Objective: To explore the effects of residents' social support and network information anxiety on loneliness and their influencing factors under public health emergencies. Methods: CART decision tree and logistic ...
详细信息
Edge computing (EC) is an innovative architecture that aims to provide cloud computing services near data sources. In conventional deep learning systems that use edge computing, data producers frequently need to trans...
详细信息
Adversarial attacks in the Artificial Intelligence have received extensive coverage in the latest years. Such attacks have affected deep learning models and neural networks due to the weaknesses that are part of the A...
详细信息
The utilization of virtual reality (VR) has been increasingly applied in various fields, including medicine and education, to address the challenges faced by children with attention deficit hyperactivity disorder (ADH...
详细信息
Clustering is a significant method of data analytics in real world environments since human labelling of the data is often costly. Clustering was developed as an alternative to manual tagging. In the field of data ana...
详细信息
Web-based applications are now the preferred approach for delivering a variety of services via the Internet. As a result of the globalization of commerce, web applications have been growing quickly and becoming increa...
详细信息
Steganography is the method that convert data into bits to make it suitable for hiding. While embedding data the factors such as stego image quality and distortion which cannot be observed by the human eyes. The aim o...
详细信息
For the past decades, covert and side channels have posed significant threats to user privacy in computing systems, targeting almost every component. In this paper, we present SideLink, a novel attack that exploits th...
详细信息
ISBN:
(纸本)9783031804076;9783031804083
For the past decades, covert and side channels have posed significant threats to user privacy in computing systems, targeting almost every component. In this paper, we present SideLink, a novel attack that exploits the NVLink bus for covert communication and information leakage. NVLink is a recent bus in the NVIDIA GPU systems known for its high bandwidth, which became a necessity for AI applications in data centers. Despite the extremely high bandwidth, we investigated its contention characteristics and built the first contention-based covert channel, and observed the presence of a side channel on the NVLink interconnect bus for the first time. We evaluated SideLink against NVIDIA DGX A100, a widely used system in data centers and cloud environments nowadays. The covert channel reached a bandwidth of 8.8 Kbps with a negligible error rate. Moreover, we demonstrated the side channel through an application fingerprinting attack using a deep learning FCN model, achieving an accuracy of 93.1%, which involved collecting the first dataset consisting of latency traces of the NVLink bus from applications running on dual-GPU systems.
In the realm of Trusted computing for embedded systems, ensuring the integrity of both firmware and hardware presents a complex challenge. Traditional approaches have focused on detecting firmware and operating system...
详细信息
In the realm of Trusted computing for embedded systems, ensuring the integrity of both firmware and hardware presents a complex challenge. Traditional approaches have focused on detecting firmware and operating system (OS) software manipulations, leaving a gap in the identification of subtle hardware modifications and attacks. This paper extends previous work on hardware fingerprinting for remote attestation by conducting and analyzing comprehensive long-term hardware measurements. Building upon the established methodology, we examine the correlation between environmental parameters and analog-to-digital converter (ADC) values to gain suitable reference values for remote attestation procedures. Our work introduces significant contributions: the implementation of two distinct test setups for enhanced hardware fingerprinting, a rigorous evaluation of these measurements to identify strong correlations, the development of a standardized log format for hardware measurements aimed at adoption by the Trusted computing Group (TCG), and the application to Trusted Platform Module TPM based measured boot and remote attestation. In summary, we integrate hardware manipulation detection with the TPM, and lay the groundwork for a more secure and reliable computing environment in embedded systems.
With the maturation of quantum computingtechnology, research has gradually shifted towards exploring its applications. Alongside the rise of artificial intelligence, various machine learning methods have been develop...
详细信息
暂无评论