Splinecnn: Fast geometric deep learning with continuous b-spline kernels
Abstract We present Spline-based Convolutional Neural Networks (SplineCNNs), a variant
of deep neural networks for irregular structured and geometric input, eg, graphs or meshes …
of deep neural networks for irregular structured and geometric input, eg, graphs or meshes …
Obfusmem: A low-overhead access obfuscation for trusted memories
Trustworthy software requires strong privacy and security guarantees from a secure trust
base in hardware. While chipmakers provide hardware support for basic security and …
base in hardware. While chipmakers provide hardware support for basic security and …
Invisimem: Smart memory defenses for memory bus side channel
S Aga, S Narayanasamy - ACM SIGARCH Computer Architecture News, 2017 - dl.acm.org
A practically feasible low-overhead hardware design that provides strong defenses against
memory bus side channel remains elusive. This paper observes that smart memory, memory …
memory bus side channel remains elusive. This paper observes that smart memory, memory …
Design and implementation of the ascend secure processor
This paper presents post-silicon results for the Ascend secure processor, taped out in a 32
nm SOI process. Ascend prevents information leakage over a processor's digital I/O pins—in …
nm SOI process. Ascend prevents information leakage over a processor's digital I/O pins—in …
D-oram: Path-oram delegation for low execution interference on cloud servers with untrusted memory
Cloud computing has evolved into a promising computing paradigm. However, it remains a
challenging task to protect application privacy and, in particular, the memory access …
challenging task to protect application privacy and, in particular, the memory access …
IR-ORAM: Path access type based memory intensity reduction for path-oram
Path ORAM is an effective ORAM (Oblivious RAM) primitive for protecting memory access
patterns. Path ORAM converts each off-chip memory request from user program to tens to …
patterns. Path ORAM converts each off-chip memory request from user program to tens to …
Cooperative path-oram for effective memory bandwidth sharing in server settings
Path ORAM (Oblivious RAM) is a recently proposed ORAM protocol for preventing
information leakage from memory access sequences. It receives wide adoption due to its …
information leakage from memory access sequences. It receives wide adoption due to its …
Privacy-preserving access to big data in the cloud
Cloud storage can simplify data management and reduce data maintenance costs.
However, many users and companies hesitate to move their data to cloud storage because …
However, many users and companies hesitate to move their data to cloud storage because …
Streamline ring oram accesses through spatial and temporal optimization
Memory access patterns could leak temporal and spatial information in a sensitive program;
therefore, obfuscated memory access patterns are desired from the security perspective …
therefore, obfuscated memory access patterns are desired from the security perspective …
Secure DIMM: Moving ORAM primitives closer to memory
A Shafiee, R Balasubramonian… - 2018 IEEE International …, 2018 - ieeexplore.ieee.org
As more critical applications move to the cloud, there is a pressing need to provide privacy
guarantees for data and computation. While cloud infrastructures are vulnerable to a variety …
guarantees for data and computation. While cloud infrastructures are vulnerable to a variety …