首页> 外文期刊>IEEE computer architecture letters >Security Implications of Third-Party Accelerators
【24h】

Security Implications of Third-Party Accelerators

机译:第三方加速器的安全隐患

获取原文
获取原文并翻译 | 示例
       

摘要

Third-party accelerators offer system designers high performance and low energy without the market delay of in-house development. However, complex third-party accelerators may include vulnerabilities due to design flaws or malicious intent that are hard to expose during verification. Rather than react to each new vulnerability, it is better to proactively build defenses for classes of attacks. To inspire future work on defenses, this paper develops a taxonomy of accelerator vulnerabilities. We consider the cross product of threat types (confidentiality, integrity, and availability) with risk categories (configuration, computation, termination, accelerator memory accesses, system memory accesses, microarchitecture/coherence, exceptions/interrupts, and power), as well as whether processes can be vulnerable only if they use the offending accelerator (accelerator-scope threat) or even when running in the same system (system-scope threat). Our taxonomy draws attention to a grave problem that needs immediate attention from computer architects.
机译:第三方加速器可为系统设计人员提供高性能和低能耗,而不会延迟内部开发的市场。但是,复杂的第三方加速器可能由于设计缺陷或恶意意图而导致漏洞,而这些漏洞在验证过程中很难发现。与其对每个新漏洞做出反应,不如主动为各种攻击建立防御。为了激发未来的防御工作,本文建立了加速器漏洞的分类法。我们考虑威胁类型(机密性,完整性和可用性)与风险类别(配置,计算,终止,加速器内存访问,系统内存访问,微体系结构/一致性,异常/中断和能力)的交叉乘积,以及是否仅当进程使用有问题的加速器(加速器范围的威胁)或什至在同一系统中运行(系统范围的威胁)时,它们才可能受到攻击。我们的分类法引起人们对一个严重问题的关注,该问题需要计算机设计师的即时关注。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号