日韩性视频-久久久蜜桃-www中文字幕-在线中文字幕av-亚洲欧美一区二区三区四区-撸久久-香蕉视频一区-久久无码精品丰满人妻-国产高潮av-激情福利社-日韩av网址大全-国产精品久久999-日本五十路在线-性欧美在线-久久99精品波多结衣一区-男女午夜免费视频-黑人极品ⅴideos精品欧美棵-人人妻人人澡人人爽精品欧美一区-日韩一区在线看-欧美a级在线免费观看

歡迎訪問 生活随笔!

生活随笔

當前位置: 首頁 > 编程资源 > 编程问答 >内容正文

编程问答

Securing the Deep Learning Stack

發布時間:2025/3/15 编程问答 30 豆豆
生活随笔 收集整理的這篇文章主要介紹了 Securing the Deep Learning Stack 小編覺得挺不錯的,現在分享給大家,幫大家做個參考.

This is the first post of Nervana’s “Security Meets Deep Learning” series. Security is one of the biggest concerns for any enterprise, but it’s especially critical for companies deploying deep learning solutions since datasets often contain extremely sensitive information.

Fundamentally, “security” refers to the protection of a system against the many forms of malicious attacks. Common types of attacks include:

  • Privilege escalation
  • Backdoors
  • Spoofing
  • Cross-site scripting
  • Social engineering (phishing, clickjacking, etc.)
  • Direct attack

Because attacks target vulnerabilities at any level of the software and hardware stack, protection must also be provided at every level.

In this post we cover potential security issues and the methods Nervana uses to secure our deep learning stack — all the way from “electrons-to-applications”. Subsequent posts will discuss how Nervana extends security to deep learning datasets, the security requirements that are specific to cloud-based deep learning, and the ways that we meet those challenges. Lastly, we’ll cover a sampling of case studies that showcase how our architecture protects against a variety of attacks.

The Root of Trust

“Trust” is a (if not – “the”) cornerstone of computer security. Before something is considered secure, it has to be trusted. The question is, however, “How do you determine trust?” In person-to-person transactions, you can make a determination about someone’s trustworthiness either directly or by outsourcing that determination to a ‘trust verification’ service such as a credit agency. But how do you know to trust that agency?

Computer security faces a similar problem. You can perform a check against a portion of your system to assess its integrity, but how do you verify that the “checker”, itself, is not compromised? For example, if you rely on a tool that scans for unapproved binaries running on your server (by looking at the process table, for example), how do you know the tool hasn’t been hacked? In fact, altering commonly used detection tools to render the attack as invisible is the first thing most attacks do.

The naive answer is to have a different program verify the integrity of the checkers. However, and perhaps obviously, this raises the question of “Who checks the checker checker?” To avoid an infinite series of checkers, a “root” must be established – a mechanism that can be implicitly trusted, and so can be securely relied upon to verify the integrity of the next layer up. This is called the “root-of-trust.”

Establishing a robust, hardened root-of-trust has occupied legions of very smart computer scientist for decades. It requires carefully designed solutions that are deeply integrated into CPU architectures and can be leveraged to create entire systems in which every component can be trusted. This “hardware root-of-trust” is the anchor on which secure systems must be built.

Note that while much progress has been made in recent years, there is still no such thing as a 100% secure hardware root-of-trust. It is important for a security architect to realize that the goal of computer security is not to make your system perfectly secure — which is most likely impossible — but is instead to make it so expensive to hack that it is not worth an attacker’s trouble.

Hardened Hardware and Software

Effective protection against attacks requires an overlapping system of security technologies starting from a hardware “root-of-trust”. That trust then must be extended through every layer of the system’s software and hardware stack. Implementing this level of security requires physical security, secure hardware systems, a hardened software infrastructure, cryptography for data both at rest and in motion, and a robust set of user authorization policies that ensure privacy and isolation. In this section, we explore how the hardware root-of-trust can be established for the servers and how it is extended through the OS and made available to the application layer.

Physical Security

Physical access?— and even?physical proximity?— to a server can be fatal to its security. Once attackers gain physical access to a server, they can leverage any number of hacking techniques, ranging from probing the electrical signals on a server’s motherboard to listening for RF interference from the CPUs performing crypto to extract their secret keys. The only way to mitigate this class of attacks is to place the servers in a highly secure facility. This problem is common to many application types, so most colocation and cloud providers offer physical security as a service.

Secure Hardware

In this context, “secure hardware” refers to the CPU, any peripherals needed to establish a hardware root-of-trust, and the extension of the trust “upwards” through the rest of the stack via a?chain of trust. The Nervana Platform “chain of trust” is shown in Figure 1.


Figure 1. The Nervana Platform Chain of Trust

In general terms, establishing the root-of-trust requires that the CPU be able to boot securely. This process involves loading a small, immutable kernel that calculates a hash over the boot firmware (BIOS) binary and compares it against the expected hash value. The boot firmware, being trusted, can then repeat that process one layer up, calculating a hash over the OS’s boot loader to compare it against a trusted value.

This process is generally called “secure booting” and is supported by most recent CPUs. It also requires a secure place to store the trusted hash values. In Intel’s?trusted execution technology?ecosystem, this is usually a highly secure hardware peripheral called a?Trusted Platform Module.

The accelerators used in deep learning (GPUs and the Nervana Engine) must also be secured — a topic which we’ll address in a subsequent post.

Secure Operating System

In theory, once a hardware root-of-trust is established, that trust can be extended to every bit of software executing on that platform. This is a nice theory! However, it is completely impractical, as this would require that every piece of software be immutable, cryptographically signed, and checked every time it is executed. And even if this were achieved, many attacks inject code dynamically, so vulnerabilities would still exist. In practice, software systems are too complex and dynamic to be completely secure in this fashion.

Instead, security architectures focus on securing the operating system itself, then carefully restrict users to certain operations. There are a variety of technologies built into Linux that facilitate this, including?Mandatory Access Controls?(of which?SELinux?is one implementation),?Integrity Measurement Architecture?(IMA/EVM),?ASLR,?Signed Kernel Modules, and many more. Enabling and correctly configuring these features goes a long way towards locking down the OS and preventing the bulk of attacks.

Secure Applications

Securing the OS provides a safe, isolated environment to run applications. Unfortunately, while securing the OS is difficult, ensuring that applications are secure is nearly impossible (outside of very restricted environments such as embedded systems). There are too many applications to enforce safe coding practices across all of them, and many development environments are not amenable to safe coding. Instead of trying to secure every application, security approaches focus on limiting the damage that an application can cause to ensure that a compromised application can only affect the “sandbox” in which it is run.

In the case of cloud computing, this is typically achieved by running most applications in some form of a “container” (e.g. virtual machines, LXC, docker, etc) enabled through?operating-system-level virtualization?with carefully constrained privileges. Everything else, including the application that manages the containers, is then secured using the same techniques used to protect the OS.

Deep learning applications present an additional set of challenges for two reasons. First, they typically require direct access to acceleration hardware. Second, they are typically written at least partially in Python, which is inherently less secure than modern code-safe languages such as Go. We’ll see how containerization can be used to mitigate these challenges in a subsequent post.

Conclusion

In this post, we have outlined the computer security challenges, discussed the hardware root of trust, and explored how this could be leveraged to secure operating systems and applications. In the next post, we will discuss the problem of securing data (both at rest and in motion), encryption and user authentication and authorization.


原文地址:?https://www.intelnervana.com/securing-deep-learning-stack/

總結

以上是生活随笔為你收集整理的Securing the Deep Learning Stack的全部內容,希望文章能夠幫你解決所遇到的問題。

如果覺得生活随笔網站內容還不錯,歡迎將生活随笔推薦給好友。

主站蜘蛛池模板: 国产成人看片 | 久久久久成人精品无码中文字幕 | 欧美激情一区二区三区免费观看 | 欧美一级做a爰片久久高潮 久热国产精品视频 | 欧产日产国产精品 | 欧美在线v | 日本亚洲一区二区三区 | 99一级片 | 成人勉费视频 | 青青草免费观看视频 | 少妇高潮惨叫久久久久 | 亚洲婷婷在线观看 | 婷婷色基地 | 国产日韩视频在线观看 | 日本涩涩网站 | 欧洲mv日韩mv国产 | 成人黄色性视频 | 中文字幕少妇 | 一区二区三区在线视频播放 | 欧美一区二区三区久久妖精 | 潮喷失禁大喷水aⅴ无码 | 最近最经典中文mv字幕 | 精品视频三区 | 91琪琪| 天堂中文在线看 | 免费看av软件 | 7777奇米影视 | 久久密桃 | 日本免费在线观看视频 | 99综合久久| 91高清网站 | 久草福利资源 | 精品人妻大屁股白浆无码 | 国产区一二 | 成人精品| 天天看夜夜操 | 美女131爽爽爽做爰视频 | 久久久久久婷 | a天堂视频在线观看 | 欧美性插视频 | 国产激情一区二区三区在线观看 | 小sao货cao死你| 日本熟妇一区二区 | 国产精品性爱在线 | 精品一区二区三区欧美 | 国产婷婷色一区二区三区 | 欧美日韩在线一区二区三区 | av无码精品一区二区三区宅噜噜 | 国产精品一区二区欧美 | 女人扒开腿免费视频app | 国产精品久久久久久久妇 | av网站亚洲| 911亚洲精选 | 91网站免费观看 | 一区二区三区四区av | 免费小视频 | 亚洲一区视频网站 | 日韩欧美国产一区二区三区在线观看 | 蜜臀aⅴ国产精品久久久国产老师 | 亚洲乱熟女一区二区三区小说 | 国产婷婷色一区二区 | 欧美激情网 | 欧美日韩一级二级三级 | 色多多在线视频 | 日韩精品久久久久久久的张开腿让 | 一级黄色片免费播放 | 久久露脸 | 免费日韩一区二区 | 免费极品av一视觉盛宴 | 国产aⅴ爽av久久久久成人 | 久久yy| 好av| 最近中文字幕在线观看 | 久久激情网 | 欧美日韩激情网 | 国产高潮国产高潮久久久 | 精品一区久久久 | 99在线观看视频 | 免费看黄色片视频 | 成人精品一区二区三区电影 | 久久黄色影视 | 成人青青草 | 三年中文免费观看大全动漫 | 黄av在线| 国产偷国产偷av亚洲清高 | 久久婷婷色| 国产区小视频 | 精品国产亚洲av麻豆 | 无码精品国产一区二区三区 | 国产精品久久久久久久av | 午夜激情综合网 | 欧美a在线| 亚洲欧美色图片 | 午夜67194 | 国产日韩视频在线观看 | 日韩乱码一区二区 | 国产精品婷婷午夜在线观看 | 老熟妇毛茸茸 | 国产一区二区三区视频在线 |