Skip to main content

2024 | OriginalPaper | Buchkapitel

2. Domain Isolation and Access Control in Multi-tenant Cloud FPGAs

verfasst von : Christophe Bobda, Joel Mandebi Mbongue, Sujan Kumar Saha, Muhammed Kawser Ahmed

Erschienen in: Security of FPGA-Accelerated Cloud Computing Environments

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

While sharing FPGA logic in space and time improves hardware utilization and reduces the overall power consumption in FPGA-accelerated clouds, it also raises security concerns. Accelerators from different tenants running on the same FPGA can be exploited by malicious actors to launch attacks on co-hosted virtual machines, which puts cloud applications and the entire infrastructure at risk. In addition, FPGA-accelerated cloud applications typically rely on a combination of software and hardware components, some of which are provided by non-trusted sources. The software layer executes on CPUs, and the hardware functions run on FPGAs. This type of heterogeneous architecture provides an attack surface that can be exploited by malicious hardware or software processes to breach well-insulated users’ domains. This chapter explores hardware and software infrastructure used to enforce domain isolation and security at the system level in multi-tenant FPGA clouds. The approach we present leverages the Flux Advanced Security Kernel (FLASK) architecture to inherit security policies from software down to hardware accelerators on FPGAs where enforcement mechanisms are implemented. This approach has been prototyped and proven to enforce isolation between co-hosted user domains while incurring minimal communication and power consumption overhead.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Amazon (2017). Amazon EC2 F1 Instances. Amazon (2017). Amazon EC2 F1 Instances.
3.
Zurück zum Zitat Asiatici, M., George, N., Vipin, K., Fahmy, S. A., & Ienne, P. (2017). Virtualized execution runtime for FPGA accelerators in the cloud. IEEE Access, 5, 1900–1910.CrossRef Asiatici, M., George, N., Vipin, K., Fahmy, S. A., & Ienne, P. (2017). Virtualized execution runtime for FPGA accelerators in the cloud. IEEE Access, 5, 1900–1910.CrossRef
4.
Zurück zum Zitat Azab, A. M., Ning, P., Shah, J., Chen, Q., Bhutkar, R., Ganesh, G., Ma, J., & Shen, W. (2014). Hypervision across worlds: Real-time Kernel protection from the ARM TrustZone secure world. In ACM Conference on Computer and Communications Security. Azab, A. M., Ning, P., Shah, J., Chen, Q., Bhutkar, R., Ganesh, G., Ma, J., & Shen, W. (2014). Hypervision across worlds: Real-time Kernel protection from the ARM TrustZone secure world. In ACM Conference on Computer and Communications Security.
5.
Zurück zum Zitat Babu, A., Hareesh, M., Martin, J. P., Cherian, S., & Sastri, Y. (2014). System performance evaluation of para virtualization, container virtualization, and full virtualization using xen, openvz, and xenserver. In 2014 Fourth International Conference on Advances in Computing and Communications (pp. 247–250). IEEE. Babu, A., Hareesh, M., Martin, J. P., Cherian, S., & Sastri, Y. (2014). System performance evaluation of para virtualization, container virtualization, and full virtualization using xen, openvz, and xenserver. In 2014 Fourth International Conference on Advances in Computing and Communications (pp. 247–250). IEEE.
7.
Zurück zum Zitat Bassham III, L. E., Rukhin, A. L., Soto, J., Nechvatal, J. R., Smid, M. E., Barker, E. B., Leigh, S. D., Levenson, M., Vangel, M., Banks, D. L., et al. (2010) SP 800-22 Rev. 1a. A statistical test suite for random and pseudorandom number generators for cryptographic applications. National Institute of Standards & Technology. Bassham III, L. E., Rukhin, A. L., Soto, J., Nechvatal, J. R., Smid, M. E., Barker, E. B., Leigh, S. D., Levenson, M., Vangel, M., Banks, D. L., et al. (2010) SP 800-22 Rev. 1a. A statistical test suite for random and pseudorandom number generators for cryptographic applications. National Institute of Standards & Technology.
8.
Zurück zum Zitat Baumann, A., Peinado, M., Hunt, G. C. (2014) Shielding applications from an untrusted cloud with haven. ACM Transactions on Computer Systems, 33(8), 1–8:26 Baumann, A., Peinado, M., Hunt, G. C. (2014) Shielding applications from an untrusted cloud with haven. ACM Transactions on Computer Systems, 33(8), 1–8:26
9.
Zurück zum Zitat Bobda, C., Mbongue, J. M., Chow, P., Ewais, M., Tarafdar, N., Vega, J. C., Eguro, K., Koch, D., Handagala, S., Leeser, M., et al. (2022) The future of FPGA acceleration in datacenters and the cloud. ACM Transactions on Reconfigurable Technology and Systems (TRETS), 15(3), 1–42.CrossRef Bobda, C., Mbongue, J. M., Chow, P., Ewais, M., Tarafdar, N., Vega, J. C., Eguro, K., Koch, D., Handagala, S., Leeser, M., et al. (2022) The future of FPGA acceleration in datacenters and the cloud. ACM Transactions on Reconfigurable Technology and Systems (TRETS), 15(3), 1–42.CrossRef
10.
Zurück zum Zitat Bobda, C., Mead, J., Whitaker, T. J. L., Kamhoua, C. A., Kwiat, & K. A. (2017). Hardware sandboxing: A novel defense paradigm against hardware trojans in systems on chip. In Applied Reconfigurable Computing - 13th International Symposium, ARC 2017, Delft, The Netherlands, April 3–7, 2017, Proceedings (pp. 47–59). https://doi.org/10.1007/978-3-319-56258-2_5 Bobda, C., Mead, J., Whitaker, T. J. L., Kamhoua, C. A., Kwiat, & K. A. (2017). Hardware sandboxing: A novel defense paradigm against hardware trojans in systems on chip. In Applied Reconfigurable Computing - 13th International Symposium, ARC 2017, Delft, The Netherlands, April 3–7, 2017, Proceedings (pp. 47–59). https://​doi.​org/​10.​1007/​978-3-319-56258-2_​5
11.
Zurück zum Zitat Bobda, C., Whitaker, T. J. L., Kamhoua, C. A., Kwiat, K. A., & Njilla, L. (2017). Synthesis of hardware sandboxes for trojan mitigation in systems on chip. In 2017 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2017, McLean, VA, USA, May 1–5, 2017 (p. 172). https://doi.org/10.1109/HST.2017.7951836 Bobda, C., Whitaker, T. J. L., Kamhoua, C. A., Kwiat, K. A., & Njilla, L. (2017). Synthesis of hardware sandboxes for trojan mitigation in systems on chip. In 2017 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2017, McLean, VA, USA, May 1–5, 2017 (p. 172). https://​doi.​org/​10.​1109/​HST.​2017.​7951836
12.
Zurück zum Zitat Bookstein, A., Kulyukin, V. A., & Raita, T. (2002) Generalized hamming distance. Information Retrieval, 5(4), 353–375.CrossRef Bookstein, A., Kulyukin, V. A., & Raita, T. (2002) Generalized hamming distance. Information Retrieval, 5(4), 353–375.CrossRef
15.
Zurück zum Zitat Dong, Y., Yang, X., Li, J., Liao, G., Tian, K., & Guan, H. (2012). High performance network virtualization with SR-IOV. Journal of Parallel and Distributed Computing, 72(11), 1471–1480.CrossRef Dong, Y., Yang, X., Li, J., Liao, G., Tian, K., & Guan, H. (2012). High performance network virtualization with SR-IOV. Journal of Parallel and Distributed Computing, 72(11), 1471–1480.CrossRef
18.
Zurück zum Zitat Elnaggar, R., Karri, R., & Chakrabarty, K. (2019). Multi-tenant FPGA-based reconfigurable systems: Attacks and defenses. In 2019 Design, Automation & Test in Europe Conference & Exhibition (DATE) (pp. 7–12). IEEE. Elnaggar, R., Karri, R., & Chakrabarty, K. (2019). Multi-tenant FPGA-based reconfigurable systems: Attacks and defenses. In 2019 Design, Automation & Test in Europe Conference & Exhibition (DATE) (pp. 7–12). IEEE.
19.
Zurück zum Zitat Emmi, M., & Giannakopoulou Dimitra, C. S. (2008). Assume-guarantee verification for interface automata. In FM 2008: Formal Methods: 15th International Symposium on Formal Methods, Turku, Finland, May 26–30, 2008 Proceedings 15. Berlin: Springer. Emmi, M., & Giannakopoulou Dimitra, C. S. (2008). Assume-guarantee verification for interface automata. In FM 2008: Formal Methods: 15th International Symposium on Formal Methods, Turku, Finland, May 26–30, 2008 Proceedings 15. Berlin: Springer.
20.
Zurück zum Zitat Fahmy, S. A., Vipin, K., & Shreejith, S. (2015). Virtualized FPGA accelerators for efficient cloud computing. In 2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom) (pp. 430–435). IEEE. Fahmy, S. A., Vipin, K., & Shreejith, S. (2015). Virtualized FPGA accelerators for efficient cloud computing. In 2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom) (pp. 430–435). IEEE.
21.
Zurück zum Zitat Fraser, K., Hand, S., Neugebauer, R., Pratt, I., Warfield, A., & Williamson, M. (2004). Reconstructing I/O. Technical Report, University of Cambridge, Computer Laboratory. Fraser, K., Hand, S., Neugebauer, R., Pratt, I., Warfield, A., & Williamson, M. (2004). Reconstructing I/O. Technical Report, University of Cambridge, Computer Laboratory.
23.
Zurück zum Zitat Glazberg, Z., Moulin, M., Orni, A., Ruah, S., & Zarpas, E. (2007). PSL: Beyond hardware verification. In Next Generation Design and Verification Methodologies for Distributed Embedded Control Systems: Proceedings of the GM R&D Workshop, Bangalore, India, January 2007. Springer Netherlands. Glazberg, Z., Moulin, M., Orni, A., Ruah, S., & Zarpas, E. (2007). PSL: Beyond hardware verification. In Next Generation Design and Verification Methodologies for Distributed Embedded Control Systems: Proceedings of the GM R&D Workshop, Bangalore, India, January 2007. Springer Netherlands.
25.
Zurück zum Zitat Hategekimana, F., & Bobda, C. (2017). Towards the application of flask security architecture to SOC design: Work-in-progress. In Proceedings of the Twelfth IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System Synthesis Companion, CODES+ISSS 2017, Seoul, Republic of Korea, October 15–20, 2017 (pp. 12:1–12:2). https://doi.org/10.1145/3125502.3125558 Hategekimana, F., & Bobda, C. (2017). Towards the application of flask security architecture to SOC design: Work-in-progress. In Proceedings of the Twelfth IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System Synthesis Companion, CODES+ISSS 2017, Seoul, Republic of Korea, October 15–20, 2017 (pp. 12:1–12:2). https://​doi.​org/​10.​1145/​3125502.​3125558
26.
Zurück zum Zitat Hategekimana, F., Mbongue, J. M., Pantho, M. J. H., & Bobda, C. (2018). Inheriting software security policies within hardware IP components. In 26th IEEE Annual International Symposium on Field-Programmable Custom Computing Machines, FCCM 2018, Boulder, CO, USA, April 29–May 1, 2018 (pp. 53–56). https://doi.org/10.1109/FCCM.2018.00017 Hategekimana, F., Mbongue, J. M., Pantho, M. J. H., & Bobda, C. (2018). Inheriting software security policies within hardware IP components. In 26th IEEE Annual International Symposium on Field-Programmable Custom Computing Machines, FCCM 2018, Boulder, CO, USA, April 29–May 1, 2018 (pp. 53–56). https://​doi.​org/​10.​1109/​FCCM.​2018.​00017
27.
Zurück zum Zitat Hategekimana, F., Mbongue, J. M., Pantho, M. J. H., & Bobda, C. (2018). Secure hardware kernels execution in CPU+ FPGA heterogeneous cloud. In 2018 International Conference on Field-Programmable Technology (FPT) (pp. 182–189). IEEE. Hategekimana, F., Mbongue, J. M., Pantho, M. J. H., & Bobda, C. (2018). Secure hardware kernels execution in CPU+ FPGA heterogeneous cloud. In 2018 International Conference on Field-Programmable Technology (FPT) (pp. 182–189). IEEE.
28.
Zurück zum Zitat Hategekimana, F., Nardin, P., & Bobda, C. (2016). Hardware/software isolation and protection architecture for transparent security enforcement in networked devices. In IEEE Computer Society Annual Symposium on VLSI, ISVLSI 2016, Pittsburgh, PA, USA, July 11–13, 2016 (pp. 140–145). https://doi.org/10.1109/ISVLSI.2016.32 Hategekimana, F., Nardin, P., & Bobda, C. (2016). Hardware/software isolation and protection architecture for transparent security enforcement in networked devices. In IEEE Computer Society Annual Symposium on VLSI, ISVLSI 2016, Pittsburgh, PA, USA, July 11–13, 2016 (pp. 140–145). https://​doi.​org/​10.​1109/​ISVLSI.​2016.​32
29.
Zurück zum Zitat Hategekimana, F., Tbatou, A., Bobda, C., Kamhoua, C., & Kwiat, K. (2015). Hardware isolation technique for IRC-based botnets detection. In International Conference on ReConFigurable Computing and FPGAs (ReConFig0́8) (Vol. 0). Cancun, Mexico: IEEE Computer Society. Hategekimana, F., Tbatou, A., Bobda, C., Kamhoua, C., & Kwiat, K. (2015). Hardware isolation technique for IRC-based botnets detection. In International Conference on ReConFigurable Computing and FPGAs (ReConFig0́8) (Vol. 0). Cancun, Mexico: IEEE Computer Society.
32.
Zurück zum Zitat Hennessy, J. L., & Patterson, D. A. (2011). Computer architecture: a quantitative approach. Elsevier. Hennessy, J. L., & Patterson, D. A. (2011). Computer architecture: a quantitative approach. Elsevier.
34.
Zurück zum Zitat Huffmire, T., Brotherton, B., Wang, G., Sherwood, T., Kastner, R., Levin, T., Nguyen, T., & Irvine, C. (2007). Moats and drawbridges: An isolation primitive for reconfigurable hardware based systems. In 2007 IEEE Symposium on Security and Privacy (SP ’07) (pp. 281–295). https://doi.org/10.1109/SP.2007.28 Huffmire, T., Brotherton, B., Wang, G., Sherwood, T., Kastner, R., Levin, T., Nguyen, T., & Irvine, C. (2007). Moats and drawbridges: An isolation primitive for reconfigurable hardware based systems. In 2007 IEEE Symposium on Security and Privacy (SP ’07) (pp. 281–295). https://​doi.​org/​10.​1109/​SP.​2007.​28
39.
Zurück zum Zitat Mandebi Mbongue, J., Saha, S. K., & Bobda, C. (2021). Domain Isolation in FPGA-accelerated cloud and data center applications. In Proceedings of the 2021 on Great Lakes Symposium on VLSI (pp. 283–288). Mandebi Mbongue, J., Saha, S. K., & Bobda, C. (2021). Domain Isolation in FPGA-accelerated cloud and data center applications. In Proceedings of the 2021 on Great Lakes Symposium on VLSI (pp. 283–288).
41.
Zurück zum Zitat Mbongue, J. M., Hategekimana, F., Kwadjo, D. T., Andrews, D., & Bobda, C. (2018). FPGAVirt: A novel virtualization framework for FPGAs in the cloud. In 11th IEEE International Conference on Cloud Computing, CLOUD 2018, San Francisco, CA, USA, July 2–7, 2018 (pp. 862–865). https://doi.org/10.1109/CLOUD.2018.00122 Mbongue, J. M., Hategekimana, F., Kwadjo, D. T., Andrews, D., & Bobda, C. (2018). FPGAVirt: A novel virtualization framework for FPGAs in the cloud. In 11th IEEE International Conference on Cloud Computing, CLOUD 2018, San Francisco, CA, USA, July 2–7, 2018 (pp. 862–865). https://​doi.​org/​10.​1109/​CLOUD.​2018.​00122
43.
Zurück zum Zitat Mbongue, J. M., Kwadjo, D. T., Shuping, A., & Bobda, C. (2021). Deploying multi-tenant FPGAs within linux-based cloud infrastructure. ACM Transactions on Reconfigurable Technology and Systems (TRETS), 15(2), 1–31. Mbongue, J. M., Kwadjo, D. T., Shuping, A., & Bobda, C. (2021). Deploying multi-tenant FPGAs within linux-based cloud infrastructure. ACM Transactions on Reconfigurable Technology and Systems (TRETS), 15(2), 1–31.
44.
Zurück zum Zitat Mbongue, J. M., Saha, S. K., & Bobda, C. (2021). A security architecture for domain isolation in multi-tenant cloud FPGAs. In 2021 IEEE Computer Society Annual Symposium on VLSI (ISVLSI) (pp. 290–295). IEEE. Mbongue, J. M., Saha, S. K., & Bobda, C. (2021). A security architecture for domain isolation in multi-tenant cloud FPGAs. In 2021 IEEE Computer Society Annual Symposium on VLSI (ISVLSI) (pp. 290–295). IEEE.
45.
Zurück zum Zitat Mbongue, J. M., Shuping, A., Bhowmik, P., & Bobda, C. (2020). Architecture support for FPGA multi-tenancy in the cloud. In 2020 IEEE 31st International Conference on Application-Specific Systems, Architectures and Processors (ASAP) (pp. 125–132). IEEE. Mbongue, J. M., Shuping, A., Bhowmik, P., & Bobda, C. (2020). Architecture support for FPGA multi-tenancy in the cloud. In 2020 IEEE 31st International Conference on Application-Specific Systems, Architectures and Processors (ASAP) (pp. 125–132). IEEE.
47.
Zurück zum Zitat Mell, P., Grance, T., et al. (2011). The NIST Definition of Cloud Computing, Special Publication (NIST SP). National Institute of Standards and Technology, Gaithersburg, MD, USA. Mell, P., Grance, T., et al. (2011). The NIST Definition of Cloud Computing, Special Publication (NIST SP). National Institute of Standards and Technology, Gaithersburg, MD, USA.
49.
Zurück zum Zitat Nelson, M., Lim, B. H., Hutchins, G., et al. (2005). Fast transparent migration for virtual machines. In USENIX Annual Technical Conference, General Track (pp. 391–394). Nelson, M., Lim, B. H., Hutchins, G., et al. (2005). Fast transparent migration for virtual machines. In USENIX Annual Technical Conference, General Track (pp. 391–394).
51.
Zurück zum Zitat Putnam, A., Caulfield, A., Chung, E., Chiou, D., Constantinides, K., Demme, J., Esmaeilzadeh, H., Fowers, J., Gopal, G., Gray, J., Haselman, M., Hauck, S., Heil, S., Hormati, A., Kim, J. Y., Lanka, S., Larus, J., Peterson, E., Pope, S., Smith, A., Thong, J., Xiao, P., & Burger, D. (2014). A reconfigurable fabric for accelerating large-scale datacenter services. In 2014 ACM/IEEE 41st International Symposium on Computer Architecture (ISCA) (pp. 13–24). https://doi.org/10.1109/ISCA.2014.6853195 Putnam, A., Caulfield, A., Chung, E., Chiou, D., Constantinides, K., Demme, J., Esmaeilzadeh, H., Fowers, J., Gopal, G., Gray, J., Haselman, M., Hauck, S., Heil, S., Hormati, A., Kim, J. Y., Lanka, S., Larus, J., Peterson, E., Pope, S., Smith, A., Thong, J., Xiao, P., & Burger, D. (2014). A reconfigurable fabric for accelerating large-scale datacenter services. In 2014 ACM/IEEE 41st International Symposium on Computer Architecture (ISCA) (pp. 13–24). https://​doi.​org/​10.​1109/​ISCA.​2014.​6853195
52.
Zurück zum Zitat Ramesh, C., Patil, S. B., Dhanuskodi, S. N., George Provelengios, S. P., Holcomb, D., & Tessier, R. (2018). FPGA side channel attacks without physical access. In FCCM 2008. 26th International Symposium on Field-Programmable Custom Computing Machines. Ramesh, C., Patil, S. B., Dhanuskodi, S. N., George Provelengios, S. P., Holcomb, D., & Tessier, R. (2018). FPGA side channel attacks without physical access. In FCCM 2008. 26th International Symposium on Field-Programmable Custom Computing Machines.
56.
Zurück zum Zitat Saha, S. K., & Bobda, C. (2020). FPGA accelerated embedded system security through hardware isolation. In 2020 Asian Hardware Oriented Security and Trust Symposium (AsianHOST) (pp. 1–6). IEEE. Saha, S. K., & Bobda, C. (2020). FPGA accelerated embedded system security through hardware isolation. In 2020 Asian Hardware Oriented Security and Trust Symposium (AsianHOST) (pp. 1–6). IEEE.
57.
Zurück zum Zitat Salot, P. (2013). A survey of various scheduling algorithm in cloud computing environment. International Journal of Research in Engineering and Technology, 2(2), 131–135.CrossRef Salot, P. (2013). A survey of various scheduling algorithm in cloud computing environment. International Journal of Research in Engineering and Technology, 2(2), 131–135.CrossRef
58.
Zurück zum Zitat Victor Costan, S. D. (2016). Intel SGX Explained. Victor Costan, S. D. (2016). Intel SGX Explained.
59.
60.
Zurück zum Zitat Xilinx (2014). TrustZone Technology Support in Zynq-7000 All Programmable SoCs. Xilinx (2014). TrustZone Technology Support in Zynq-7000 All Programmable SoCs.
61.
Zurück zum Zitat Yee, B., Sehr, D., Dardyk, G., Chen, J. B., Muth, R., Ormandy, T., Okasaka, S., Narula, N., & Fullagar, N. (2009). Native client: A sandbox for portable, untrusted x86 native code. In 2009 30th IEEE Symposium on Security and Privacy (pp. 79–93). https://doi.org/10.1109/SP.2009.25 Yee, B., Sehr, D., Dardyk, G., Chen, J. B., Muth, R., Ormandy, T., Okasaka, S., Narula, N., & Fullagar, N. (2009). Native client: A sandbox for portable, untrusted x86 native code. In 2009 30th IEEE Symposium on Security and Privacy (pp. 79–93). https://​doi.​org/​10.​1109/​SP.​2009.​25
62.
Zurück zum Zitat Zhang, B., Wang, X., Lai, R., Yang, L., Luo, Y., Li, X., & Wang, Z. (2010). A survey on I/O virtualization and optimization. In 2010 Fifth Annual ChinaGrid Conference (ChinaGrid) (pp. 117–123). IEEE. Zhang, B., Wang, X., Lai, R., Yang, L., Luo, Y., Li, X., & Wang, Z. (2010). A survey on I/O virtualization and optimization. In 2010 Fifth Annual ChinaGrid Conference (ChinaGrid) (pp. 117–123). IEEE.
63.
Zurück zum Zitat Zhang, F., Liu, G., Fu, X., & Yahyapour, R. (2018). A survey on virtual machine migration: Challenges, techniques, and open issues. IEEE Communications Surveys & Tutorials, 20(2), 1206–1243.CrossRef Zhang, F., Liu, G., Fu, X., & Yahyapour, R. (2018). A survey on virtual machine migration: Challenges, techniques, and open issues. IEEE Communications Surveys & Tutorials, 20(2), 1206–1243.CrossRef
Metadaten
Titel
Domain Isolation and Access Control in Multi-tenant Cloud FPGAs
verfasst von
Christophe Bobda
Joel Mandebi Mbongue
Sujan Kumar Saha
Muhammed Kawser Ahmed
Copyright-Jahr
2024
DOI
https://doi.org/10.1007/978-3-031-45395-3_2

Neuer Inhalt