Lattner, C. and Adve, V. (2004). LLVM: A Compila-
tion Framework for Lifelong Program Analysis &
Transformation. In Proceedings of the International
Symposium on Code Generation and Optimization:
Feedback-Directed and Runtime Optimization, CGO
’04, page 75, USA. IEEE Computer Society.
Lee, J.-K., Hong, T., and Li, G. (2021). Traffic and overhead
analysis of applied pre-filtering ACL firewall on HPC
service network. Journal of Communications and Net-
works, pages 1–9.
Livermore Computing Center. Using LC’s Sierra Systems.
Madduri, K., Ibrahim, K. Z., Williams, S., Im, E.-J., Ethier,
S., Shalf, J., and Oliker, L. (2011). Gyrokinetic
toroidal simulations on leading multi- and manycore
HPC systems. In SC ’11: Proceedings of 2011 Inter-
national Conference for High Performance Comput-
ing, Networking, Storage and Analysis, pages 1–12.
Malin, A. and Van Heule, G. (2013). Continuous monitor-
ing and cyber security for high performance comput-
ing. In Proceedings of the First Workshop on Chang-
ing Landscapes in HPC Security, CLHS ’13, page
9–14, New York, NY, USA. Association for Comput-
ing Machinery.
Mclaughlin, M.-D., Cram, W. A., and Gogan, J. L. (2015).
A High Performance Computing Cluster under At-
tack: The Titan incident. Journal of Information Tech-
nology Teaching Cases, 5.
Melesse Vergara, V., Joubert, W., Brim, M. J., Budiardja,
R., Maxwell, D., Ezell, M., Zimmer, C., Boehm, S.,
Elwasif, W., Oral, H., Fuson, C., Pelfrey, D. S., Her-
nandez, O., Leverman, D. B., Hanley, J. A., Berrill,
M., and Tharrington, A. (2019). Scaling the sum-
mit: Deploying the world’s fastest supercomputer.
In International Workshop on OpenPOWER for HPC
(IWOPH 2019).
Minutoli, M., Sambaturu, P., Halappanavar, M., Tumeo, A.,
Kalyanaraman, A., and Vullikanti, A. (2020). Pre-
empt: Scalable epidemic interventions using submod-
ular optimization on multi-gpu systems. In Proceed-
ings of the International Conference for High Perfor-
mance Computing, Networking, Storage and Analysis,
SC ’20. IEEE Press.
National Vulnerability Database (2019). CVE-2019-15666
Detail.
NIST (2016). NSCI: High-Performance Computing Secu-
rity Workshop.
NIST (2018). High-Performance Computing Security
Workshop.
Nixon, L. (2006). The Stakkato Intrusions: What Happened
and What Have We Learned? In Proceedings of the
6th IEEE International Symposium on Cluster Com-
puting and the Grid (CCGRID’06).
Oakridge Leadership Computing Facility. FRONTIER Spec
Sheet.
OakRidge National Laboratory (2019). TITAN: Advancing
the Era of Accelerated Computing.
Pandey, A. (2019). DDR5: Fifth-generation of DDR Mem-
ory Module.
Patwardhan, A. A. and Upadrasta, R. (2019). Polyhe-
dral Model Guided Automatic GPU Cache Exploita-
tion Framework. In 2019 International Conference
on High Performance Computing Simulation (HPCS),
pages 496–503.
Peisert, S. (2017). Security in High-Performance Com-
puting Environments. Communications of the ACM,
60(9).
Pelley, S., Chen, P. M., and Wenisch, T. F. (2014). Memory
Persistency, volume 42. Association for Computing
Machinery, New York, NY, USA.
Peres, G. (2003). HPC in Astronomy: overview and per-
spectives. Memorie della Societa Astronomica Ital-
iana Supplementi, 1:223.
Pourzandi, M., Gordon, D., Yurcik, W., and Koenig, G.
(2005). Clusters and security: distributed security for
distributed systems. In CCGrid 2005. IEEE Interna-
tional Symposium on Cluster Computing and the Grid,
2005., volume 1, pages 96–104 Vol. 1.
Proctor, W. C., Storm, P., Hanlon, M. R., and Mendoza,
N. (2017). Securing HPC: development of a low cost,
open source multi-factor authentication infrastructure.
In SC ’17: Proceedings of the International Confer-
ence for High Performance Computing, Networking,
Storage and Analysis.
Prout, A., Arcand, W., Bestor, D., Bergeron, B., Byun, C.,
Gadepally, V., Houle, M., Hubbell, M., Jones, M.,
Klein, A., Michaleas, P., Milechin, L., Mullen, J.,
Rosa, A., Samsi, S., Yee, C., Reuther, A., and Kepner,
J. (2019). Securing HPC using federated authentica-
tion. CoRR, abs/1908.07573.
Prout, A., Arcand, W., Bestor, D., Bergeron, B., Byun,
C., Gadepally, V., Hubbell, M., Houle, M., Jones,
M., Michaleas, P., Milechin, L., Mullen, J., Rosa, A.,
Samsi, S., Reuther, A., and Kepner, J. (2016). Enhanc-
ing HPC security with a user-based firewall. In 2016
IEEE High Performance Extreme Computing Confer-
ence (HPEC), pages 1–4.
Rossum, G. V. (1995). The Python Tutorial. Technical Re-
port CS-R9526, Centrum voor Wiskunde en Informat-
ica (CWI), Amsterdam.
Scheerman, M., Zarrabi, N., Kruiten, M., Mog
´
e, M., Voort,
L., Langedijk, A., Schoonhoven, R., and Emery, T.
(2021). Secure Platform for Processing Sensitive Data
on Shared HPC Systems.
Sergeev, A. and Del Balso, M. (2018). Horovod: Fast and
Easy Distributed Deep Learning in TensorFlow. arXiv
preprint arXiv:1802.05799.
Shanley, T. (2002). Infiniband. Addison-Wesley Longman
Publishing Co., Inc., USA.
Stallman, R. M. et al. (2009). Using The Gnu Compiler Col-
lection: A Gnu Manual For Gcc Version 4.3.3. Cre-
ateSpace, Scotts Valley, CA.
Stocksdale, T., Chang, M.-T., Zheng, H., and Mueller, F.
(2017). Architecting HBM as a High Bandwidth,
High Capacity, Self-Managed Last-Level Cache. In
Proceedings of the 2nd Joint International Workshop
on Parallel Data Storage & Data Intensive Scalable
Computing Systems, PDSW-DISCS ’17, page 31–36,
New York, NY, USA. Association for Computing Ma-
chinery.
ICISSP 2023 - 9th International Conference on Information Systems Security and Privacy
802