Backdoor attacks and countermeasures on deep learning: A comprehensive review
This work provides the community with a timely comprehensive review of backdoor attacks
and countermeasures on deep learning. According to the attacker's capability and affected …
and countermeasures on deep learning. According to the attacker's capability and affected …
The future of FPGA acceleration in datacenters and the cloud
In this article, we survey existing academic and commercial efforts to provide Field-
Programmable Gate Array (FPGA) acceleration in datacenters and the cloud. The goal is a …
Programmable Gate Array (FPGA) acceleration in datacenters and the cloud. The goal is a …
What serverless computing is and should become: The next phase of cloud computing
What serverless computing is and should become: the next phase of cloud computing Page 1
76 COMMUNICATIONS OF THE ACM | MAY 2021 | VOL. 64 | NO. 5 contributed articles IN …
76 COMMUNICATIONS OF THE ACM | MAY 2021 | VOL. 64 | NO. 5 contributed articles IN …
Firecracker: Lightweight virtualization for serverless applications
Serverless containers and functions are widely used for deploying and managing software
in the cloud. Their popularity is due to reduced cost of operations, improved utilization of …
in the cloud. Their popularity is due to reduced cost of operations, improved utilization of …
Cloud programming simplified: A berkeley view on serverless computing
Serverless cloud computing handles virtually all the system administration operations
needed to make it easier for programmers to use the cloud. It provides an interface that …
needed to make it easier for programmers to use the cloud. It provides an interface that …
[HTML][HTML] How to factor 2048 bit RSA integers in 8 hours using 20 million noisy qubits
We significantly reduce the cost of factoring integers and computing discrete logarithms in
finite fields on a quantum computer by combining techniques from Shor 1994, Griffiths-Niu …
finite fields on a quantum computer by combining techniques from Shor 1994, Griffiths-Niu …
Plundervolt: Software-based fault injection attacks against Intel SGX
Dynamic frequency and voltage scaling features have been introduced to manage ever-
growing heat and power consumption in modern processors. Design restrictions ensure …
growing heat and power consumption in modern processors. Design restrictions ensure …
Spectre attacks: Exploiting speculative execution
Modern processors use branch prediction and speculative execution to maximize
performance. For example, if the destination of a branch depends on a memory value that is …
performance. For example, if the destination of a branch depends on a memory value that is …
LVI: Hijacking transient execution through microarchitectural load value injection
The recent Spectre attack first showed how to inject incorrect branch targets into a victim
domain by poisoning microarchitectural branch prediction history. In this paper, we …
domain by poisoning microarchitectural branch prediction history. In this paper, we …
A modern primer on processing in memory
Modern computing systems are overwhelmingly designed to move data to computation. This
design choice goes directly against at least three key trends in computing that cause …
design choice goes directly against at least three key trends in computing that cause …