The Binary-based attestation(BA)mechanism presented by the Trusted Computing Group can equip the application with the capability of genuinely identifying configurations of remote system.However,BA only supports the at...The Binary-based attestation(BA)mechanism presented by the Trusted Computing Group can equip the application with the capability of genuinely identifying configurations of remote system.However,BA only supports the attestation for specific patterns of binary codes defined by a trusted party,mostly the software vendor,for a particular version of a software.In this paper,we present a Source-Code Oriented Attestation(SCOA)framework to enable custom built application to be attested to in the TCG attestation architecture.In SCOA,security attributes are bond with the source codes of an application instead of its binaries codes.With a proof chain generated by a Trusted Building System to record the building procedure,the challengers can determine whether the binary interacted with is genuinely built from a particular set of source codes.Moreover,with the security attribute certificates assigned to the source codes,they can determine the trustworthiness of the binary.In this paper,we present a TBS implementation with virtualization.展开更多
To enhance the energy efficiency and performance of algorithms with Graphics Processing Unit (GPU) accelerators in source-code development, we consider the power efficiency based on data transfer bandwidth and power...To enhance the energy efficiency and performance of algorithms with Graphics Processing Unit (GPU) accelerators in source-code development, we consider the power efficiency based on data transfer bandwidth and power consumption in key situations. First, a set of primitives is abstracted from program statements. Then, data transfer bandwidth and power consumption in different granularity sizes are consid- ered and mapped into proper primitives. With these mappings, a programmer can intuitively determine the power efficiency and performance in different running states of a thread. Finally, this intuition enables the programmer to tune the algorithm in order to achieve the best energy efficiency and performance. Using these power-aware principles, two Fast Fourier Transform (FFT) methods are compared. The mapping be- tween power consumption and primitives is helpful for algorithm tuning in source-code levels.展开更多
基金This work is under support of National Natural Science Foundation of China under grant No.60873238.
文摘The Binary-based attestation(BA)mechanism presented by the Trusted Computing Group can equip the application with the capability of genuinely identifying configurations of remote system.However,BA only supports the attestation for specific patterns of binary codes defined by a trusted party,mostly the software vendor,for a particular version of a software.In this paper,we present a Source-Code Oriented Attestation(SCOA)framework to enable custom built application to be attested to in the TCG attestation architecture.In SCOA,security attributes are bond with the source codes of an application instead of its binaries codes.With a proof chain generated by a Trusted Building System to record the building procedure,the challengers can determine whether the binary interacted with is genuinely built from a particular set of source codes.Moreover,with the security attribute certificates assigned to the source codes,they can determine the trustworthiness of the binary.In this paper,we present a TBS implementation with virtualization.
基金Supported by the National Natural Science Foundation of China (No. 61170053)the Natural Science Foundation of Beijing (No. 4112027)the China HGJ Significant Project (No. 2009ZX01036-001-002-4)
文摘To enhance the energy efficiency and performance of algorithms with Graphics Processing Unit (GPU) accelerators in source-code development, we consider the power efficiency based on data transfer bandwidth and power consumption in key situations. First, a set of primitives is abstracted from program statements. Then, data transfer bandwidth and power consumption in different granularity sizes are consid- ered and mapped into proper primitives. With these mappings, a programmer can intuitively determine the power efficiency and performance in different running states of a thread. Finally, this intuition enables the programmer to tune the algorithm in order to achieve the best energy efficiency and performance. Using these power-aware principles, two Fast Fourier Transform (FFT) methods are compared. The mapping be- tween power consumption and primitives is helpful for algorithm tuning in source-code levels.