitcoin in 2009) have
blockchain could easily reveal cash flow
and other financial details.
embraced
taken the world by storm. Aside from cryptocurrencies
being a payment mechanism “native
to the Internet,” the underlying block-
Sasson, E.B. et al.
Zerocash: Decentralized anonymous payments
with gusto and
chain technology is touted as a way from Bitcoin. In Proceedings of the IEEE
Symposium on Security and Privacy, 2014.
have contributed
to store and transact everything from
property records to certificates for art http://zerocash-project.org/media/pdf/
zerocash-extended-20140518.pdf.
important insights.
and jewelry. Much of this innovation
happens in the broader hobbyist and There are many different proposals
entrepreneurial communities (with for improving the privacy of crypto-
increasing interest from established currencies. These range from Bitcoin-
industry players); Bitcoin itself came compatible methods of “mixing” (or
from outside academia. Researchers, “joining”) coins with each other, to de-
however, have embraced cryptocur- signs for entirely new cryptocurrency
rencies with gusto and have contrib- protocols that build in privacy from
uted important insights. the beginning. Perhaps the most radi-
Here we have selected three promi- cal proposal is Zerocash, an alternative
nent areas of inquiry from this young cryptocurrency design that uses cut-
field. Our selections of research papers ting-edge cryptography to hide all in-
within each area focus on relevance to formation from the blockchain except
practitioners and avoid such areas as for the existence of transactions; each
scalability that are of interest primar- transaction is accompanied by a cryp-
ily to cryptocurrency designers. Over- tographic, publicly verifiable proof of
all, the research not only exposes im- its own validity. Roughly, the proof en-
portant limitations and pitfalls of the sures that the amount being spent is
technology, but also suggests ways to no more than the amount available to
overcome them. spend from that address. The paper is
long and intricate, and the underlying
Anonymity, Privacy, mathematical assumptions are fairly
and Confidentiality new by cryptographic standards. But
this fact itself is food for thought: to
Meiklejohn, S. et al. what extent does the security of a cryp-
A fistful of Bitcoins: Characterizing payments tocurrency depend on the ability to
among men with no names. In Proceedings of comprehend its workings?
the Internet Measurement Conference, 2012,
127–140. https://www.usenix.org/system/files/
Endpoint Security
login/articles/03_meiklejohn-online.pdf.
The Achilles’ heel of cryptocurrencies
Bitcoin exists in a state of tension be- has been the security of endpoints, or
tween anonymity (in the sense that real the devices that store the private keys
identities are not required to use the sys- that control one’s coins. The crypto-
tem) and traceability (in that all transac- currency ecosystem has been plagued
tions are recorded on the blockchain, by thefts and losses resulting from
which is a public, immutable, and lost devices, corrupted hard drives,
global ledger). In practice, the privacy malware, and targeted intrusions.
of vanilla Bitcoin comes from obscurity: Unlike fiat currencies, cryptocurrency
users may create as many addresses as theft is instantaneous, irreversible,
they like and shuffle their coins around, and typically anonymous.

MAY 2 0 1 7 | VO L. 6 0 | N O. 5 | C OM M U N IC AT ION S OF T HE ACM 49


practice

called The DAO suffered a theft of an


Eskandari, S., Barrera, D., estimated $50 million thanks to a litany
Stobert, E., Clark, J.
A first look at the usability of Bitcoin key manage-
of security problems. (Ultimately, this
ment. Workshop on Usable Security, 2015. theft was reversed by a networkwide

Prediction markets http://users.encs.concordia.ca/~clark/


papers/2015_usec.pdf.
“hard-fork” upgrade.) The authors
study four classes of security vulnerabil-
allow market This paper studies six different ways
to store and protect one’s keys, and
ities in Ethereum smart contracts, and
build a tool to detect them based on a
participants to evaluates them on 10 different crite- formalization of Ethereum’s operation-
trade shares in ria encompassing security, usability,
and deployability. No solution fares
al semantics. They find that thousands
of contracts on the blockchain are po-
future events (such strictly better than the rest. Users may tentially vulnerable to these bugs.
as “Will the U.K. benefit considerably from outsourc-
ing the custody of their keys to hosted
initiate withdrawal wallets, which sets up a tension with
Clark, J., Bonneau, J., Felten, E.W., Kroll,
J.A., Miller, A. and Narayanan, A.
from the E.U. in Bitcoin’s decentralized ethos. Turn-
ing to Bitcoin clients and tools, the
On decentralizing prediction markets and order
books. Workshop on the Economics of Informa-
the next year?”) authors find problems with the meta- tion Security, State College, PA, 2014.
http://www.econinfosec.org/archive/weis2014/
and turn a profit phors and abstractions that they use.
This is a ripe area for research and
papers/Clark-WEIS2014.pdf.

from accurate deployment, and innovation in usable


key management will have benefits far
If smart-contract technology can over-
come these hiccups, it could enable
predictions. beyond the world of cryptocurrencies. decentralized commerce—that is,
various sorts of markets without inter-
Smart Contracts mediaries controlling them. This pa-
One of the hottest areas within crypto- per studies how one type of market—
currencies, so-called smart contracts, namely, a prediction market—could
are agreements between two or more be decentralized. Prediction markets
parties that can be automatically en- allow market participants to trade
forced without the need for an inter- shares in future events (such as “Will
mediary. For example, a vending ma- the U.K. initiate withdrawal from the
chine can be seen as a smart contract E.U. in the next year?”) and turn a profit
that enforces the rule that an item will from accurate predictions. In this con-
be dispensed if and only if suitable text the authors grapple with various
coins are deposited. Today’s lead- solutions to a prominent limitation of
ing smart-contract platform is called smart contracts: they can access only
Ethereum, whose blockchain stores data that is on the blockchain, but
long-lived programs, called contracts, most interesting data lives outside it.
and their associated state, which in- The paper also studies decentralized
cludes both data and currency. These order books, another ingredient of de-
programs are immutable just as data centralized markets.
on the blockchain is, and users may
interact with them with the guarantee Overcoming the Pitfalls
that the program will execute exactly Cryptocurrencies implement many
as specified. For example, a smart con- important ideas: digital payments
tract may promise a reward to anyone with no central authority, immutable
who writes two integers into the block- global ledgers, and long-running pro-
chain whose product is RSA-2048—a grams that have a form of agency and
self-enforcing factorization bounty! wield money. These ideas are novel,
yet based on sound principles. En-
trepreneurs, activists, and research-
Luu, L., Chu, D-H., Olickel, H.,
Saxena, P., Hobor, A.
ers have envisioned many powerful
Making smart contracts smarter. applications of this technology, but
In Proceedings of ACM SIGSAC Conference predictions of a swift revolution have
on Computer and Communications Security, so far proved unfounded. Instead, the
2016, 254–269. community has begun the long, hard
https://dl.acm.org/citation.cfm?id=2978309.
work of integrating the technology
Unfortunately, expressive program- into Internet infrastructure and ex-
ming languages are difficult to reason isting institutions. As we have seen,
about. An ambitious smart contract there are pitfalls for the unwary in

50 COMMUNICATIO NS O F TH E AC M | M AY 201 7 | VO L . 60 | NO. 5


practice

using and applying cryptocurrencies: curacy. On top of the compression al- on Architectural Support for Programming
privacy, security, and interfacing with gorithm, EIE is a hardware accelerator Languages and Operating Systems, 2014.
http://pages.saclay.inria.fr/olivier.temam/files/
the real world. These will be fertile ar- that works directly on the compressed
eval/CDSWWCT14.pdf.
eas of research and development in model and solves the problem of ir-
the years to come. regular computation patterns (sparsity Recent state-of-the-art CNNs and
and indirection) brought about by the DNNs are characterized by their large
Arvind Narayanan is an assistant professor of computer compression algorithm. EIE efficiently sizes. With layers of thousands of neu-
science at Princeton, where he leads a research team
investigating the security, anonymity, and stability parallelizes the compressed model rons and millions of synapses, they
of cryptocurrencies as well as novel applications onto multiple processing elements and place a special emphasis on interac-
of blockchains. He also leads the Princeton Web
Transparency and Accountability Project, to uncover how proposes an efficient way of partition- tions with memory. DianNao is an
companies collect and use our personal information.
ing and load balancing both the storage accelerator for large-scale CNNs and
Andrew Miller is an assistant professor in Electrical and the computation. This achieves a DNNs, with a special emphasis on
and Computer Engineering at the University of Illinois
at Urbana-Champaign. He is an associate director of the
speedup of 189/13 times and an energy the impact of memory on accelerator
Initiative for Cryptocurrencies and Contracts (IC3) at efficiency improvement of 24,000/3,400 design, performance, and energy. It
Cornell and an advisor to the Zcash project.
times over a modern CPU/GPU. takes advantage of dedicated storage,
which is key for achieving good perfor-
Hardware For Deep Optimized Dataflow mance and power. By carefully exploit-
Learning ing the locality properties of neural
By Song Han network models, and by introducing
Chen, Y.-H., Emer, J., Sze, V.
Deep neural networks Eyeriss: A spatial architecture for energy-
storage structures custom designed
(DNNs) have evolved to efficient dataflow for convolutional neural to take advantage of these proper-
a state-of-the-art tech- networks. In Proceedings of the International ties, DianNao shows it is possible to
nique for machine-learning tasks Symposium on Computer Architecture, design a machine-learning accelera-
ranging from computer vision to 2016. https://www.researchgate.net/ tor capable of high performance in a
publication/301891800_Eyeriss_A_Spatial_
speech recognition to natural lan- Architecture_for_Energy-Efficient_Dataflow_ very small footprint. It is possible to
guage processing. Deep-learning for_Convolutional_Neural_Networks. achieve a speedup of 117.87 times and
algorithms, however, are both com- an energy reduction of 21.08 times
putationally and memory intensive, Deep-learning algorithms are memory over a 128-bit 2GHz SIMD (single in-
making them power-hungry to deploy intensive, and accessing memory con- struction, multiple data) core with a
on embedded systems. Running deep- sumes energy more than two orders of normal cache hierarchy.
learning algorithms in real time at magnitude more than ALU (arithmetic
subwatt power consumption would be logic unit) operations. Thus, it’s criti- Looking Forward
ideal in embedded devices, but gener- cal to develop dataflow that can reduce Specialized hardware will be a key
al-purpose hardware is not providing memory reference. Eyeriss presents a solution to make deep-learning al-
satisfying energy efficiency to deploy novel dataflow called RS (row-station- gorithms faster and more energy ef-
such a DNN. The three papers pre- ary) that minimizes data-movement ficient. Reducing memory footprint
sented here suggest ways to solve this energy consumption on a spatial ar- is the most critical issue. The papers
problem with specialized hardware. chitecture. This is realized by exploit- presented here demonstrate three
ing local data reuse of filter weights and ways to solve this problem: optimize
The Compressed Model feature map pixels (that is, activations) in both algorithm and hardware and
the high-dimensional convolutions, and accelerate the compressed model;
by minimizing data movement of partial use an optimized dataflow to sched-
Han, S., Liu, X., Mao, H., Pu, J., Pedram, A.,
Horowitz, M.A., Dally, W.J. sum accumulations. Unlike dataflows ule the data movements; and design
EIE: Efficient inference engine on compressed used in existing designs, which reduce dedicated memory buffers for the
deep neural network. In Proceedings of only certain types of data movement, the weights, input activations, and out-
the International Symposium on Computer proposed RS dataflow can adapt to dif- put activations. We can look forward
Architecture, 2016.
ferent CNN (convolutional neural net- to seeing more artificial intelligence
https://arxiv.org/pdf/1602.01528v2.pdf.
work) shape configurations and reduce applications benefit from such hard-
This work is a combination of algo- all types of data movement through ware optimizations, putting AI every-
rithm optimization and hardware spe- maximum use of PE (processing engine) where, in every device in our lives.
cialization. EIE (efficient inference local storage, direct inter-PE communi-
engine) starts with a deep-learning- cation, and spatial parallelism. Song Han is a Ph.D. student at Stanford University,
Stanford, CA. He proposed deep compression that can
model compression algorithm that first compress state-of-the art CNNs by 10–49 times and
prunes neural networks by 9–13 times Small-Footprint Accelerator designed EIE (efficient inference engine), a hardware
architecture that does inference directly on the
without hurting accuracy, which leads compressed sparse model.
to both computation saving and mem-
ory saving; next, using pruning plus Chen, T., Wang, J., Du, Z., Wu, C.,
Sun, N., Chen, Y., Temam, O.
weight sharing and Huffman coding, DianNao: A small-footprint high-throughput
EIE further compresses the network accelerator for ubiquitous machine-learning. In Copyright held by owner(s)/authors.
35–49 times, again without hurting ac- Proceedings of the International Conference Publication rights licensed to ACM. $15.00

MAY 2 0 1 7 | VO L. 6 0 | N O. 5 | C OM M U N IC AT ION S OF T HE ACM 51


Copyright of Communications of the ACM is the property of Association for Computing
Machinery and its content may not be copied or emailed to multiple sites or posted to a
listserv without the copyright holder's express written permission. However, users may print,
download, or email articles for individual use.

You might also like