Risk taxonomy, mitigation, and assessment benchmarks of large language model systems

T Cui, Y Wang, C Fu, Y Xiao, S Li, X Deng, Y Liu… - arXiv preprint arXiv …, 2024 - arxiv.org
Large language models (LLMs) have strong capabilities in solving diverse natural language
processing tasks. However, the safety and security issues of LLM systems have become the …

Honeycomb: Secure and Efficient {GPU} Executions via Static Validation

H Mai, J Zhao, H Zheng, Y Zhao, Z Liu, M Gao… - … USENIX Symposium on …, 2023 - usenix.org
Graphics Processing Units (GPUs) unlock emerging use cases like large language models
and autonomous driving. They process a large amount of sensitive data, where security is of …

Machine learning with confidential computing: A systematization of knowledge

F Mo, Z Tarkhani, H Haddadi - ACM Computing Surveys, 2024 - dl.acm.org
Privacy and security challenges in Machine Learning (ML) have become increasingly
severe, along with ML's pervasive development and the recent demonstration of large attack …

Secure and timely gpu execution in cyber-physical systems

J Wang, Y Wang, N Zhang - Proceedings of the 2023 ACM SIGSAC …, 2023 - dl.acm.org
Graphics Processing Units (GPU) are increasingly deployed on Cyber-physical Systems
(CPSs), frequently used to perform real-time safety-critical functions, such as object …

End-to-End Security for Distributed Event-Driven Enclave Applications on Heterogeneous TEEs

G Scopelliti, S Pouyanrad, J Noorman, F Alder… - ACM Transactions on …, 2023 - dl.acm.org
This article presents an approach to provide strong assurance of the secure execution of
distributed event-driven applications on shared infrastructures, while relying on a small …

Building GPU tees using CPU secure enclaves with gevisor

X Wu, DJ Tian, CH Kim - Proceedings of the 2023 ACM Symposium on …, 2023 - dl.acm.org
Trusted execution environments (TEEs) have been proposed to protect GPU computation for
machine learning applications operating on sensitive data. However, existing GPU TEE …

Survey of research on confidential computing

D Feng, Y Qin, W Feng, W Li, K Shang… - IET …, 2024 - Wiley Online Library
As the global data strategy deepens and data elements accelerate integrating and flowing
more rapidly, the demand for data security and privacy protection has become increasingly …

Grove: Ownership verification of graph neural networks using embeddings

A Waheed, V Duddu, N Asokan - arXiv preprint arXiv:2304.08566, 2023 - arxiv.org
Graph neural networks (GNNs) have emerged as a state-of-the-art approach to model and
draw inferences from large scale graph-structured data in various application settings such …

Building a lightweight trusted execution environment for arm gpus

C Wang, Y Deng, Z Ning, K Leach, J Li… - … on Dependable and …, 2023 - ieeexplore.ieee.org
A wide range of Arm endpoints leverage integrated and discrete GPUs to accelerate
computation. However, Arm GPU security has not been explored by the community. Existing …

[PDF][PDF] CAGE: Complementing Arm CCA with GPU Extensions

C Wang, F Zhang, Y Deng, K Leach… - Network and …, 2024 - ningzhenyu.github.io
Confidential computing is an emerging technique that provides users and third-party
developers with an isolated and transparent execution environment. To support this …