{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T15:23:44Z","timestamp":1772119424816,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":95,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,6,11]],"date-time":"2022-06-11T00:00:00Z","timestamp":1654905600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CCF-2007832, ECCS-1932501, CCF-2118709"],"award-info":[{"award-number":["CCF-2007832, ECCS-1932501, CCF-2118709"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100005801","name":"Facebook","doi-asserted-by":"publisher","award":["Fellowship"],"award-info":[{"award-number":["Fellowship"]}],"id":[{"id":"10.13039\/100005801","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,6,18]]},"DOI":"10.1145\/3470496.3527418","type":"proceedings-article","created":{"date-parts":[[2022,5,31]],"date-time":"2022-05-31T19:06:01Z","timestamp":1654023961000},"page":"726-741","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":22,"title":["MGX"],"prefix":"10.1145","author":[{"given":"Weizhe","family":"Hua","sequence":"first","affiliation":[{"name":"Cornell University"}]},{"given":"Muhammad","family":"Umar","sequence":"additional","affiliation":[{"name":"Cornell University"}]},{"given":"Zhiru","family":"Zhang","sequence":"additional","affiliation":[{"name":"Cornell University"}]},{"given":"G. Edward","family":"Suh","sequence":"additional","affiliation":[{"name":"Cornell University and Meta AI"}]}],"member":"320","published-online":{"date-parts":[[2022,6,11]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"2014","article-title":"Information technology --- Coding of audio-visual objects --- Part 10","volume":"14496","year":"2014","unstructured":"2014 . Information technology --- Coding of audio-visual objects --- Part 10 : Advanced Video Coding. Standard ISO\/IEC 14496-10 : 2014 . International Organization for Standardization, Geneva, CH. https:\/\/www.iso.org\/standard\/66069.html 2014. Information technology --- Coding of audio-visual objects --- Part 10: Advanced Video Coding. Standard ISO\/IEC 14496-10:2014. International Organization for Standardization, Geneva, CH. https:\/\/www.iso.org\/standard\/66069.html","journal-title":"Advanced Video Coding. Standard ISO\/IEC"},{"key":"e_1_3_2_1_2_1","first-page":"2016","article-title":"Information technology --- MPEG systems technologies --- Part 7: Common encryption in ISO base media file format files","volume":"23001","year":"2016","unstructured":"2016 . Information technology --- MPEG systems technologies --- Part 7: Common encryption in ISO base media file format files . Standard ISO\/IEC 23001-7 : 2016 . International Organization for Standardization, Geneva, CH. https:\/\/www.iso.org\/standard\/68042.html 2016. Information technology --- MPEG systems technologies --- Part 7: Common encryption in ISO base media file format files. Standard ISO\/IEC 23001-7:2016. International Organization for Standardization, Geneva, CH. https:\/\/www.iso.org\/standard\/68042.html","journal-title":"Standard ISO\/IEC"},{"key":"e_1_3_2_1_3_1","volume-title":"Proceedings of the 12th USENIX Conference on Operating Systems Design and Implementation","author":"Abadi Mart\u00edn","year":"2016","unstructured":"Mart\u00edn Abadi , Paul Barham , Jianmin Chen , Zhifeng Chen , Andy Davis , Jeffrey Dean , Matthieu Devin , Sanjay Ghemawat , Geoffrey Irving , Michael Isard , Manjunath Kudlur , Josh Levenberg , Rajat Monga , Sherry Moore , Derek G. Murray , Benoit Steiner , Paul Tucker , Vijay Vasudevan , Pete Warden , Martin Wicke , Yuan Yu , and Xiaoqiang Zheng . 2016 . TensorFlow: A System for Large-scale Machine Learning . In Proceedings of the 12th USENIX Conference on Operating Systems Design and Implementation ( Savannah, GA, USA) (OSDI'16). USENIX Association, Berkeley, CA, USA, 265--283. http:\/\/dl.acm.org\/citation.cfm?id=3026877.3026899 Mart\u00edn Abadi, Paul Barham, Jianmin Chen, Zhifeng Chen, Andy Davis, Jeffrey Dean, Matthieu Devin, Sanjay Ghemawat, Geoffrey Irving, Michael Isard, Manjunath Kudlur, Josh Levenberg, Rajat Monga, Sherry Moore, Derek G. Murray, Benoit Steiner, Paul Tucker, Vijay Vasudevan, Pete Warden, Martin Wicke, Yuan Yu, and Xiaoqiang Zheng. 2016. TensorFlow: A System for Large-scale Machine Learning. In Proceedings of the 12th USENIX Conference on Operating Systems Design and Implementation (Savannah, GA, USA) (OSDI'16). USENIX Association, Berkeley, CA, USA, 265--283. http:\/\/dl.acm.org\/citation.cfm?id=3026877.3026899"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2018.00061"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2016.11"},{"key":"e_1_3_2_1_6_1","volume-title":"Cnvlutin: Ineffectual-Neuron-Free Deep Neural Network Computing. In 2016 ACM\/IEEE 43rd Annual International Symposium on Computer Architecture (ISCA). 1--13","author":"Albericio J.","unstructured":"J. Albericio , P. Judd , T. Hetherington , T. Aamodt , N. E. Jerger , and A. Moshovos . 2016 . Cnvlutin: Ineffectual-Neuron-Free Deep Neural Network Computing. In 2016 ACM\/IEEE 43rd Annual International Symposium on Computer Architecture (ISCA). 1--13 . J. Albericio, P. Judd, T. Hetherington, T. Aamodt, N. E. Jerger, and A. Moshovos. 2016. Cnvlutin: Ineffectual-Neuron-Free Deep Neural Network Computing. In 2016 ACM\/IEEE 43rd Annual International Symposium on Computer Architecture (ISCA). 1--13."},{"key":"e_1_3_2_1_7_1","volume-title":"Trustzone: Integrated Hardware and Software Security. (01","author":"Alves Thaynara","year":"2004","unstructured":"Thaynara Alves and D. Felton . 2004 . Trustzone: Integrated Hardware and Software Security. (01 2004). Thaynara Alves and D. Felton. 2004. Trustzone: Integrated Hardware and Software Security. (01 2004)."},{"key":"e_1_3_2_1_8_1","volume-title":"CSI NN: Reverse Engineering of Neural Network Architectures Through Electromagnetic Side Channel. In 28th USENIX Security Symposium (USENIX Security 19)","author":"Batina Lejla","year":"2019","unstructured":"Lejla Batina , Shivam Bhasin , Dirmanto Jap , and Stjepan Picek . 2019 . CSI NN: Reverse Engineering of Neural Network Architectures Through Electromagnetic Side Channel. In 28th USENIX Security Symposium (USENIX Security 19) . USENIX Association, Santa Clara, CA, 515--532. https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/batina Lejla Batina, Shivam Bhasin, Dirmanto Jap, and Stjepan Picek. 2019. CSI NN: Reverse Engineering of Neural Network Architectures Through Electromagnetic Side Channel. In 28th USENIX Security Symposium (USENIX Security 19). USENIX Association, Santa Clara, CA, 515--532. https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/batina"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3352460.3358310"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2010.5416657"},{"key":"e_1_3_2_1_11_1","volume-title":"TVM: An Automated End-to-End Optimizing Compiler for Deep Learning. In 13th USENIX Symposium on Operating Systems Design and Implementation (OSDI 18)","author":"Chen Tianqi","year":"2018","unstructured":"Tianqi Chen , Thierry Moreau , Ziheng Jiang , Lianmin Zheng , Eddie Yan , Haichen Shen , Meghan Cowan , Leyuan Wang , Yuwei Hu , Luis Ceze , Carlos Guestrin , and Arvind Krishnamurthy . 2018 . TVM: An Automated End-to-End Optimizing Compiler for Deep Learning. In 13th USENIX Symposium on Operating Systems Design and Implementation (OSDI 18) . USENIX Association, Carlsbad, CA, 578--594. https:\/\/www.usenix.org\/conference\/osdi18\/presentation\/chen Tianqi Chen, Thierry Moreau, Ziheng Jiang, Lianmin Zheng, Eddie Yan, Haichen Shen, Meghan Cowan, Leyuan Wang, Yuwei Hu, Luis Ceze, Carlos Guestrin, and Arvind Krishnamurthy. 2018. TVM: An Automated End-to-End Optimizing Compiler for Deep Learning. In 13th USENIX Symposium on Operating Systems Design and Implementation (OSDI 18). USENIX Association, Carlsbad, CA, 578--594. https:\/\/www.usenix.org\/conference\/osdi18\/presentation\/chen"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1995896.1995914"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2018.022071131"},{"key":"e_1_3_2_1_14_1","unstructured":"Genome Reference Consortium. 2013. Genome Reference Consortium Human Build 38. https:\/\/www.ncbi.nlm.nih.gov\/assembly\/GCF_000001405.26\/.  Genome Reference Consortium. 2013. Genome Reference Consortium Human Build 38. https:\/\/www.ncbi.nlm.nih.gov\/assembly\/GCF_000001405.26\/."},{"key":"e_1_3_2_1_15_1","volume-title":"Sanctum: Minimal Hardware Extensions for Strong Software Isolation. In 25th USENIX Security Symposium (USENIX Security 16)","author":"Costan Victor","year":"2016","unstructured":"Victor Costan , Ilia Lebedev , and Srinivas Devadas . 2016 . Sanctum: Minimal Hardware Extensions for Strong Software Isolation. In 25th USENIX Security Symposium (USENIX Security 16) . USENIX Association, Austin, TX, 857--874. https:\/\/www.usenix.org\/conference\/usenixsecurity16\/technical-sessions\/presentation\/costan Victor Costan, Ilia Lebedev, and Srinivas Devadas. 2016. Sanctum: Minimal Hardware Extensions for Strong Software Isolation. In 25th USENIX Security Symposium (USENIX Security 16). USENIX Association, Austin, TX, 857--874. https:\/\/www.usenix.org\/conference\/usenixsecurity16\/technical-sessions\/presentation\/costan"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2049662.2049663"},{"key":"e_1_3_2_1_17_1","volume-title":"Proceedings of the 33rd International Conference on International Conference on Machine Learning -","volume":"48","author":"Dowlin Nathan","year":"2016","unstructured":"Nathan Dowlin , Ran Gilad-Bachrach , Kim Laine , Kristin Lauter , Michael Naehrig , and John Wernsing . 2016 . CryptoNets: Applying Neural Networks to Encrypted Data with High Throughput and Accuracy . In Proceedings of the 33rd International Conference on International Conference on Machine Learning - Volume 48 (New York, NY, USA) (ICML'16). JMLR.org, 201--210. Nathan Dowlin, Ran Gilad-Bachrach, Kim Laine, Kristin Lauter, Michael Naehrig, and John Wernsing. 2016. CryptoNets: Applying Neural Networks to Encrypted Data with High Throughput and Accuracy. In Proceedings of the 33rd International Conference on International Conference on Machine Learning - Volume 48 (New York, NY, USA) (ICML'16). JMLR.org, 201--210."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSCC19947.2020.9062907"},{"key":"e_1_3_2_1_20_1","volume-title":"Parallelizable Tree for Efficient Defense Against Memory Replay Attacks. In Cryptographic Hardware and Embedded Systems - CHES","author":"Elbaz Reouven","year":"2007","unstructured":"Reouven Elbaz , David Champagne , Ruby B. Lee , Lionel Torres , Gilles Sassatelli , and Pierre Guillemin . 2007. TEC-Tree : A Low-Cost , Parallelizable Tree for Efficient Defense Against Memory Replay Attacks. In Cryptographic Hardware and Embedded Systems - CHES 2007 , Pascal Paillier and Ingrid Verbauwhede (Eds.). Springer Berlin Heidelberg , Berlin, Heidelberg, 289--302. Reouven Elbaz, David Champagne, Ruby B. Lee, Lionel Torres, Gilles Sassatelli, and Pierre Guillemin. 2007. TEC-Tree: A Low-Cost, Parallelizable Tree for Efficient Defense Against Memory Replay Attacks. In Cryptographic Hardware and Embedded Systems - CHES 2007, Pascal Paillier and Ingrid Verbauwhede (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 289--302."},{"key":"e_1_3_2_1_21_1","volume-title":"Iso-X: A Flexible Architecture for Hardware-Managed Isolated Execution. In 2014 47th Annual IEEE\/ACM International Symposium on Microarchitecture. 190--202","author":"Evtyushkin D.","unstructured":"D. Evtyushkin , J. Elwell , M. Ozsoy , D. Ponomarev , N. A. Ghazaleh , and R. Riley . 2014 . Iso-X: A Flexible Architecture for Hardware-Managed Isolated Execution. In 2014 47th Annual IEEE\/ACM International Symposium on Microarchitecture. 190--202 . D. Evtyushkin, J. Elwell, M. Ozsoy, D. Ponomarev, N. A. Ghazaleh, and R. Riley. 2014. Iso-X: A Flexible Architecture for Hardware-Managed Isolated Execution. In 2014 47th Annual IEEE\/ACM International Symposium on Microarchitecture. 190--202."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382536.2382540"},{"key":"e_1_3_2_1_23_1","volume-title":"Dynamic Channel Pruning: Feature Boosting and Suppression. In International Conference on Learning Representations. https:\/\/openreview.net\/forum?id=BJxh2j0qYm","author":"Gao Xitong","year":"2019","unstructured":"Xitong Gao , Yiren Zhao , \u0141ukasz Dudziak , Robert Mullins , and Cheng zhong Xu . 2019 . Dynamic Channel Pruning: Feature Boosting and Suppression. In International Conference on Learning Representations. https:\/\/openreview.net\/forum?id=BJxh2j0qYm Xitong Gao, Yiren Zhao, \u0141ukasz Dudziak, Robert Mullins, and Cheng zhong Xu. 2019. Dynamic Channel Pruning: Feature Boosting and Suppression. In International Conference on Learning Representations. https:\/\/openreview.net\/forum?id=BJxh2j0qYm"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2003.1183547"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2016.124"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/11693383_7"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2016.30"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_2_1_29_1","volume-title":"Channel Pruning for Accelerating Very Deep Neural Networks. In The IEEE International Conference on Computer Vision (ICCV).","author":"He Yihui","year":"2017","unstructured":"Yihui He , Xiangyu Zhang , and Jian Sun . 2017 . Channel Pruning for Accelerating Very Deep Neural Networks. In The IEEE International Conference on Computer Vision (ICCV). Yihui He, Xiangyu Zhang, and Jian Sun. 2017. Channel Pruning for Accelerating Very Deep Neural Networks. In The IEEE International Conference on Computer Vision (ICCV)."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2566673"},{"key":"e_1_3_2_1_31_1","volume-title":"Mobilenets: Efficient Convolutional Neural Networks for Nobile Vision Applications. arXiv e-print arXiv:1704.04861","author":"Howard Andrew G","year":"2017","unstructured":"Andrew G Howard , Menglong Zhu , Bo Chen , Dmitry Kalenichenko , Weijun Wang , Tobias Weyand , Marco Andreetto , and Hartwig Adam . 2017 . Mobilenets: Efficient Convolutional Neural Networks for Nobile Vision Applications. arXiv e-print arXiv:1704.04861 (2017). Andrew G Howard, Menglong Zhu, Bo Chen, Dmitry Kalenichenko, Weijun Wang, Tobias Weyand, Marco Andreetto, and Hartwig Adam. 2017. Mobilenets: Efficient Convolutional Neural Networks for Nobile Vision Applications. arXiv e-print arXiv:1704.04861 (2017)."},{"key":"e_1_3_2_1_32_1","volume-title":"Open Graph Benchmark: Datasets for Machine Learning on Graphs. arXiv preprint arXiv:2005.00687","author":"Hu Weihua","year":"2020","unstructured":"Weihua Hu , Matthias Fey , Marinka Zitnik , Yuxiao Dong , Hongyu Ren , Bowen Liu , Michele Catasta , and Jure Leskovec . 2020. Open Graph Benchmark: Datasets for Machine Learning on Graphs. arXiv preprint arXiv:2005.00687 ( 2020 ). Weihua Hu, Matthias Fey, Marinka Zitnik, Yuxiao Dong, Hongyu Ren, Bowen Liu, Michele Catasta, and Jure Leskovec. 2020. Open Graph Benchmark: Datasets for Machine Learning on Graphs. arXiv preprint arXiv:2005.00687 (2020)."},{"key":"e_1_3_2_1_33_1","volume-title":"GraphLily: Accelerating Graph Linear Algebra on HBM-Equipped FPGAs. International Conference On Computer Aided Design","author":"Hu Yuwei","year":"2021","unstructured":"Yuwei Hu , Yixiao Du , Ecenur Ustun , and Zhiru Zhang . 2021 . GraphLily: Accelerating Graph Linear Algebra on HBM-Equipped FPGAs. International Conference On Computer Aided Design (2021). Yuwei Hu, Yixiao Du, Ecenur Ustun, and Zhiru Zhang. 2021. GraphLily: Accelerating Graph Linear Algebra on HBM-Equipped FPGAs. International Conference On Computer Aided Design (2021)."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/MDAT.2022.3151019"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3195970.3196105"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3352460.3358283"},{"key":"e_1_3_2_1_37_1","volume-title":"Zhiru Zhang, and G. Edward Suh.","author":"Hua Weizhe","year":"2019","unstructured":"Weizhe Hua , Yuan Zhou , Christopher M De Sa , Zhiru Zhang, and G. Edward Suh. 2019 . Channel Gating Neural Networks. In Advances in Neural Information Processing Systems 32, H. Wallach, H. Larochelle, A. Beygelzimer, F. d'Alch\u00e9-Buc, E. Fox, and R. Garnett (Eds.). Curran Associates, Inc ., 1884--1894. http:\/\/papers.nips.cc\/paper\/8464-channel-gating-neural-networks.pdf Weizhe Hua, Yuan Zhou, Christopher M De Sa, Zhiru Zhang, and G. Edward Suh. 2019. Channel Gating Neural Networks. In Advances in Neural Information Processing Systems 32, H. Wallach, H. Larochelle, A. Beygelzimer, F. d'Alch\u00e9-Buc, E. Fox, and R. Garnett (Eds.). Curran Associates, Inc., 1884--1894. http:\/\/papers.nips.cc\/paper\/8464-channel-gating-neural-networks.pdf"},{"key":"e_1_3_2_1_38_1","volume-title":"Telekine: Secure Computing with Cloud GPUs. In 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20)","author":"Hunt Tyler","year":"2020","unstructured":"Tyler Hunt , Zhipeng Jia , Vance Miller , Ariel Szekely , Yige Hu , Christopher J. Rossbach , and Emmett Witchel . 2020 . Telekine: Secure Computing with Cloud GPUs. In 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20) . USENIX Association, Santa Clara, CA, 817--833. https:\/\/www.usenix.org\/conference\/nsdi20\/presentation\/hunt Tyler Hunt, Zhipeng Jia, Vance Miller, Ariel Szekely, Yige Hu, Christopher J. Rossbach, and Emmett Witchel. 2020. Telekine: Secure Computing with Cloud GPUs. In 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20). USENIX Association, Santa Clara, CA, 817--833. https:\/\/www.usenix.org\/conference\/nsdi20\/presentation\/hunt"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3297858.3304021"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3079856.3080246"},{"key":"e_1_3_2_1_41_1","volume-title":"Proceedings of the 27th USENIX Conference on Security Symposium","author":"Juvekar Chiraag","year":"2018","unstructured":"Chiraag Juvekar , Vinod Vaikuntanathan , and Anantha Chandrakasan . 2018 . GAZELLE: A Low Latency Framework for Secure Neural Network Inference . In Proceedings of the 27th USENIX Conference on Security Symposium ( Baltimore, MD, USA) (SEC'18). USENIX Association, USA, 1651--1668. Chiraag Juvekar, Vinod Vaikuntanathan, and Anantha Chandrakasan. 2018. GAZELLE: A Low Latency Framework for Secure Neural Network Inference. In Proceedings of the 27th USENIX Conference on Security Symposium (Baltimore, MD, USA) (SEC'18). USENIX Association, USA, 1651--1668."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPEC.2016.7761646"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3419111.3421282"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCA.2015.2414456"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00092"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772751"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3342195.3387532"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2016.2538218"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2005.14"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3300061.3345447"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2016.7783741"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74735-2_16"},{"key":"e_1_3_2_1_53_1","unstructured":"Jure Leskovec and Andrej Krevl. 2014. SNAP Datasets: Stanford Large Network Dataset Collection. http:\/\/snap.stanford.edu\/data.  Jure Leskovec and Andrej Krevl. 2014. SNAP Datasets: Stanford Large Network Dataset Collection. http:\/\/snap.stanford.edu\/data."},{"key":"e_1_3_2_1_54_1","volume-title":"Pruning Filters for Efficient ConvNets. In International Conference on Learning Representations.","author":"Li Hao","year":"2017","unstructured":"Hao Li , Asim Kadav , Igor Durdanovic , Hanan Samet , and Hans Peter Graf . 2017 . Pruning Filters for Efficient ConvNets. In International Conference on Learning Representations. Hao Li, Asim Kadav, Igor Durdanovic, Hanan Samet, and Hans Peter Graf. 2017. Pruning Filters for Efficient ConvNets. In International Conference on Learning Representations."},{"key":"e_1_3_2_1_55_1","unstructured":"Helger Lipmaa David Wagner and Phillip Rogaway. 2000. Comments to NIST concerning AES modes of operation: CTR-mode encryption.  Helger Lipmaa David Wagner and Phillip Rogaway. 2000. Comments to NIST concerning AES modes of operation: CTR-mode encryption."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134056"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2847263.2847274"},{"key":"e_1_3_2_1_58_1","unstructured":"Zhuang Liu Jianguo Li Zhiqiang Shen Gao Huang Shoumeng Yan and Changshui Zhang. 2017. Learning Efficient Convolutional Networks through Network Slimming. In ICCV.  Zhuang Liu Jianguo Li Zhiqiang Shen Gao Huang Shoumeng Yan and Changshui Zhang. 2017. Learning Efficient Convolutional Networks through Network Slimming. In ICCV."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/2948618.2954331"},{"key":"e_1_3_2_1_60_1","volume-title":"Protocols for Public Key Cryptosystems. In 1980 IEEE Symposium on Security and Privacy. 122--122","author":"Merkle Ralph C.","year":"1980","unstructured":"Ralph C. Merkle . 1980 . Protocols for Public Key Cryptosystems. In 1980 IEEE Symposium on Security and Privacy. 122--122 . Ralph C. Merkle. 1980. Protocols for Public Key Cryptosystems. In 1980 IEEE Symposium on Security and Privacy. 122--122."},{"key":"e_1_3_2_1_61_1","volume-title":"Delphi: A Cryptographic Inference Service for Neural Networks. In 29th USENIX Security Symposium (USENIX Security 20)","author":"Mishra Pratyush","year":"2020","unstructured":"Pratyush Mishra , Ryan Lehmkuhl , Akshayaram Srinivasan , Wenting Zheng , and Raluca Ada Popa . 2020 . Delphi: A Cryptographic Inference Service for Neural Networks. In 29th USENIX Security Symposium (USENIX Security 20) . USENIX Association, Boston, MA. https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/mishra Pratyush Mishra, Ryan Lehmkuhl, Akshayaram Srinivasan, Wenting Zheng, and Raluca Ada Popa. 2020. Delphi: A Cryptographic Inference Service for Neural Networks. In 29th USENIX Security Symposium (USENIX Security 20). USENIX Association, Boston, MA. https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/mishra"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2019.2928962"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/3079856.3080254"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417274"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA51647.2021.00013"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2007.44"},{"key":"e_1_3_2_1_67_1","volume-title":"Glow: Graph Lowering Compiler Techniques for Neural Networks. CoRR abs\/1805.00907","author":"Rotem Nadav","year":"2018","unstructured":"Nadav Rotem , Jordan Fix , Saleem Abdulrasool , Summer Deng , Roman Dzhabarov , James Hegeman , Roman Levenstein , Bert Maher , Nadathur Satish , Jakob Olesen , Jongsoo Park , Artem Rakhov , and Misha Smelyanskiy . 2018 . Glow: Graph Lowering Compiler Techniques for Neural Networks. CoRR abs\/1805.00907 (2018). arXiv:1805.00907 http:\/\/arxiv.org\/abs\/1805.00907 Nadav Rotem, Jordan Fix, Saleem Abdulrasool, Summer Deng, Roman Dzhabarov, James Hegeman, Roman Levenstein, Bert Maher, Nadathur Satish, Jakob Olesen, Jongsoo Park, Artem Rakhov, and Misha Smelyanskiy. 2018. Glow: Graph Lowering Compiler Techniques for Neural Networks. CoRR abs\/1805.00907 (2018). arXiv:1805.00907 http:\/\/arxiv.org\/abs\/1805.00907"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2018.00041"},{"key":"e_1_3_2_1_69_1","volume-title":"SCALE-Sim: Systolic CNN Accelerator Simulator. arXiv preprint arXiv:1811.02883","author":"Samajdar Ananda","year":"2018","unstructured":"Ananda Samajdar , Yuhao Zhu , Paul Whatmough , Matthew Mattina , and Tushar Krishna . 2018. SCALE-Sim: Systolic CNN Accelerator Simulator. arXiv preprint arXiv:1811.02883 ( 2018 ). Ananda Samajdar, Yuhao Zhu, Paul Whatmough, Matthew Mattina, and Tushar Krishna. 2018. SCALE-Sim: Systolic CNN Accelerator Simulator. arXiv preprint arXiv:1811.02883 (2018)."},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2006.11"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.5555\/956417.956575"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/782814.782838"},{"key":"e_1_3_2_1_73_1","volume-title":"TNPU: Supporting Trusted Execution with Tree-less Integrity Protection for Neural Processing Unit. 2022 IEEE International Symposium on High-Performance Computer Architecture (HPCA).","author":"Jongse Park Sunho Lee Seonjin Na","year":"2022","unstructured":"Seonjin Na Jongse Park Sunho Lee , Jungwoo Kim and Jaehyuk Huh . 2022 . TNPU: Supporting Trusted Execution with Tree-less Integrity Protection for Neural Processing Unit. 2022 IEEE International Symposium on High-Performance Computer Architecture (HPCA). Seonjin Na Jongse Park Sunho Lee, Jungwoo Kim and Jaehyuk Huh. 2022. TNPU: Supporting Trusted Execution with Tree-less Integrity Protection for Neural Processing Unit. 2022 IEEE International Symposium on High-Performance Computer Architecture (HPCA)."},{"key":"e_1_3_2_1_74_1","volume-title":"Emer","author":"Sze Vivienne","year":"2017","unstructured":"Vivienne Sze , Yu-Hsin Chen , Tien-Ju Yang , and Joel S . Emer . 2017 . Efficient Processing of Deep Neural Networks: A Tutorial and Survey. CoRR abs\/1703.09039 (2017). arXiv:1703.09039 http:\/\/arxiv.org\/abs\/1703.09039 Vivienne Sze, Yu-Hsin Chen, Tien-Ju Yang, and Joel S. Emer. 2017. Efficient Processing of Deep Neural Networks: A Tutorial and Survey. CoRR abs\/1703.09039 (2017). arXiv:1703.09039 http:\/\/arxiv.org\/abs\/1703.09039"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/2150976.2151022"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173162.3177155"},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/378993.379237"},{"key":"e_1_3_2_1_78_1","volume-title":"Proceedings on Privacy Enhancing Technologies","author":"Th\u00e9o Ryffel David Pointcheval","year":"2022","unstructured":"David Pointcheval Th\u00e9o Ryffel , Pierre Tholoniat and Francis Bach . 2022 . AriaNN: Low-Interaction Privacy-Preserving Deep Learning via Function Secret Sharing . In Proceedings on Privacy Enhancing Technologies 2022. David Pointcheval Th\u00e9o Ryffel, Pierre Tholoniat and Francis Bach. 2022. AriaNN: Low-Interaction Privacy-Preserving Deep Learning via Function Secret Sharing. In Proceedings on Privacy Enhancing Technologies 2022."},{"key":"e_1_3_2_1_79_1","volume-title":"Privado: Practical and Secure DNN Inference. CoRR abs\/1810.00602","author":"Tople Shruti","year":"2018","unstructured":"Shruti Tople , Karan Grover , Shweta Shinde , Ranjita Bhagwan , and Ramachandran Ramjee . 2018 . Privado: Practical and Secure DNN Inference. CoRR abs\/1810.00602 (2018). arXiv:1810.00602 http:\/\/arxiv.org\/abs\/1810.00602 Shruti Tople, Karan Grover, Shweta Shinde, Ranjita Bhagwan, and Ramachandran Ramjee. 2018. Privado: Practical and Secure DNN Inference. CoRR abs\/1810.00602 (2018). arXiv:1810.00602 http:\/\/arxiv.org\/abs\/1810.00602"},{"key":"e_1_3_2_1_80_1","volume-title":"Verifiable and Private Execution of Neural Networks in Trusted Hardware. In International Conference on Learning Representations. https:\/\/openreview.net\/forum?id=rJVorjCcKQ","author":"Tramer Florian","year":"2019","unstructured":"Florian Tramer and Dan Boneh . 2019 . Slalom: Fast , Verifiable and Private Execution of Neural Networks in Trusted Hardware. In International Conference on Learning Representations. https:\/\/openreview.net\/forum?id=rJVorjCcKQ Florian Tramer and Dan Boneh. 2019. Slalom: Fast, Verifiable and Private Execution of Neural Networks in Trusted Hardware. In International Conference on Learning Representations. https:\/\/openreview.net\/forum?id=rJVorjCcKQ"},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173162.3173193"},{"key":"e_1_3_2_1_82_1","volume-title":"Graviton: Trusted Execution Environments on GPUs. In 13th USENIX Symposium on Operating Systems Design and Implementation (OSDI 18)","author":"Volos Stavros","year":"2018","unstructured":"Stavros Volos , Kapil Vaswani , and Rodrigo Bruno . 2018 . Graviton: Trusted Execution Environments on GPUs. In 13th USENIX Symposium on Operating Systems Design and Implementation (OSDI 18) . USENIX Association, Carlsbad, CA, 681--696. https:\/\/www.usenix.org\/conference\/osdi18\/presentation\/volos Stavros Volos, Kapil Vaswani, and Rodrigo Bruno. 2018. Graviton: Trusted Execution Environments on GPUs. In 13th USENIX Symposium on Operating Systems Design and Implementation (OSDI 18). USENIX Association, Carlsbad, CA, 681--696. https:\/\/www.usenix.org\/conference\/osdi18\/presentation\/volos"},{"key":"e_1_3_2_1_83_1","volume-title":"SecureNN: Efficient and Private Neural Network Training. In Privacy Enhancing Technologies Symposium. (PETS","author":"Wagh Sameer","year":"2019","unstructured":"Sameer Wagh , Divya Gupta , and Nishanth Chandran . 2019 . SecureNN: Efficient and Private Neural Network Training. In Privacy Enhancing Technologies Symposium. (PETS 2019). https:\/\/www.microsoft.com\/en-us\/research\/publication\/securenn-efficient-and-private-neural-network-training\/ Sameer Wagh, Divya Gupta, and Nishanth Chandran. 2019. SecureNN: Efficient and Private Neural Network Training. In Privacy Enhancing Technologies Symposium. (PETS 2019). https:\/\/www.microsoft.com\/en-us\/research\/publication\/securenn-efficient-and-private-neural-network-training\/"},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2021-0011"},{"key":"e_1_3_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1145\/3310273.3323070"},{"key":"e_1_3_2_1_86_1","volume-title":"CHERI: A Hybrid Capability-System Architecture for Scalable Software Compartmentalization. In 2015 IEEE Symposium on Security and Privacy. 20--37","author":"Watson Robert N.M.","year":"2015","unstructured":"Robert N.M. Watson , Jonathan Woodruff , Peter G. Neumann , Simon W. Moore , Jonathan Anderson , David Chisnall , Nirav Dave , Brooks Davis , Khilan Gudka , Ben Laurie , Steven J. Murdoch , Robert Norton , Michael Roe , Stacey Son , and Munra Vadera . 2015 . CHERI: A Hybrid Capability-System Architecture for Scalable Software Compartmentalization. In 2015 IEEE Symposium on Security and Privacy. 20--37 . Robert N.M. Watson, Jonathan Woodruff, Peter G. Neumann, Simon W. Moore, Jonathan Anderson, David Chisnall, Nirav Dave, Brooks Davis, Khilan Gudka, Ben Laurie, Steven J. Murdoch, Robert Norton, Michael Roe, Stacey Son, and Munra Vadera. 2015. CHERI: A Hybrid Capability-System Architecture for Scalable Software Compartmentalization. In 2015 IEEE Symposium on Security and Privacy. 20--37."},{"key":"e_1_3_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274696"},{"key":"e_1_3_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2005.30"},{"key":"e_1_3_2_1_89_1","unstructured":"Xilinx. 2018. CHaiDNN-v2: HLS based Deep Neural Network Accelerator Library for Xilinx Ultrascale+ MPSoCs. https:\/\/github.com\/Xilinx\/CHaiDNN.  Xilinx. 2018. CHaiDNN-v2: HLS based Deep Neural Network Accelerator Library for Xilinx Ultrascale+ MPSoCs. https:\/\/github.com\/Xilinx\/CHaiDNN."},{"key":"e_1_3_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1145\/1150019.1136502"},{"key":"e_1_3_2_1_91_1","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Yan Mengjia","year":"2020","unstructured":"Mengjia Yan , Christopher W. Fletcher , and Josep Torrellas . 2020 . Cache Telepathy: Leveraging Shared Resource Attacks to Learn DNN Architectures . In 29th USENIX Security Symposium (USENIX Security 20) . USENIX Association , 2003--2020. https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/yan Mengjia Yan, Christopher W. Fletcher, and Josep Torrellas. 2020. Cache Telepathy: Leveraging Shared Resource Attacks to Learn DNN Architectures. In 29th USENIX Security Symposium (USENIX Security 20). USENIX Association, 2003--2020. https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/yan"},{"key":"e_1_3_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.5555\/956417.956576"},{"key":"e_1_3_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1145\/3020078.3021737"},{"key":"e_1_3_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.1145\/3503222.3507733"},{"key":"e_1_3_2_1_95_1","doi-asserted-by":"publisher","DOI":"10.1109\/ReConFig.2015.7393332"},{"key":"e_1_3_2_1_96_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00054"}],"event":{"name":"ISCA '22: The 49th Annual International Symposium on Computer Architecture","location":"New York New York","acronym":"ISCA '22","sponsor":["SIGARCH ACM Special Interest Group on Computer Architecture","IEEE CS TCAA IEEE CS technical committee on architectural acoustics"]},"container-title":["Proceedings of the 49th Annual International Symposium on Computer Architecture"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3470496.3527418","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3470496.3527418","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3470496.3527418","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:28Z","timestamp":1750188628000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3470496.3527418"}},"subtitle":["near-zero overhead memory protection for data-intensive accelerators"],"short-title":[],"issued":{"date-parts":[[2022,6,11]]},"references-count":95,"alternative-id":["10.1145\/3470496.3527418","10.1145\/3470496"],"URL":"https:\/\/doi.org\/10.1145\/3470496.3527418","relation":{},"subject":[],"published":{"date-parts":[[2022,6,11]]},"assertion":[{"value":"2022-06-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}