Auflistung nach Schlagwort "RDMA"
1 - 3 von 3
Treffer pro Seite
Sortieroptionen
- TextdokumentDMA Security in the Presence of IOMMUs(Tagungsband des FG-BS Frühjahrstreffens 2022, 2022) Schwarz, Christian; Reusch, Viktor; Planeta, MaksymFaulty, vulnerable or malicious PCIe devices can harm a system through DMA. IOMMUs can act as a security mechanism to protect against this problem by restricting the memory that is accessible via DMA. Unfortunately, there are methods to bypass the IOMMU restrictions. This paper is a survey over the currently existing bypasses and their feasibility. Current systems might be exploited from any untrusted source of DMA, which includes peripheral PCIe devices, virtual machines using SR-IOV, and even RDMA network cards, which enable remote attacks. Key strategies for the attacks presented here are Rowhammer, cache side-channels, and the exploitation of weaknesses in device drivers, e.g., for network cards, or protocols like PCIe or Ethernet OAM. An attacker can potentially achieve denial of service, the reading of confidential data, and even arbitrary code execution. Fortunately, there are some precautions to reduce the risks for affected systems.
- TextdokumentFast CSV Loading Using GPUs and RDMA for In-Memory Data Processing(BTW 2021, 2021) Kumaigorodski, Alexander; Lutz, Clemens; Markl, VolkerComma-separated values (CSV) is a widely-used format for data exchange. Due to the format's prevalence, virtually all industrial-strength database systems and stream processing frameworks support importing CSV input. However, loading CSV input close to the speed of I/O hardware is challenging. Modern I/O devices such as InfiniBand NICs and NVMe SSDs are capable of sustaining high transfer rates of 100 Gbit/s and higher. At the same time
- KonferenzbeitragWorking with Disaggregated Systems. What are the Challenges and Opportunities of RDMA and CXL?(BTW 2023, 2023) Geyer, Andreas; Ritter, Daniel; Lee, Dong Hun; Ahn, Minseon; Pietrzyk, Johannes; Krause, Alexander; Habich, Dirk; Lehner, WolfgangThe usage of disaggregated systems in large scale data-centers offers a lot of flexibility and easy scalability in comparison to the traditional statically configured scale-up and scaleout systems. Disaggregated architectures allow for the creation of software composable systems in order to create a virtual machine by software out of the pool of available hardware resources. In this paper, we propose a memory disaggregation classification and applicable use cases. We would be delighted to present our ideas and the memory disaggregation classification at the workshop and discuss the presented ideas. The valuable feedback of the attendees will help us to further refine our classification both in terms of preciseness and applicability.