Contents Wormhole Sites Overview

Total Page:16

File Type:pdf, Size:1020Kb

Contents Wormhole Sites Overview Contents Wormhole Sites Overview ................................................................................................................................. 7 Wormhole Sites ................................................................................................................................................. 8 Cosmic Anomalies (wormhole class) ............................................................................................................. 8 Complex name: Core Bastion (class 6) ...................................................................................................... 8 Complex name: Core Citadel (class 6) ....................................................................................................... 9 Complex name: Core Garrison (class 5) .................................................................................................. 10 Complex name: Core Stronghold (class 5) .............................................................................................. 11 Complex name: Fortification Frontier Stronghold (class 3) .................................................................... 12 Complex name: Frontier Barracks (class 4) ............................................................................................. 13 Complex name: Frontier Command Post (class 4) .................................................................................. 14 Complex name: Integrated Terminus (class 4) ....................................................................................... 15 Complex name: Oruze Osobnyk (class 5) ................................................................................................ 16 Complex name: Outpost Frontier Stronghold (class 3) ........................................................................... 17 Complex name: Perimeter Ambush Point (class 1) ................................................................................. 18 Complex name: Perimeter Camp (class 1) .............................................................................................. 19 Complex name: Perimeter Checkpoint (class 2) ..................................................................................... 20 Complex name: Perimeter Hangar (class 2) ............................................................................................ 21 Complex name: Phase Catalyst Node (class 1) ....................................................................................... 22 Complex name: Quarantine Area (class 5) .............................................................................................. 23 Complex name: Sleeper Information Sanctum (class 4) ......................................................................... 24 Complex name: Solar Cell (class 3).......................................................................................................... 25 Complex name: Strange Energy Readings (class 6) ................................................................................. 26 Complex name: The Line (class 1) ........................................................................................................... 27 Complex name: The Mirror (class 6) ....................................................................................................... 28 Complex name: The Oruze Construct (class 3) ....................................................................................... 31 Complex name: The Ruins of Enclave Cohort 27 (class 2) ...................................................................... 32 Cosmic Signatures – Gravimetric (wormhole class) .................................................................................... 33 Complex name: Average Frontier Deposit (all classes) ........................................................................... 33 Complex name: Common Perimeter Deposit (all classes) ...................................................................... 34 Complex name: Exceptional Core Deposit (all classes) ........................................................................... 35 Complex name: Infrequent Core Deposit (all classes) ............................................................................ 36 Complex name: Ordinary Perimeter Deposit (all classes)....................................................................... 37 Complex name: Rarified Core Deposit (all classes) ................................................................................. 38 Complex name: Unexceptional Frontier Deposit (all classes) ................................................................. 39 Complex name: Unusual Core Deposit (all classes) ................................................................................ 40 Cosmic Signatures – Ladar (wormhole class) .............................................................................................. 41 Complex name: Barren Perimeter Reservoir (all classes) ....................................................................... 41 Complex name: Bountiful Frontier Reservoir (all classes) ...................................................................... 42 Complex name: Instrumental Core Reservoir (all classes) ...................................................................... 43 Complex name: Minor Perimeter Reservoir (all classes) ........................................................................ 44 Complex name: Ordinary Perimeter Reservoir (all classes) .................................................................... 45 Complex name: Sizeable Perimeter Reservoir (all classes) ..................................................................... 46 Complex name: Token Perimeter Reservoir (all classes) ........................................................................ 47 Complex name: Vast Frontier Reservoir (all classes) .............................................................................. 48 Complex name: Vital Core Reservoir (all classes) ................................................................................... 49 Cosmic Signatures – Magnometric (wormhole class) ................................................................................. 50 Complex name: Forgotten Core Assembly Hall (class 6)......................................................................... 50 Complex name: Forgotten Core Circuitry Disassembler (class 6) ........................................................... 51 Complex name: Forgotten Core Data Field (class 5) ............................................................................... 52 Complex name: Forgotten Core Information Pen (class 5) ..................................................................... 53 Complex name: Forgotten Frontier Conversion Module (class 4) .......................................................... 54 Complex name: Forgotten Frontier Evacuation Center (class 4) ............................................................ 55 Complex name: Forgotten Frontier Recursive Depot (class 3) ............................................................... 56 Complex name: Forgotten Frontier Quarantine Outpost (class 3) ......................................................... 57 Complex name: Forgotten Perimeter Coronation Platform (class 1) ..................................................... 58 Complex name: Forgotten Perimeter Gateway (class 2) ........................................................................ 59 Complex name: Forgotten Perimeter Power Array (class 1) .................................................................. 60 Cosmic Signatures – Radar (wormhole class) .............................................................................................. 61 Complex name: Unsecured Core Backup Array (class 6) ........................................................................ 61 Complex name: Unsecured Core Emergence (class 6)............................................................................ 62 Complex name: Unsecured Frontier Database (class 3) ......................................................................... 63 Complex name: Unsecured Frontier Digital Nexus (class 4) ................................................................... 64 Complex name: Unsecured Frontier Enclave Relay (class 5) .................................................................. 65 Complex name: Unsecured Frontier Receiver (class 3) .......................................................................... 66 Complex name: Unsecured Frontier Server Bank (class 5) ..................................................................... 67 Complex name: Unsecured Frontier Trinary Hub (class 4) ..................................................................... 68 Complex name: Unsecured Perimeter Transponder Farm (class 2) ....................................................... 69 Wormhole Structure Descriptions ................................................................................................................... 70 Sleeper ......................................................................................................................................................... 70 Abandoned Sleeper Artifact .................................................................................................................... 70 Abandoned Sleeper Enclave .................................................................................................................... 70 Broken Sleeper Databank .......................................................................................................................
Recommended publications
  • Fantastic Four Compendium
    MA4 6889 Advanced Game Official Accessory The FANTASTIC FOUR™ Compendium by David E. Martin All Marvel characters and the distinctive likenesses thereof The names of characters used herein are fictitious and do are trademarks of the Marvel Entertainment Group, Inc. not refer to any person living or dead. Any descriptions MARVEL SUPER HEROES and MARVEL SUPER VILLAINS including similarities to persons living or dead are merely co- are trademarks of the Marvel Entertainment Group, Inc. incidental. PRODUCTS OF YOUR IMAGINATION and the ©Copyright 1987 Marvel Entertainment Group, Inc. All TSR logo are trademarks owned by TSR, Inc. Game Design Rights Reserved. Printed in USA. PDF version 1.0, 2000. ©1987 TSR, Inc. All Rights Reserved. Table of Contents Introduction . 2 A Brief History of the FANTASTIC FOUR . 2 The Fantastic Four . 3 Friends of the FF. 11 Races and Organizations . 25 Fiends and Foes . 38 Travel Guide . 76 Vehicles . 93 “From The Beginning Comes the End!” — A Fantastic Four Adventure . 96 Index. 102 This book is protected under the copyright laws of the United States of America. Any reproduction or other unauthorized use of the material or artwork contained herein is prohibited without the express written consent of TSR, Inc., and Marvel Entertainment Group, Inc. Distributed to the book trade in the United States by Random House, Inc., and in Canada by Random House of Canada, Ltd. Distributed to the toy and hobby trade by regional distributors. All characters appearing in this gamebook and the distinctive likenesses thereof are trademarks of the Marvel Entertainment Group, Inc. MARVEL SUPER HEROES and MARVEL SUPER VILLAINS are trademarks of the Marvel Entertainment Group, Inc.
    [Show full text]
  • SGX-Shield: Enabling Address Space Layout Randomization for SGX Programs
    SGX-Shield: Enabling Address Space Layout Randomization for SGX Programs Jaebaek Seo∗x , Byoungyoung Leeyx, Seongmin Kim∗, Ming-Wei Shihz, Insik Shin∗, Dongsu Han∗, Taesoo Kimz ∗KAIST yPurdue University zGeorgia Institute of Technology {jaebaek, dallas1004, ishin, dongsu_han}@kaist.ac.kr, [email protected], {mingwei.shih, taesoo}@gatech.edu Abstract—Traditional execution environments deploy Address system and hypervisor. It also offers hardware-based measure- Space Layout Randomization (ASLR) to defend against memory ment, attestation, and enclave page access control to verify the corruption attacks. However, Intel Software Guard Extension integrity of its application code. (SGX), a new trusted execution environment designed to serve security-critical applications on the cloud, lacks such an effective, Unfortunately, we observe that two properties, namely, well-studied feature. In fact, we find that applying ASLR to SGX confidentiality and integrity, do not guarantee the actual programs raises non-trivial issues beyond simple engineering for security of SGX programs, especially when traditional memory a number of reasons: 1) SGX is designed to defeat a stronger corruption vulnerabilities, such as buffer overflow, exist inside adversary than the traditional model, which requires the address space layout to be hidden from the kernel; 2) the limited memory SGX programs. Worse yet, many existing SGX-based systems uses in SGX programs present a new challenge in providing a tend to have a large code base: an entire operating system as sufficient degree of entropy; 3) remote attestation conflicts with library in Haven [12] and a default runtime library in SDKs the dynamic relocation required for ASLR; and 4) the SGX for Intel SGX [28, 29].
    [Show full text]
  • Marvel-Phile
    by Steven E. Schend and Dale A. Donovan Lesser Lights II: Long-lost heroes This past summer has seen the reemer- 3-D MAN gence of some Marvel characters who Gestalt being havent been seen in action since the early 1980s. Of course, Im speaking of Adam POWERS: Warlock and Thanos, the major players in Alter ego: Hal Chandler owns a pair of the cosmic epic Infinity Gauntlet mini- special glasses that have identical red and series. Its great to see these old characters green images of a human figure on each back in their four-color glory, and Im sure lens. When Hal dons the glasses and focus- there are some great plans with these es on merging the two figures, he triggers characters forthcoming. a dimensional transfer that places him in a Nostalgia, the lowly terror of nigh- trancelike state. His mind and the two forgotten days, is alive still in The images from his glasses of his elder broth- MARVEL®-Phile in this, the second half of er, Chuck, merge into a gestalt being our quest to bring you characters from known as 3-D Man. the dusty pages of Marvel Comics past. As 3-D Man can remain active for only the aforementioned miniseries is showing three hours at a time, after which he must readers new and old, just because a char- split into his composite images and return acter hasnt been seen in a while certainly Hals mind to his body. While active, 3-D doesnt mean he lacks potential. This is the Mans brain is a composite of the minds of case with our two intrepid heroes for this both Hal and Chuck Chandler, with Chuck month, 3-D Man and the Blue Shield.
    [Show full text]
  • Spaces of Sovereignty in Marvel's Secret Wars
    Neal Curtis, ‘Doom’s Law: Spaces of Sovereignty in THE COMICS GRID Marvel’s Secret Wars’ (2017) 7(1): 9 The Comics Journal of comics scholarship Grid: Journal of Comics Scholarship, DOI: https:// doi.org/10.16995/cg.90 RESEARCH Doom’s Law: Spaces of Sovereignty in Marvel’s Secret Wars Neal Curtis University of Auckland, NZ [email protected] Sovereignty is both the foundation and source of law and the determination of the territory to which the law applies. In this latter sense, sovereignty and the law it supports are an explicitly spatial phenomenon, as can be seen in the meanings of the Greek word nomos, which aside from the law can also refer to a division that marks out a specific territory. This article posits that the Marvel crossover event entitled Secret Wars (2015, 2016) encapsulates the ways in which superhero comics might help us to understand the spatiality of sovereignty. It also considers how resistance to Doom’s law was focused on the transgression of borders and the creation of alternative spatial arrangements. Keywords: Agamben; graphic justice; law; political theory; Schmitt Introduction: When the World Goes Rogue Fifteen years of a ‘War on Terror’ have been an especially fruitful time for studying superhero comics. The exceptional politics of the Bush Doctrine encouraged numerous scholars to return to important questions about the relationship between law and violence, and the nature of a state of emergency that are central to both the superhero mythos and an understanding of sovereign power. At a time when states themselves became rogue or took on the role of the vigilante—at least from the perspective of established International Law—scholars naturally gravitated towards thinking about what the exceptional status of the superhero might tell us.
    [Show full text]
  • Introduction
    Introduction So you think you're one bad mamma-jamma, huh? Think you can flatten an entire city at the click of a button, yup? Don't be so bold, 'cause it doesn't matter if you're the Incredible Hulk or the Incredible Plum, you'll come to a dead-end eventually. Oh, so you don't think you will, eh? Well your arrogance is starting to... transform... us... Grrrrr! IGN smash! IGN smash your face! Arrrgghhh!!! Face it, bub, you'll need the help of the elite group of superheroes known as the Underpaid! Er... uh... IGN Guides. Still waiting for Mr. Show to air again? You're protesting with us here in the Intro. Can't carry in a bag of groceries, much less a pick-up truck? Check out the Basics. Looking to pummel the world? Browse our handy Walkthrough. Looking for general tips to conquer the Challenges in the game? Take a gander at our Challenges section. Let your inner-nerd flow by collecting the Comics with us by reading that section. In the words of Sir Paul McCartney, "Do you want to know a secret?" Check out our Secrets section, or be left in the dust! Don't forget to check out IGN Comics after completing the game to revel in the fruits of artistic fruit baskets... or something of that nature. In this The Incredible Hulk: Ultimate Destruction strategy guide, you'll find: Basic tips and strategy. Complete The Incredible Hulk: Ultimate Destruction walkthrough All challenges and strategy for beating them. List of hidden comics with maps to help you find 'em.
    [Show full text]
  • Alternative Comics: an Emerging Literature
    ALTERNATIVE COMICS Gilbert Hernandez, “Venus Tells It Like It Is!” Luba in America 167 (excerpt). © 2001 Gilbert Hernandez. Used with permission. ALTERNATIVE COMICS AN EMERGING LITERATURE Charles Hatfield UNIVERSITY PRESS OF MISSISSIPPI • JACKSON www.upress.state.ms.us The University Press of Mississippi is a member of the Association of American University Presses. Copyright © 2005 by University Press of Mississippi All rights reserved Manufactured in the United States of America First edition 2005 ϱ Library of Congress Cataloging-in-Publication Data Hatfield, Charles, 1965– Alternative comics : an emerging literature / Charles Hatfield. — 1st ed. p. cm. Includes bibliographical references and index. ISBN 1-57806-718-9 (cloth : alk. paper) — ISBN 1-57806-719-7 (pbk. : alk. paper) 1. Underground comic books, strips, etc.—United States—History and criticism. I. Title. PN6725.H39 2005 741.5'0973—dc22 2004025709 British Library Cataloging-in-Publication Data available CONTENTS Acknowledgments vii Introduction ix Alternative Comics as an Emerging Literature 1 Comix, Comic Shops, and the Rise of 3 Alternative Comics, Post 1968 2 An Art of Tensions 32 The Otherness of Comics Reading 3 A Broader Canvas: Gilbert Hernandez’s Heartbreak Soup 68 4 “I made that whole thing up!” 108 The Problem of Authenticity in Autobiographical Comics 5 Irony and Self-Reflexivity in Autobiographical Comics 128 Two Case Studies 6 Whither the Graphic Novel? 152 Notes 164 Works Cited 169 Index 177 This page intentionally left blank ACKNOWLEDGMENTS Who can do this sort of thing alone? Not I. Thanks are due to many. For permission to include passages from my article, “Heartbreak Soup: The Interdependence of Theme and Form” (Inks 4:2, May 1997), the Ohio State University Press.
    [Show full text]
  • Theme Parkexpress Theme Parkexpress DISNEY WORLD DISNEY WORLD
    Theme ParkExpress Theme ParkExpress DISNEY WORLD DISNEY WORLD Hotel Pick-Up Location Hotel Pick-Up Location Allure Resort Sonesta Grand Hotel Orlando Rosen Inn International Avanti Resort Sonesta Hawthorne Suites Rosen Inn Universal Best Western I Drive Sonesta Homewood Suites Convention Center Sonesta Best Western Convention Center Village Inn Hyatt Place Convention Center Sonesta Castle Hotel Sonesta Hyatt Regency Orlando Rosen Centre Clarion Inn & Suites I Drive Rosen Centre La Quinta Inn & Suites Sonesta Coco Key Hotel & Water Resort Rosen Inn International Magic Kingdom TTC Bus Space # C20 Courtyard by Marriot I Drive Sonesta Monument Movieland Hotel Rosen Inn Universal Crowne Plaza Orlando Universal Rosen Inn International Pointe Orlando Resort Rosen Inn Universal Days Inn Convention Center Rosen Centre Quality Inn at I Drive Sonesta Disney Springs Bus Loop ** Ramada Orlando Convention Center Sonesta DoubleTree by Seaworld Village Inn Ramada Plaza Resorts & Suites Rosen Inn Universal Embassy Suites Convention Center Sonesta Red Roof Inn Convention Center Rosen Centre Embassy Suites I Drive Sonesta Rosen Plaza Hotel Pointe Orlando Enclave Hotel & Suites Rosen Inn Universal Rosen Inn at Pointe Orlando Pointe Orlando Epcot Bus Space #39 Rosen Inn Universal Rosen Inn Universal Extended Stay America Village Inn StaySky suites Rosen Inn Universal **Bus loop is located behind Bibbidi Bobbidi Boutique Westgate Palace Rosen Inn Universal Routes, stops and departure times may change due to traffic/weather conditions and events. Tickets are
    [Show full text]
  • Marvel Comics Avengers Chronological Appearances by Bob Wolniak
    Marvel Comics Avengers Chronological Appearances By Bob Wolniak ased initially on the Bob Fronczak list from Avengers Assemble and Avengers Forever websites. But unlike Mr. B Fronczak’s list (that stops about the time of Heroes Reborn) this is NOT an attempt at a Marvel continuity (harmony of Marvel titles in time within the fictional universe), but Avengers appearances in order in approx. real world release order . I define Avengers appearances as team appearances, not individual Avengers or even in some cases where several individual Avengers are together (but eventually a judgment call has to be made on some of those instances). I have included some non-Avengers appearances since they are important to a key storyline that does tie to the Avengers, but noted if they did not have a team appearance. Blue (purple for WCA & Ultimates) indicates an Avengers title , whether ongoing or limited series. I have decided that Force Works is not strictly an Avengers title, nor is Thunderbolts, Defenders or even Vision/Scarlet Witch mini- series, although each book correlates, crosses over and frequently contains guest appearances of the Avengers as a team. In those cases, the individual issues are listed. I have also decided that individual Avengers’ ongoing or limited series books are not Avengers team appearances, so I have no interest in the tedious tracking of every Captain America, Thor, Iron Man, or Hank Pym title unless they contain a team appearance or x-over . The same applies to Avengers Spotlight (largely a Hawkeye series, with other individual appearances), Captain Marvel, Ms. Marvel, Vision, Wonder Man, Hulk, She-Hulk, Black Panther, Quicksilver, Thunderstrike, War Machine, Black Widow, Sub-Mariner, Hercules, and other such books or limited series.
    [Show full text]
  • Undead Hulk Spelljammer™ Walker, Jason M
    Undead Hulk Spelljammer™ Walker, Jason M. (1992) Dragon™ Magazine 184, p. 94 CLIMATE/TERRAIN: Any neogi enclave FREQUENCY: Very rare ORGANIZATION: Solitary ACTIVITY CYCLE: Any DIET: Nil INTELLIGENCE: Non- (0) TREASURE: Nil ALIGNMENT: Neutral NO. APPEARING: 1‒4 ARMOR CLASS: 4 MOVEMENT: 6; Br 6 HIT DICE: 10 THAC0: 11 NO. OF ATTACKS: 3 + special DAMAGE/ATTACK: 3d4/3d4/1d10 SPECIAL ATTACKS: See below SPECIAL DEFENSES: Nil MAGIC RESISTANCE: 10% SIZE: L (8′ tall, 5′ wide) MORALE: Fearless (20) XP VALUE: 4,000 The undead hulk is a magical construction created through the use Habitat/Society: Undead hulks are under the absolute con- of special enhancements developed by the neogi. The creature is trol of their creator and have no culture of their own. They serve formed from the remains of dead umber hulks and to all appear- their “small lords” without question. Undead hulks are created ances seems to be nothing more than a typical monster zombie. An through a bizarre magical ritual developed by the neogi (the de- undead hulk reeks of death, and its undead nature is obvious to tails of which are left up to the DM) and the magical joining of anyone within 10 feet of it. Other than its obviously unliving state, dead umber hulk parts. Each part (head, right arm, right leg, etc.) the undead hulk appears as any other umber hulk. must come from a different umber hulk. Combat: An undead hulk attacks in much the same way as a Ecology: Undead hulks are magical constructs and play no role typical umber hulk: with brute force.
    [Show full text]
  • Enclave Intellilink Manual
    2k15_misc_acadia_den_enclave_traverse_23196841A.ai (Modern Bridge - Level 2 / #23321109) Spine = Saddle Stitch (Image set @ 60% Transparency Color = Black Date = 03/19/14 2015 Acadia/Acadia Denali Enclave/Traverse InTouch Infotainment System 23196841 A Buick/Chevrolet/GMC Acadia/Acadia Denali/Enclave/Traverse InTouch Info- Black plate (1,1) tainment System (GMNA-Localizing-U.S./Canada-7639735) - 2015 - First 2015 Buick/Chevrolet/GMC Acadia/Acadia Denali/Enclave/ Traverse InTouch Infotainment System M Infotainment System ...... 3 Navigation ................. 47 Trademarks and License Using the Navigation Agreements .............. 95 Introduction ................. 3 System . 47 Index . i-1 Infotainment . 3 Maps . 49 Overview . 5 Navigation Symbols . 50 Steering Wheel Controls . 8 Destination . 51 Using the System . 9 OnStar® System . 59 Software Updates . 14 Global Positioning System (GPS) . 60 Radio ....................... 15 Vehicle Positioning . 61 AM-FM Radio . 15 Problems with Route Satellite Radio . 18 Guidance . 62 Pandora Internet Radio . 19 If the System Needs Stitcher Internet Radio . 23 Service . 62 Pictures . 26 Map Data Updates . 62 Database Coverage Audio Players ............. 28 Explanations . 63 CD/DVD Player . 28 MP3 . 31 Voice Recognition ........ 63 USB Port . 32 Auxiliary Devices . 37 Settings .................... 70 Bluetooth Audio . 37 Bluetooth Phone/ Rear Seat Infotainment ... 38 Devices ................... 79 Rear Seat Entertainment (RSE) Bluetooth . 79 System . 38 Text Messaging . 91 Buick/Chevrolet/GMC Acadia/Acadia
    [Show full text]
  • Click Above for a Preview, Or Download
    FIGHTING AMERICANS Captain America TM & ©2002 Marvel Characters, Inc. N M O 2 0 A . 0 R 2 34 . T H E N E W C o l l e c t o r I n $ 9 T h . 9 e 5 U S Contents OPENING SHOT . .2 THE NEW (a salute to the fighting Americans who saved United Flight #93 from terrorists) UNDER THE COVERS . .4 (the inimitable Alex Toth drops us a card about this issue’s cover art) JACK F.A.Q. s . .6 (Mark Evanier solves a Frequently Asked Question about how inkers were ISSUE #34, MAR. 2002 Collector chosen at Marvel in the 1960s) R.L. BRYANT . .11 (our semi-regular columnist surveys a certain Scientific American) RETROSPECTIVE . .12 (Keith Hammond takes aim at Kirby’s run on Green Arrow) LOOKING BACK . .16 (Carmine Infantino reminisces about Joe, Jack, and all kinds of heroes) INNERVIEW . .21 (a brief chat with Jack, circa 1974) BATTLE LINES . .22 (Kirby’s 12-issue run was a winner for the Losers) OLD PANELING . .29 (some unseen ’50s Kirby comic strips) GALLERY . .30 (a selection of Captain America’s greatest hits, kicks, and wallops, shown at our giant tabloid size) KIRBY AS A GENRE . .46 (Adam McGovern dips into a grab-bag of Kirby homages) INTERNATIONALITIES . .48 (French comics legend Philippe Druillet learns that the Kirby influence speaks a universal language) PULPED . .54 (get your fingers dirty on these torrid, lusty Simon & Kirby illos) SHIELD . .58 (Spies, Hydra, Intrigue, and Espionage in a Lengthy Dissertation) COLLABORATORS . .66 (Simon says, “Read this article!”) EXTRA! .
    [Show full text]
  • A Secure Tensorflow Framework
    CC-BY 4.0. This is the author’s version of the work. The definitive version is published in the proceedings of the 21st ACM/IFIP International Middleware Conference (Middleware 2020). secureTF: A Secure TensorFlow Framework Do Le Quoc, Franz Gregor, Sergei Arnautov Roland Kunkel TU Dresden, Scontain UG TU Dresden Pramod Bhatotia Christof Fetzer TU Munich TU Dresden, Scontain UG Abstract cloud platform provides an additional attack vector. The Data-driven intelligent applications in modern online ser- clients currently have limited support to verify whether the vices have become ubiquitous. These applications are usually third-party operator, even with good intentions, can handle hosted in the untrusted cloud computing infrastructure. This the data with the stated security guarantees [52, 91]. poses significant security risks since these applications rely To overcome the security risks in the cloud, our work on applying machine learning algorithms on large datasets focuses on securing machine learning computations in the which may contain private and sensitive information. untrusted computing infrastructure. In this context, the exist- To tackle this challenge, we designed secureTF, a dis- ing techniques to secure machine learning applications are tributed secure machine learning framework based on Ten- limiting in performance [38], trade accuracy for security [32] sorflow for the untrusted cloud infrastructure. secureTF is or support only data classification [21]. Therefore, we want a generic platform to support unmodified TensorFlow appli- to build a secure machine learning framework that supports cations, while providing end-to-end security for the input existing applications while retaining accuracy, supporting both data, ML model, and application code.
    [Show full text]