The Ponder Policy Specification Language
POLICY '01 Proceedings of the International Workshop on Policies for Distributed Systems and Networks
Towards a formal model for security policies specification and validation in the selinux system
Proceedings of the ninth ACM symposium on Access control models and technologies
GPGPU: general purpose computation on graphics hardware
ACM SIGGRAPH 2004 Course Notes
Reducing TCB size by using untrusted components: small kernels versus virtual-machine monitors
Proceedings of the 11th workshop on ACM SIGOPS European workshop
VMM-independent graphics acceleration
Proceedings of the 3rd international conference on Virtual execution environments
SecVisor: a tiny hypervisor to provide lifetime kernel code integrity for commodity OSes
Proceedings of twenty-first ACM SIGOPS symposium on Operating systems principles
Forensics examination of volatile system data using virtual introspection
ACM SIGOPS Operating Systems Review
GViM: GPU-accelerated virtual machines
Proceedings of the 3rd ACM Workshop on System-level Virtualization for High Performance Computing
IBMon: monitoring VMM-bypass capable InfiniBand devices using memory introspection
Proceedings of the 3rd ACM Workshop on System-level Virtualization for High Performance Computing
KvmSec: a security extension for Linux kernel virtual machines
Proceedings of the 2009 ACM symposium on Applied Computing
The Eucalyptus Open-Source Cloud-Computing System
CCGRID '09 Proceedings of the 2009 9th IEEE/ACM International Symposium on Cluster Computing and the Grid
vCUDA: GPU accelerated high performance computing in virtual machines
IPDPS '09 Proceedings of the 2009 IEEE International Symposium on Parallel&Distributed Processing
GPU virtualization on VMware's hosted I/O architecture
ACM SIGOPS Operating Systems Review
GPU packet classification using OpenCL: a consideration of viable classification methods
Proceedings of the 2009 Annual Research Conference of the South African Institute of Computer Scientists and Information Technologists
Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds
Proceedings of the 16th ACM conference on Computer and communications security
Password Recovery for RAR Files Using CUDA
DASC '09 Proceedings of the 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing
Accelerating SQL database operations on a GPU with CUDA
Proceedings of the 3rd Workshop on General-Purpose Computation on Graphics Processing Units
Efficient pattern matching on GPUs for intrusion detection systems
Proceedings of the 7th ACM international conference on Computing frontiers
Time-based intrusion detection in cyber-physical systems
Proceedings of the 1st ACM/IEEE International Conference on Cyber-Physical Systems
A Security Management Architecture for the Protection of Kernel Virtual Machines
CIT '10 Proceedings of the 2010 10th IEEE International Conference on Computer and Information Technology
Secure virtualization for cloud computing
Journal of Network and Computer Applications
Hi-index | 0.00 |
While on the one hand unresolved security issues pose a barrier to the widespread adoption of cloud computing technologies, on the other hand the computing capabilities of even commodity HW are boosting, in particular thanks to the adoption of *-core technologies. For instance, the Nvidia Compute Unified Device Architecture (CUDA) technology is increasingly available on a large part of commodity hardware. In this paper, we show that it is possible to effectively use such a technology to guarantee an increased level of security to cloud hosts, services, and finally to the user. Secure virtualization is the key enabling factor. It can protect such resources from attacks. In particular, secure virtualization can provide a framework enabling effectivemanagement of the security of possibly large, heterogeneous, CUDA-enabled computing infrastructures (e.g. clusters, server farms, and clouds). The contributions of this paper are twofold: first, to investigate the characteristics and security requirements ofCUDAenabled cloud computing nodes; and, second, to provide an architecture for leveraging CUDA hardware resources in a secure virtualization environment, to improve cloud security without sacrificing CPU performance. A prototype implementation of our proposal and related results support the viability of our proposal.