all InfoSec news
The Case for the Anonymization of Offloaded Computation. (arXiv:2305.07803v1 [cs.CR])
cs.CR updates on arXiv.org arxiv.org
Computation offloading (often to external computing resources over a network)
has become a necessity for modern applications. At the same time, the
proliferation of machine learning techniques has empowered malicious actors to
use such techniques in order to breach the privacy of the execution process for
offloaded computations. This can enable malicious actors to identify offloaded
computations and infer their nature based on computation characteristics that
they may have access to even if they do not have direct access to …
applications breach case computation computing empowered external machine machine learning malicious malicious actors network order privacy process proliferation resources techniques