Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Microarchitectural attacks in heterogeneous systems: A survey
With the increasing proliferation of hardware accelerators and the predicted continued
increase in the heterogeneity of future computing systems, it is necessary to understand the …
increase in the heterogeneity of future computing systems, it is necessary to understand the …
T unne L s for B ootlegging: Fully Reverse-Engineering GPU TLBs for Challenging Isolation Guarantees of NVIDIA MIG
Recent studies have revealed much detailed information about the translation lookaside
buffers (TLBs) of modern CPUs, but we find that many properties of such components in …
buffers (TLBs) of modern CPUs, but we find that many properties of such components in …
{SecSMT}: Securing {SMT} processors against {Contention-Based} covert channels
This paper presents the first comprehensive analysis of contention-based security
vulnerabilities in a high-performance simultaneous mulithreaded (SMT) processor. It …
vulnerabilities in a high-performance simultaneous mulithreaded (SMT) processor. It …
Spy in the gpu-box: Covert and side channel attacks on multi-gpu systems
The deep learning revolution has been enabled in large part by GPUs, and more recently
accelerators, which make it possible to carry out computationally demanding training and …
accelerators, which make it possible to carry out computationally demanding training and …
Network-on-chip microarchitecture-based covert channel in gpus
As GPUs are becoming widely deployed in the cloud infrastructure to support different
application domains, the security concerns of GPUs are becoming increasingly important. In …
application domains, the security concerns of GPUs are becoming increasingly important. In …
Leaky buddies: Cross-component covert channels on integrated cpu-gpu systems
Graphics Processing Units (GPUs) are ubiquitous components used across the range of
today's computing platforms, from phones and tablets, through personal computers, to high …
today's computing platforms, from phones and tablets, through personal computers, to high …
Neurobfuscator: A full-stack obfuscation tool to mitigate neural architecture stealing
Neural network stealing attacks have posed grave threats to neural network model
deployment. Such attacks can be launched by extracting neural architecture information …
deployment. Such attacks can be launched by extracting neural architecture information …
Common counters: Compressed encryption counters for secure GPU memory
Hardware-based trusted execution has opened a promising new opportunity for enabling
secure cloud computing. Nevertheless, the current trusted execution environments are …
secure cloud computing. Nevertheless, the current trusted execution environments are …
Webgpu-spy: Finding fingerprints in the sandbox through gpu cache attacks
E Ferguson, A Wilson, H Naghibijouybari - Proceedings of the 19th ACM …, 2024 - dl.acm.org
Microarchitectural attacks on CPU structures have been studied in native applications, as
well as in web browsers. These attacks continue to be a substantial threat to computing …
well as in web browsers. These attacks continue to be a substantial threat to computing …
Two sides of the same coin: Boons and banes of machine learning in hardware security
The last decade has witnessed remarkable research advances at the intersection of
machine learning (ML) and hardware security. The confluence of the two technologies has …
machine learning (ML) and hardware security. The confluence of the two technologies has …