Skip to main content

Showing 1–3 of 3 results for author: Rothenberger, B

Searching in archive cs. Search in all archives.
.
  1. arXiv:2209.03125  [pdf, other

    cs.CR

    SAGE: Software-based Attestation for GPU Execution

    Authors: Andrei Ivanov, Benjamin Rothenberger, Arnaud Dethise, Marco Canini, Torsten Hoefler, Adrian Perrig

    Abstract: With the application of machine learning to security-critical and sensitive domains, there is a growing need for integrity and privacy in computation using accelerators, such as GPUs. Unfortunately, the support for trusted execution on GPUs is currently very limited - trusted execution on accelerators is particularly challenging since the attestation mechanism should not reduce performance. Althou… ▽ More

    Submitted 7 September, 2022; originally announced September 2022.

    Comments: 14 pages, 2 reference pages, 6 figures

  2. arXiv:2202.08080  [pdf, other

    cs.CR cs.DC

    NeVerMore: Exploiting RDMA Mistakes in NVMe-oF Storage Applications

    Authors: Konstantin Taranov, Benjamin Rothenberger, Daniele De Sensi, Adrian Perrig, Torsten Hoefler

    Abstract: This paper presents a security analysis of the InfiniBand architecture, a prevalent RDMA standard, and NVMe-over-Fabrics (NVMe-oF), a prominent protocol for industrial disaggregated storage that exploits RDMA protocols to achieve low-latency and high-bandwidth access to remote solid-state devices. Our work, NeVerMore, discovers new vulnerabilities in RDMA protocols that unveils several attack vect… ▽ More

    Submitted 16 February, 2022; originally announced February 2022.

  3. arXiv:2102.01397  [pdf, other

    cs.NI cs.CR

    Low-Rate Overuse Flow Tracer (LOFT): An Efficient and Scalable Algorithm for Detecting Overuse Flows

    Authors: Simon Scherrer, Che-Yu Wu, Yu-Hsi Chiang, Benjamin Rothenberger, Daniele E. Asoni, Arish Sateesan, Jo Vliegen, Nele Mentens, Hsu-Chun Hsiao, Adrian Perrig

    Abstract: Current probabilistic flow-size monitoring can only detect heavy hitters (e.g., flows utilizing 10 times their permitted bandwidth), but cannot detect smaller overuse (e.g., flows utilizing 50-100% more than their permitted bandwidth). Thus, these systems lack accuracy in the challenging environment of high-throughput packet processing, where fast-memory resources are scarce. Nevertheless, many ap… ▽ More

    Submitted 2 February, 2021; originally announced February 2021.