From 3ba177fde423adf97374783b80ad261cc91ceec1 Mon Sep 17 00:00:00 2001 From: Michalis Spyrou Date: Tue, 26 Apr 2022 16:48:24 +0100 Subject: Add a few sections on security conserns Change-Id: If94171d52a37e917aaa75e1a137d7df561698290 Signed-off-by: Michalis Spyrou Reviewed-on: https://review.mlplatform.org/c/ml/ComputeLibrary/+/7469 Tested-by: Arm Jenkins Reviewed-by: Gunes Bayir Comments-Addressed: Arm Jenkins --- docs/user_guide/advanced.dox | 11 +++++++++++ 1 file changed, 11 insertions(+) diff --git a/docs/user_guide/advanced.dox b/docs/user_guide/advanced.dox index 806f4ea3b8..2b9e0d02f7 100644 --- a/docs/user_guide/advanced.dox +++ b/docs/user_guide/advanced.dox @@ -124,5 +124,16 @@ ptrace_scope in /proc/sys/kernel/yama. Please refer to: https://www.kernel.org/doc/html/v4.15/admin-guide/LSM/Yama.html for more information on this regard. +@subsection Malicious users could alter Compute Library related files + +Extra care must be taken in order to reduce the posibility of a user altering sensitive files. CLTuner files +should be protected by arbitrary writes since this can lead Compute Library to crash or waste all system's resources. + +@subsection Various concerns + +Sensitive applications that use Compute Library should consider posible attack vectors such as shared library hooking, +information leakage from the underlying OpenCL driver or previous excecution and running arbitrary networks that consume +all the available resources on the system, leading to denial of service. + */ } // namespace \ No newline at end of file -- cgit v1.2.1