YoVDO

Security of Heterogeneous Systems

Offered By: CAE in Cybersecurity Community via YouTube

Tags

Cybersecurity Courses Heterogeneous Computing Courses Microarchitectural Attacks Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the security challenges of heterogeneous computing systems in this 38-minute lecture by Hoda Naghibijouybari, Assistant Professor in the Department of Computer Science at Binghamton University. Delve into the evolution from traditional to modern heterogeneous systems, focusing on microarchitectural attacks and side-channel vulnerabilities. Examine GPU architecture, the CUDA programming model, and specific security threats like website fingerprinting and inter-keystroke timing attacks. Learn about defense mechanisms, including temporal and spatial partitioning, and the GPUGuard solution. Compare integrated and discrete GPUs, analyzing their unique security implications. Gain insights into the complexities of securing CPU-GPU systems, remote cross-component attacks, and potential defense strategies for heterogeneous computing environments.

Syllabus

Intro
Traditional Computing Systems
Modern Computing Systems Heterogeneous
Microarchitectural Attacks: Co-location
An Example: Side channel on Cache (Prime+Probe Attack)
GPUs are everywhere!
CPU vs. GPU
GPU Architecture
GPU Programming Model: CUDA
Covert Channel on GPUs?
Graphics/CUDA-Graphics Attack Overview
Attack1: Website Fingerprinting
GPU Memory Allocation Trace
Attack 2: Inter-keystroke timing
Security Issue
Temporal Partitioning
Spatial Partitioning
GPUGuard: Enable Intra-SM Sharing Securely
Integrated GPUs vs. Discrete GPUs
Security of Integrated CPU-GPU systems
Intel Integrated CPU-GPU
Main Challenges
Cache based covert channel
Remote Cross-Component Attacks
Defenses
Security of Heterogeneous Systems
Conclusion


Taught by

CAE in Cybersecurity Community

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network