Projects per year
Abstract
We present Dolma, which applies dynamic information flow tracking (DIFT) to the Gemmini matrix multiplication accelerator. With the BliMe CPU extensions, it efficiently guarantees client data confidentiality, even in the presence of malicious/vulnerable software and side channel attacks on servers.
Original language | English |
---|---|
Title of host publication | Proceedings of the 2024 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2024 |
Publisher | IEEE |
Pages | 373-377 |
Number of pages | 5 |
ISBN (Electronic) | 979-8-3503-7394-3 |
DOIs | |
Publication status | Published - 2024 |
MoE publication type | A4 Conference publication |
Event | IEEE International Symposium on Hardware Oriented Security and Trust - McLean, United States Duration: 6 May 2024 → 9 May 2024 |
Publication series
Name | Proceedings of the IEEE International Symposium on Hardware-Oriented Security and Trust |
---|---|
ISSN (Electronic) | 2765-8406 |
Conference
Conference | IEEE International Symposium on Hardware Oriented Security and Trust |
---|---|
Abbreviated title | HOST |
Country/Territory | United States |
City | McLean |
Period | 06/05/2024 → 09/05/2024 |
Fingerprint
Dive into the research topics of 'Data-Oblivious ML Accelerators Using Hardware Security Extensions'. Together they form a unique fingerprint.Projects
- 1 Finished
-
Gunn Lachlan: Rigorous security guarantees for run-time integrity
Gunn, L. (Principal investigator)
01/09/2021 → 31/08/2024
Project: Academy of Finland: Other research funding