2021 IEEE International Symposium on Performance Analysis of Systems and Software (ISPASS) 2021
DOI: 10.1109/ispass51385.2021.00017
|View full text |Cite
|
Sign up to set email alerts
|

Analyzing Secure Memory Architecture for GPUs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 20 publications
1
3
0
Order By: Relevance
“…Although encryption/decryption latency is relatively high when performed in software, GPU is good at hiding it via thread-level parallelism, resulting in nearly negligible encryption overheads. This observation is also consistent with the findings in the prior work [26]. However, anything that reduces the degree of thread-level parallelism can easily introduce high execution time overheads.…”
Section: Lite Performance Overheadsupporting
confidence: 92%
See 2 more Smart Citations
“…Although encryption/decryption latency is relatively high when performed in software, GPU is good at hiding it via thread-level parallelism, resulting in nearly negligible encryption overheads. This observation is also consistent with the findings in the prior work [26]. However, anything that reduces the degree of thread-level parallelism can easily introduce high execution time overheads.…”
Section: Lite Performance Overheadsupporting
confidence: 92%
“…They proposed to group several data blocks to have a common counter to reduce counter cache misses. Yuan et al [26] analyzed the performance implication of counter mode encryption for secure GPU memory. They observed that the increase in memory traffic due to accessing security metadata, including counters and MACs, is the main contributor to performance degradation.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…We assume that that the memory on a TEE-DSA node (e.g., Graviton [26], SheF [29]), is part of the chip that an attacker cannot infiltrate, such as-high performance 3D stacked memories [51] for accelerators [52], GPU [53], and SoCs [54]. For off-core memory, memory encryption and integrity protection proposals on GPU [55,56], NPU [57,58], and data center accelerators [59] can thwart physical attackers with some performance penalties. However, protecting non-TEE nodes is a significant challenge as no such protection mechanisms are available for legacy nodes.…”
Section: Security Considerationsmentioning
confidence: 99%