+

Lee et al., 2019 - Google Patents

Occlumency: Privacy-preserving remote deep-learning inference using SGX

Lee et al., 2019

View PDF
Document ID
14812482021794290948
Author
Lee T
Lin Z
Pushp S
Li C
Liu Y
Lee Y
Xu F
Xu C
Zhang L
Song J
Publication year
Publication venue
The 25th Annual international conference on mobile computing and networking

External Links

Snippet

Deep-learning (DL) is receiving huge attention as enabling techniques for emerging mobile and IoT applications. It is a common practice to conduct DNN model-based inference using cloud services due to their high computation and memory cost. However, such a cloud …
Continue reading at saumaypushp.github.io (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/02Addressing or allocation; Relocation
    • G06F12/08Addressing or allocation; Relocation in hierarchically structured memory systems, e.g. virtual memory systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/46Multiprogramming arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/14Protection against unauthorised use of memory or access to memory
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F1/00Details of data-processing equipment not covered by groups G06F3/00 - G06F13/00, e.g. cooling, packaging or power supply specially adapted for computer application
    • G06F1/16Constructional details or arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Error detection; Error correction; Monitoring responding to the occurence of a fault, e.g. fault tolerance

Similar Documents

Publication Publication Date Title
Lee et al. Occlumency: Privacy-preserving remote deep-learning inference using SGX
US11088846B2 (en) Key rotating trees with split counters for efficient hardware replay protection
Mo et al. Darknetz: towards model privacy at the edge using trusted execution environments
NL2029792B1 (en) Cryptographic computing including enhanced cryptographic addresses
US11755500B2 (en) Cryptographic computing with disaggregated memory
US12353608B2 (en) Secure collaboration between processors and processing accelerators in enclaves
Liu et al. SecDeep: Secure and performant on-device deep learning inference framework for mobile and IoT devices
KR102269010B1 (en) Memory initialization in a protected region
EP2715589B1 (en) System and method for preserving references in sandboxes
CN110637301B (en) Reducing disclosure of sensitive data in virtual machines
CN107209826B (en) Authenticated control stack
CN103329139B (en) Systems and methods for supporting JIT in a secure system with randomly assigned memory ranges
US10061718B2 (en) Protecting secret state from memory attacks
CN103106372A (en) Lightweight class privacy data encryption method and system for Android system
US11239997B2 (en) Techniques for cipher system conversion
AU2012262867A1 (en) System and method for preserving references in sandboxes
Islam et al. Confidential execution of deep learning inference at the untrusted edge with arm trustzone
EP3271828B1 (en) Cache and data organization for memory protection
WO2020242689A1 (en) Execution of deep-learning model
Bai et al. Secmdp: Towards privacy-preserving multimodal deep learning in end-edge-cloud
Naghibijouybari et al. Covert channels on gpgpus
Yao et al. Privacy-preserving content-based similarity detection over in-the-cloud middleboxes
Zhu et al. TACC: a secure accelerator enclave for AI workloads
CN116595520A (en) Malicious domain generation algorithm DGA detection in memory of a data processing unit
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载