Isn't that still basically limited to research/very targeted small scale use because it has a massive power/performance penalty compared to working on non-encrypted data?
I was thinking about this in the opposite direction, the security implication of this new feature. Now you can change the data directly in memory - another attack vector that you to protect against.
Not in the high-performance computing space, which is the only place where PIM processing seems plausible; the threat models have really diverged between 'protect this phone which will be running Javascript from arbitrary websites from Ruritanian customs agents with physical access to it' and 'protect this compute cluster which runs only executables compiled on the head-node by trusted users'
IMP for In-Memory Processing sound way better than PIM fo Processing In Memory. Hope we could some day get to PARALLEL in-memory processing for even merrier abbreviation.
We’ve updated our terms. By continuing to use the site and/or by logging into your account, you agree to the Site’s updated Terms of Use and Privacy Policy.
38 Comments
View All Comments
evilpaul666 - Monday, August 19, 2019 - link
Isn't there a move towards having DRAM contents encrypted? If you bit-shift ciphertext don't you just get garbage?Ian Cutress - Monday, August 19, 2019 - link
Very good pointRοb - Tuesday, August 20, 2019 - link
Not with homomorphic encryption: https://en.wikipedia.org/wiki/Homomorphic_encrypti...DanNeely - Wednesday, August 21, 2019 - link
Isn't that still basically limited to research/very targeted small scale use because it has a massive power/performance penalty compared to working on non-encrypted data?Memo.Ray - Monday, August 19, 2019 - link
I was thinking about this in the opposite direction, the security implication of this new feature. Now you can change the data directly in memory - another attack vector that you to protect against.Alexvrb - Monday, August 19, 2019 - link
Awesome now we can have side octa channel attacks!imaskar - Tuesday, August 20, 2019 - link
Depends on the use case. If you're selling vms, then yes. If it's your supercomputing cluster, then no, why would you encrypt it?Elstar - Wednesday, August 21, 2019 - link
The problem is not insurmountable. As long as the DPU has the key AND the key is not extractable, then encrypted memory should work with PIM DRAM.TomWomack - Thursday, August 29, 2019 - link
Not in the high-performance computing space, which is the only place where PIM processing seems plausible; the threat models have really diverged between 'protect this phone which will be running Javascript from arbitrary websites from Ruritanian customs agents with physical access to it' and 'protect this compute cluster which runs only executables compiled on the head-node by trusted users'Dodozoid - Monday, August 19, 2019 - link
IMP for In-Memory Processing sound way better than PIM fo Processing In Memory. Hope we could some day get to PARALLEL in-memory processing for even merrier abbreviation.