Lee et al., 2019 - Google Patents
Occlumency: Privacy-preserving remote deep-learning inference using SGXLee et al., 2019
View PDF- Document ID
- 14812482021794290948
- Author
- Lee T
- Lin Z
- Pushp S
- Li C
- Liu Y
- Lee Y
- Xu F
- Xu C
- Zhang L
- Song J
- Publication year
- Publication venue
- The 25th Annual international conference on mobile computing and networking
External Links
Snippet
Deep-learning (DL) is receiving huge attention as enabling techniques for emerging mobile and IoT applications. It is a common practice to conduct DNN model-based inference using cloud services due to their high computation and memory cost. However, such a cloud …
- 238000000034 method 0 abstract description 23
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/02—Addressing or allocation; Relocation
- G06F12/08—Addressing or allocation; Relocation in hierarchically structured memory systems, e.g. virtual memory systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F1/00—Details of data-processing equipment not covered by groups G06F3/00 - G06F13/00, e.g. cooling, packaging or power supply specially adapted for computer application
- G06F1/16—Constructional details or arrangements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Error detection; Error correction; Monitoring responding to the occurence of a fault, e.g. fault tolerance
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Lee et al. | Occlumency: Privacy-preserving remote deep-learning inference using SGX | |
| US11088846B2 (en) | Key rotating trees with split counters for efficient hardware replay protection | |
| Mo et al. | Darknetz: towards model privacy at the edge using trusted execution environments | |
| NL2029792B1 (en) | Cryptographic computing including enhanced cryptographic addresses | |
| US11755500B2 (en) | Cryptographic computing with disaggregated memory | |
| US12353608B2 (en) | Secure collaboration between processors and processing accelerators in enclaves | |
| Liu et al. | SecDeep: Secure and performant on-device deep learning inference framework for mobile and IoT devices | |
| KR102269010B1 (en) | Memory initialization in a protected region | |
| EP2715589B1 (en) | System and method for preserving references in sandboxes | |
| CN110637301B (en) | Reducing disclosure of sensitive data in virtual machines | |
| CN107209826B (en) | Authenticated control stack | |
| CN103329139B (en) | Systems and methods for supporting JIT in a secure system with randomly assigned memory ranges | |
| US10061718B2 (en) | Protecting secret state from memory attacks | |
| CN103106372A (en) | Lightweight class privacy data encryption method and system for Android system | |
| US11239997B2 (en) | Techniques for cipher system conversion | |
| AU2012262867A1 (en) | System and method for preserving references in sandboxes | |
| Islam et al. | Confidential execution of deep learning inference at the untrusted edge with arm trustzone | |
| EP3271828B1 (en) | Cache and data organization for memory protection | |
| WO2020242689A1 (en) | Execution of deep-learning model | |
| Bai et al. | Secmdp: Towards privacy-preserving multimodal deep learning in end-edge-cloud | |
| Naghibijouybari et al. | Covert channels on gpgpus | |
| Yao et al. | Privacy-preserving content-based similarity detection over in-the-cloud middleboxes | |
| Zhu et al. | TACC: a secure accelerator enclave for AI workloads | |
| CN116595520A (en) | Malicious domain generation algorithm DGA detection in memory of a data processing unit |