Backdoor attacks and countermeasures on deep learning: A comprehensive review

Y Gao, BG Doan, Z Zhang, S Ma, J Zhang, A Fu… - arxiv preprint arxiv …, 2020 - arxiv.org
This work provides the community with a timely comprehensive review of backdoor attacks
and countermeasures on deep learning. According to the attacker's capability and affected …

The future of FPGA acceleration in datacenters and the cloud

C Bobda, JM Mbongue, P Chow, M Ewais… - ACM Transactions on …, 2022 - dl.acm.org
In this article, we survey existing academic and commercial efforts to provide Field-
Programmable Gate Array (FPGA) acceleration in datacenters and the cloud. The goal is a …

What serverless computing is and should become: The next phase of cloud computing

J Schleier-Smith, V Sreekanti, A Khandelwal… - Communications of the …, 2021 - dl.acm.org
What serverless computing is and should become: the next phase of cloud computing Page 1
76 COMMUNICATIONS OF THE ACM | MAY 2021 | VOL. 64 | NO. 5 contributed articles IN …

Firecracker: Lightweight virtualization for serverless applications

A Agache, M Brooker, A Iordache, A Liguori… - … USENIX symposium on …, 2020 - usenix.org
Serverless containers and functions are widely used for deploying and managing software
in the cloud. Their popularity is due to reduced cost of operations, improved utilization of …

Cloud programming simplified: A berkeley view on serverless computing

E Jonas, J Schleier-Smith, V Sreekanti, CC Tsai… - arxiv preprint arxiv …, 2019 - arxiv.org
Serverless cloud computing handles virtually all the system administration operations
needed to make it easier for programmers to use the cloud. It provides an interface that …

[HTML][HTML] How to factor 2048 bit RSA integers in 8 hours using 20 million noisy qubits

C Gidney, M Ekerå - Quantum, 2021 - quantum-journal.org
We significantly reduce the cost of factoring integers and computing discrete logarithms in
finite fields on a quantum computer by combining techniques from Shor 1994, Griffiths-Niu …

Plundervolt: Software-based fault injection attacks against Intel SGX

K Murdock, D Oswald, FD Garcia… - … IEEE Symposium on …, 2020 - ieeexplore.ieee.org
Dynamic frequency and voltage scaling features have been introduced to manage ever-
growing heat and power consumption in modern processors. Design restrictions ensure …

Spectre attacks: Exploiting speculative execution

P Kocher, J Horn, A Fogh, D Genkin, D Gruss… - Communications of the …, 2020 - dl.acm.org
Modern processors use branch prediction and speculative execution to maximize
performance. For example, if the destination of a branch depends on a memory value that is …

LVI: Hijacking transient execution through microarchitectural load value injection

J Van Bulck, D Moghimi, M Schwarz… - … IEEE Symposium on …, 2020 - ieeexplore.ieee.org
The recent Spectre attack first showed how to inject incorrect branch targets into a victim
domain by poisoning microarchitectural branch prediction history. In this paper, we …

A modern primer on processing in memory

O Mutlu, S Ghose, J Gómez-Luna… - … computing: from devices …, 2022 - Springer
Modern computing systems are overwhelmingly designed to move data to computation. This
design choice goes directly against at least three key trends in computing that cause …