pith. machine review for the scientific record. sign in

arxiv: 2601.16199 · v3 · submitted 2026-01-22 · 💻 cs.CR

PAL*M: Property Attestation for Large Generative Models

Pith reviewed 2026-05-16 11:33 UTC · model grok-4.3

classification 💻 cs.CR
keywords property attestationlarge generative modelsconfidential computingincremental multiset hashingIntel TDXNVIDIA H100security verificationTamarin Prover
0
0 comments X

The pith

PAL*M enables property attestation for large generative models with under 11% overhead while preserving security.

A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.

The paper introduces PAL*M, a framework that lets model providers attest specific properties of their large generative models and associated datasets to verifiers like regulators or customers. It supports this by executing within confidential virtual machines that include security-aware GPUs to protect operations across CPU and GPU, and by applying incremental multiset hashing to memory-mapped datasets for efficient integrity verification. Properties are defined for both the training process and inference behavior. Practical tests with state-of-the-art models demonstrate that the system adds less than 11 percent overhead to common operations. Analysis using the Tamarin Prover tool verifies that the attestation protocol maintains its security properties against the assumed threats.

Core claim

PAL*M defines properties across training and inference for large generative models. It uses confidential virtual machines with security-aware GPUs to isolate and cover CPU-GPU operations and incremental multiset hashing over memory-mapped datasets to track integrity efficiently. The implementation on Intel TDX and NVIDIA H100 shows less than 11% overhead for common operations, and formal modeling with the Tamarin Prover confirms security guarantees under the defined threat model.

What carries the argument

Confidential virtual machines paired with security-aware GPUs, together with incremental multiset hashing for dataset integrity.

Load-bearing premise

The Intel TDX confidential VM and NVIDIA H100 security-aware GPU must correctly isolate CPU-GPU operations, and the threat model must account for all relevant attacks on the attestation protocol.

What would settle it

A concrete falsifier would be successfully tampering with attested model properties or dataset contents undetected while operating within the confidential VM and GPU setup, or the discovery of a protocol flaw by the Tamarin Prover.

Figures

Figures reproduced from arXiv: 2601.16199 by Adam Ilyas Caulfield, Lachlan J. Gunn, N. Asokan, Prach Chantasantitam, Vasisht Duddu.

Figure 1
Figure 1. Figure 1: Traditional remote attestation protocol: a prover [PITH_FULL_IMAGE:figures/full_fig_p002_1.png] view at source ↗
Figure 2
Figure 2. Figure 2: Desired property attestation for ML, in which [PITH_FULL_IMAGE:figures/full_fig_p003_2.png] view at source ↗
Figure 3
Figure 3. Figure 3: High-level overview of PAL∗M-enabled property attestation. Inr interacts with untrusted components of Prv, which saves inputs to disk. PAL∗M reads and measures inputs, runs the operations (including GPU), and measures all CPU and GPU outputs. All measurements are extended to REPORTDATA, which is used to as input to obtain TDREPORT from TDX Module. Finally, a QUOTE is generated by invoking the Quoting Encla… view at source ↗
Figure 4
Figure 4. Figure 4: Depiction of PAL∗M ’s handling of in-memory (left) and memory-mapped (right) dataset. In the in-memory approach, the entire dataset is loaded and measured once at load time. In the memory-mapped approach, individual records are measured when accessed using a multiset hash to ensure consistent measurements regardless of sampling order. B denote a set of bit vectors of length m, M a multiset of elements of B… view at source ↗
Figure 5
Figure 5. Figure 5: PAL∗M Property Attestation Protocol between Inr and Prv . Inr sends request to Prv containing untrusted VMM, Quoting Enclave, trusted TDX Module, and attested PAL∗M TD. Prv responds after performing the requested operation, measuring relevant inputs and ouputs, and generating both a TDREPORT and QUOTE. 5 Experiment Setup 5.1 Datasets and Models We use the following datasets in our experiments: • BookCorpus… view at source ↗
read the original abstract

Machine learning property attestations allow provers (e.g., model providers or owners) to attest properties of their models/datasets to verifiers (e.g., regulators, customers), enabling accountability towards regulations and policies. But, current approaches do not support generative models or large datasets. We present PAL*M, a property attestation framework for large generative models, illustrated using large language models. PAL*M defines properties across training and inference, leverages confidential virtual machines with security-aware GPUs for coverage of CPU-GPU operations, and proposes using incremental multiset hashing over memory-mapped datasets to efficiently track their integrity. We implement PAL*M on Intel TDX+NVIDIA H100 and evaluate it using state-of-the-art models and datasets, showing PAL*M is efficient, incurring < 11% overhead for common operations. Finally, we use the Tamarin Prover symbolic verification tool to formally model PAL*M's property attestation protocol, confirming that its security guarantees are upheld under the defined threat model.

Editorial analysis

A structured set of objections, weighed in public.

Desk editor's note, referee report, simulated authors' rebuttal, and a circularity audit. Tearing a paper down is the easy half of reading it; the pith above is the substance, this is the friction.

Referee Report

2 major / 2 minor

Summary. The paper introduces PAL*M, a property attestation framework for large generative models (illustrated with LLMs) that defines properties over training and inference phases, leverages confidential VMs with security-aware GPUs to cover CPU-GPU operations, and uses incremental multiset hashing over memory-mapped datasets for efficient integrity tracking. It reports a concrete implementation on Intel TDX + NVIDIA H100 hardware showing <11% overhead for common operations and uses the Tamarin Prover to symbolically verify that the attestation protocol upholds its security guarantees under the stated threat model.

Significance. If the hardware isolation assumptions hold, PAL*M fills an important gap by enabling practical property attestation for large-scale generative models, supporting regulatory accountability. The combination of a real-hardware implementation with measured overhead and Tamarin-based protocol verification provides concrete support for the efficiency and security claims.

major comments (2)
  1. [Threat model and security analysis] Threat model and security analysis section: the claim that security guarantees are upheld rests on the assumption that Intel TDX and NVIDIA H100 fully isolate and attest all CPU-GPU operations (including model weights, activations, and dataset mappings); Tamarin verifies only the symbolic protocol, leaving potential side-channel leakage or incomplete GPU state measurement unaddressed, which is load-bearing for the central security claim.
  2. [Evaluation] Evaluation section: the <11% overhead result for common operations is reported without specifying the exact operations measured (e.g., particular training steps vs. inference batches), model sizes, or baseline comparisons, making it difficult to evaluate generality across generative workloads.
minor comments (2)
  1. [Abstract] Abstract: the statement of <11% overhead would benefit from naming the models and datasets used in the evaluation to give readers immediate context.
  2. [Framework description] Notation for incremental multiset hashing: an inline example or small diagram would clarify how the hashing tracks dataset integrity during memory-mapped access.

Simulated Author's Rebuttal

2 responses · 0 unresolved

We thank the referee for the constructive feedback and positive recommendation. We address each major comment below and will revise the manuscript to improve clarity on the scope of the security analysis and the details of the evaluation.

read point-by-point responses
  1. Referee: Threat model and security analysis section: the claim that security guarantees are upheld rests on the assumption that Intel TDX and NVIDIA H100 fully isolate and attest all CPU-GPU operations (including model weights, activations, and dataset mappings); Tamarin verifies only the symbolic protocol, leaving potential side-channel leakage or incomplete GPU state measurement unaddressed, which is load-bearing for the central security claim.

    Authors: We agree that the central security claim depends on the hardware isolation and attestation properties of Intel TDX and NVIDIA H100 as defined in the threat model. The Tamarin analysis verifies only that the attestation protocol upholds the stated properties assuming the hardware behaves according to its specification. Side-channel leakage and potential gaps in GPU state measurement are indeed outside the scope of the symbolic verification. In the revised manuscript we will expand the threat model section to explicitly state these limitations, clarify the boundary between protocol verification and hardware trust assumptions, and cite relevant work on side-channel risks in confidential computing. revision: yes

  2. Referee: Evaluation section: the <11% overhead result for common operations is reported without specifying the exact operations measured (e.g., particular training steps vs. inference batches), model sizes, or baseline comparisons, making it difficult to evaluate generality across generative workloads.

    Authors: We accept this observation. While the manuscript reports results on state-of-the-art models and datasets, the precise mapping of the <11% overhead figures to specific operations (e.g., inference forward passes versus particular training steps), exact model sizes, and direct baseline comparisons is not sufficiently detailed. In the revision we will add a breakdown table and accompanying text that specifies the measured operations, model parameter counts, dataset sizes, and comparisons against non-attested baselines to better support claims of generality. revision: yes

Circularity Check

0 steps flagged

No significant circularity in derivation chain

full rationale

The paper defines PAL*M via a protocol leveraging external hardware (Intel TDX confidential VMs and NVIDIA H100 security-aware GPUs) for CPU-GPU isolation, incremental multiset hashing for dataset integrity tracking, and Tamarin Prover for symbolic verification of security properties under a stated threat model. Efficiency claims (<11% overhead) derive from direct empirical measurements on state-of-the-art models rather than any fitted parameters or self-referential definitions. No equations or steps reduce by construction to inputs; self-citations (if present) are not load-bearing for the core attestation guarantees, which rest on independent hardware primitives and formal tool output. The derivation chain is self-contained against external benchmarks.

Axiom & Free-Parameter Ledger

0 free parameters · 2 axioms · 0 invented entities

The framework relies on standard assumptions about hardware isolation in TDX and H100 rather than introducing new fitted parameters or invented entities; the threat model is domain-standard for attestation protocols.

axioms (2)
  • domain assumption Intel TDX and NVIDIA H100 security features correctly isolate and attest CPU-GPU operations
    Invoked in the description of coverage for CPU-GPU operations and implementation section
  • domain assumption Incremental multiset hashing correctly tracks dataset integrity without false negatives under the threat model
    Used for efficient tracking of large datasets

pith-pipeline@v0.9.0 · 5481 in / 1323 out tokens · 28099 ms · 2026-05-16T11:33:47.448073+00:00 · methodology

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.

Reference graph

Works this paper leans on

74 extracted references · 74 canonical work pages · 4 internal anchors

  1. [1]

    Zero-knowledge proofs of training for deep neural networks

    Kasra Abbaszadeh et al. Zero-knowledge proofs of training for deep neural networks. InACM SIGSAC Conference on Computer and Communications Security, CCS ’24, page 4316–4330, New York, NY , USA, 2024. Association for Computing Machinery

  2. [2]

    Phi-4-Mini Technical Report: Compact yet Powerful Multimodal Language Models via Mixture-of-LoRAs

    Abdelrahman Abouelenin et al. Phi-4-Mini Technical Report: Compact yet Powerful Multimodal Language Models via Mixture-of-LoRAs.CoRR, abs/2503.01743, 2025

  3. [3]

    The EU Artificial Intelli- gence Act.European Union, 2024

    EU Artificial Intelligence Act. The EU Artificial Intelli- gence Act.European Union, 2024

  4. [4]

    Intel Trust Domain Extensions (TDX) security review.Google security review, 2023

    Erdem Aktas et al. Intel Trust Domain Extensions (TDX) security review.Google security review, 2023

  5. [5]

    AMD secure encrypted virtualization (sev).http s://www.amd.com/en/developer/sev.html, 2020

    AMD. AMD secure encrypted virtualization (sev).http s://www.amd.com/en/developer/sev.html, 2020

  6. [6]

    Confidential inference via trusted virtual machines

    Anthropic and Pattern Labs. Confidential inference via trusted virtual machines. https://www.anthropic. com/research/confidential-inference-trust ed-vms , June 2025. Research report on confidential inference systems using trusted virtual machines

  7. [7]

    ARM TrustZone for Cortex-A

    ARM. ARM TrustZone for Cortex-A. https://ww w.arm.com/technologies/trustzone-for-corte x-a, 2004

  8. [8]

    Findings of the 2014 Workshop on Statistical Machine Translation

    Ondrej Bojar et al. Findings of the 2014 Workshop on Statistical Machine Translation. InProceedings of the Ninth Workshop on Statistical Machine Translation, pages 12–58, Baltimore, Maryland, USA, June 2014. Association for Computational Linguistics

  9. [9]

    TOCTOU, traps, and trusted comput- ing

    Sergey Bratus et al. TOCTOU, traps, and trusted comput- ing. InInternational Conference on Trusted Computing, pages 14–32. Springer, 2008

  10. [10]

    Verifiable privacy and transparency: A new frontier for brave ai privacy

    Brave Software. Verifiable privacy and transparency: A new frontier for brave ai privacy. https://brave. com/blog/browser-ai-tee/ , 11 2025. Accessed: 2025-11-26

  11. [11]

    Language Models are Few-Shot Learn- ers

    Tom Brown et al. Language Models are Few-Shot Learn- ers. InAdvances in Neural Information Processing Sys- tems, volume 33, pages 1877–1901. Curran Associates, Inc., 2020

  12. [12]

    Canonical TDX Github Repository

    Canonical. Canonical TDX Github Repository. https: //github.com/canonical/tdx, September 2025

  13. [13]

    Confidential LLM inference: Performance and cost across CPU and GPU TEEs.arXiv preprint arXiv:2509.18886, 2025

    Marcin Chrapek et al. Confidential LLM inference: Performance and cost across CPU and GPU TEEs.arXiv preprint arXiv:2509.18886, 2025

  14. [14]

    Incremental multiset hash functions and their application to memory integrity checking

    Dwaine Clarke et al. Incremental multiset hash functions and their application to memory integrity checking. In International conference on the theory and application of cryptology and information security, pages 188–207. Springer, 2003

  15. [15]

    Michael Han Daniel Han and Unsloth team. Unsloth. https://github.com/unslothai/unsloth, 2023

  16. [16]

    Attesting distributional properties of training data for machine learning

    Vasisht Duddu et al. Attesting distributional properties of training data for machine learning. InEuropean Symposium on Research in Computer Security, pages 3–23. Springer, 2024

  17. [17]

    Lamina- tor: Verifiable ml property cards using hardware-assisted attestations

    Vasisht Duddu, Lachlan J Gunn, and N Asokan. Lamina- tor: Verifiable ml property cards using hardware-assisted attestations. InProceedings of the Fifteenth ACM Con- ference on Data and Application Security and Privacy, pages 317–328, 2024

  18. [18]

    Proof-of-learning is currently more broken than you think

    Congyu Fang et al. Proof-of-learning is currently more broken than you think. In2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P), pages 797–816. IEEE, 2023

  19. [19]

    Secure and confidential certifi- cates of online fairness

    Olive Franzese et al. Secure and confidential certifi- cates of online fairness. InThe Thirty-ninth Annual Conference on Neural Information Processing Systems, 2025

  20. [20]

    Secure noise sampling for differ- entially private collaborative learning

    Olive Franzese et al. Secure noise sampling for differ- entially private collaborative learning. InProceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, pages 4649–4663, 2025

  21. [21]

    The Pile: An 800GB Dataset of Diverse Text for Language Modeling

    Leo Gao et al. The Pile: An 800GB Dataset of Di- verse Text for Language Modeling.arXiv preprint arXiv:2101.00027, 2020

  22. [22]

    Albert Gu and Tri Dao

    Leo Gao et al. The Language Model Evaluation Harness. https://zenodo.org/records/12608602 , July 2024

  23. [23]

    Experimenting with zero-knowledge proofs of training

    Sanjam Garg et al. Experimenting with zero-knowledge proofs of training. InProceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS ’23, page 1880–1894, New York, NY , USA, 2023. Association for Computing Machinery

  24. [24]

    ExclaveFL: Providing transparency to federated learning using exclaves.arXiv preprint arXiv:2412.10537, 2024

    Jinnan Guo et al. ExclaveFL: Providing transparency to federated learning using exclaves.arXiv preprint arXiv:2412.10537, 2024

  25. [25]

    General avail- ability: Azure confidential VMs with NVIDIA H100 tensor core GPUs, 2024

    Krishnaprasad Hande and Microsoft team. General avail- ability: Azure confidential VMs with NVIDIA H100 tensor core GPUs, 2024

  26. [26]

    Casper Hansen. AutoAWQ. https://github.com/c asper-hansen/AutoAWQ, 2023. 14

  27. [27]

    Measuring Massive Multitask Language Understanding

    Dan Hendrycks et al. Measuring Massive Multitask Language Understanding. InICLR. OpenReview.net, 2021

  28. [28]

    Denoising Diffusion Probabilistic Models

    Jonathan Ho, Ajay Jain, and Pieter Abbeel. Denoising Diffusion Probabilistic Models. InNeurIPS, 2020

  29. [29]

    Hu et al

    Edward J. Hu et al. LoRA: Low-Rank Adaptation of Large Language Models. InICLR. OpenReview.net, 2022

  30. [30]

    LLM-based misbehavior detection ar- chitecture for enhanced traffic safety in connected au- tonomous vehicles.IEEE Transactions on Vehicular Technology, 2025

    Yaqi Hu et al. LLM-based misbehavior detection ar- chitecture for enhanced traffic safety in connected au- tonomous vehicles.IEEE Transactions on Vehicular Technology, 2025

  31. [31]

    zkMLaaS: a verifiable scheme for machine learning as a service

    Chenyu Huang et al. zkMLaaS: a verifiable scheme for machine learning as a service. InGLOBECOM 2022- 2022 IEEE Global Communications Conference, pages 5475–5480. IEEE, 2022

  32. [32]

    Datasets Arrow

    Hugging Face. Datasets Arrow. https://huggingfac e.co/docs/datasets/v4.1.1/about_arrow , 2025. Accessed: 2025-10-01

  33. [33]

    Preprocess

    Hugging Face. Preprocess. https://huggingface.co /docs/datasets/en/use_dataset, 2025. Accessed: 2025-01-19

  34. [34]

    Hugging Face. Trainer. https://huggingface.co/d ocs/transformers/main_classes/trainer#tran sformers.Trainer.get_train_dataloader , 2025. Accessed: 2025-01-15

  35. [35]

    Intel Provisining Certification Service for ECDSA Attestation

    Intel. Intel Provisining Certification Service for ECDSA Attestation. https://api.portal.trustedservic es.intel.com/provisioning-certification

  36. [36]

    Intel Software Guard Extensions (Intel SGX)

    Intel. Intel Software Guard Extensions (Intel SGX). https://www.intel.com/content/www/us/en/de veloper/tools/software-guard-extensions/ov erview.html, 2015

  37. [37]

    Intel Trust Domain Extensions (Intel TDX)

    Intel. Intel Trust Domain Extensions (Intel TDX). ht tps://www.intel.com/content/www/us/en/deve loper/tools/trust-domain-extensions/overvi ew.html, 2023

  38. [38]

    Intel Trust Domain Extensions (Intel TDX) mod- ule base architecture specification

    Intel. Intel Trust Domain Extensions (Intel TDX) mod- ule base architecture specification. https://cdrdv2 -public.intel.com/853286/intel-tdx-module-b ase-spec-348549006.pdf, Apr 2025

  39. [39]

    Heterogeneous isolated execution for commodity GPUs

    Insu Jang et al. Heterogeneous isolated execution for commodity GPUs. InProceedings of the Twenty-Fourth International Conference on Architectural Support for Programming Languages and Operating Systems, pages 455–468, 2019

  40. [40]

    Overview: Realms

    ARM Limited. Overview: Realms. https://learn. arm.com/learning-paths/servers-and-cloud-c omputing/cca-container/overview/

  41. [41]

    zkCNN: Zero knowledge proofs for convolutional neural net- work predictions and accuracy

    Tianyi Liu, Xiang Xie, and Yupeng Zhang. zkCNN: Zero knowledge proofs for convolutional neural net- work predictions and accuracy. InProceedings of the 2021 ACM SIGSAC Conference on Computer and Com- munications Security, pages 2968–2985, 2021

  42. [42]

    MirrorNet: A TEE-friendly frame- work for secure on-device DNN inference

    Ziyu Liu et al. MirrorNet: A TEE-friendly frame- work for secure on-device DNN inference. In2023 IEEE/ACM International Conference on Computer Aided Design (ICCAD), pages 1–9. IEEE, 2023

  43. [43]

    Holding secrets accountable: Au- diting privacy-preserving machine learning

    Hidde Lycklama et al. Holding secrets accountable: Au- diting privacy-preserving machine learning. InUSENIX Security Symposium, 2024

  44. [44]

    PEFT: State-of-the-art Parameter-Efficient Fine-Tuning methods

    Sourab Mangrulkar et al. PEFT: State-of-the-art Parameter-Efficient Fine-Tuning methods. https: //github.com/huggingface/peft, 2022

  45. [45]

    DarkneTZ: towards model privacy at the edge using trusted execution environments

    Fan Mo et al. DarkneTZ: towards model privacy at the edge using trusted execution environments. InInterna- tional Conference on Mobile Systems, Applications, and Services, MobiSys ’20, page 161–174, New York, NY , USA, 2020. Association for Computing Machinery

  46. [46]

    Toward remotely verifiable software integrity in resource-constrained iot devices

    Ivan De Oliveira Nunes et al. Toward remotely verifiable software integrity in resource-constrained iot devices. IEEE Communications Magazine, 62(7):58–64, 2024

  47. [47]

    AI Security With Confidential Computing

    NVIDIA. AI Security With Confidential Computing. https://www.nvidia.com/en-us/data-center/ solutions/confidential-computing/

  48. [48]

    NVIDIA Deployment Guide for SecureAI

    NVIDIA. NVIDIA Deployment Guide for SecureAI. https://docs.nvidia.com/cc-deployment-gui de-tdx.pdf, February 2025

  49. [49]

    NVIDIA attestation

    NVIDIA. NVIDIA attestation. https://docs.nvidi a.com/attestation/index.html, [Accessed] 2025

  50. [50]

    Reimagining secure infrastructure for ad- vanced ai

    OpenAI. Reimagining secure infrastructure for ad- vanced ai. https://openai.com/index/reimagini ng-secure-infrastructure-for-advanced-ai/ , 5 2024. Accessed: 2025-11-26

  51. [51]

    torch.utils.data — PyTorch 2.9 documentation

    PyTorch. torch.utils.data — PyTorch 2.9 documentation. https://docs.pytorch.org/docs/stable/data. html, 2025. Accessed: 2026-01-15

  52. [52]

    Language models are unsupervised multitask learners.OpenAI blog, 1(8):9, 2019

    Alec Radford et al. Language models are unsupervised multitask learners.OpenAI blog, 1(8):9, 2019. 15

  53. [53]

    SLAPP: Poisoning prevention in federated learn- ing and DP via stateful proofs of execution.IEEE Trans- actions on Information Forensics and Security (TIFS), 2025

    Norrathep Rattanavipanon and Ivan De Oliveira Nunes Nunes. SLAPP: Poisoning prevention in federated learn- ing and DP via stateful proofs of execution.IEEE Trans- actions on Information Forensics and Security (TIFS), 2025

  54. [54]

    Siva Reddy, Danqi Chen, and Christopher D. Manning. CoQA: A conversational question answering challenge. Transactions of the Association for Computational Lin- guistics, 7:249–266, 2019

  55. [55]

    A stochastic ap- proximation method.The annals of mathematical statis- tics, pages 400–407, 1951

    Herbert Robbins and Sutton Monro. A stochastic ap- proximation method.The annals of mathematical statis- tics, pages 400–407, 1951

  56. [56]

    ZK- LoRA: Efficient zero-knowledge proofs for LoRA veri- fication

    Bidhan Roy, Peter Potash, and Marcos Villagra. ZK- LoRA: Efficient zero-knowledge proofs for LoRA veri- fication. InChampioning Open-source DEvelopment in ML Workshop @ ICML25, 2025

  57. [57]

    Property- based attestation for computing platforms: caring about properties, not mechanisms

    Ahmad-Reza Sadeghi and Christian Stüble. Property- based attestation for computing platforms: caring about properties, not mechanisms. InProceedings of the 2004 workshop on New security paradigms, pages 67–77, 2004

  58. [58]

    Supporting third party attestation for Intel SGX with Intel data center attestation primi- tives.White paper, 12, 2018

    Vinnie Scarlata et al. Supporting third party attestation for Intel SGX with Intel data center attestation primi- tives.White paper, 12, 2018

  59. [59]

    Attestable audits: Verifiable AI safety benchmarks using trusted execution environ- ments

    Christoph Schnabl et al. Attestable audits: Verifiable AI safety benchmarks using trusted execution environ- ments. InICML Workshop on Technical AI Governance (TAIG), 2025

  60. [60]

    Confidential-PROFITT: Confidential PROof of fair training of trees

    Ali Shahin Shamsabadi et al. Confidential-PROFITT: Confidential PROof of fair training of trees. InThe Eleventh International Conference on Learning Repre- sentations, 2023

  61. [61]

    Confidential-DPproof: Confidential proof of differentially private training

    Ali Shahin Shamsabadi et al. Confidential-DPproof: Confidential proof of differentially private training. In The Twelfth International Conference on Learning Rep- resentations, 2024

  62. [62]

    Melara, and Sebastian Szyller

    Marcin Spoczynski, Marcela S. Melara, and Sebastian Szyller. Atlas: A framework for ML lifecycle prove- nance & transparency. In2025 IEEE European Sympo- sium on Security and Privacy Workshops (EuroS&PW), pages 448–461. IEEE, 2025

  63. [63]

    zkLLM: Zero knowledge proofs for large language models

    Haochen Sun, Jason Li, and Hongyang Zhang. zkLLM: Zero knowledge proofs for large language models. In Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, pages 4405– 4419, 2024

  64. [64]

    TensorShield: Safeguarding on-device inference by shielding critical DNN tensors with TEE

    Tong Sun et al. TensorShield: Safeguarding on-device inference by shielding critical DNN tensors with TEE. InACM SIGSAC Conference on Computer and Commu- nications Security (CCS), 2025

  65. [65]

    Stanford Alpaca: An instruction- following llama model.https://github.com/tatsu -lab/stanford_alpaca, 2023

    Rohan Taori et al. Stanford Alpaca: An instruction- following llama model.https://github.com/tatsu -lab/stanford_alpaca, 2023

  66. [66]

    Gemma 3 Technical Report

    Gemma Team. Gemma 3 Technical Report.CoRR, abs/2503.19786, 2025

  67. [67]

    The Llama 3 Herd of Models

    Llama Team. The Llama 3 Herd of Models.CoRR, abs/2407.21783, 2024

  68. [68]

    Slalom: Fast, verifi- able and private execution of neural networks in trusted hardware

    Florian Tramer and Dan Boneh. Slalom: Fast, verifi- able and private execution of neural networks in trusted hardware. InInternational Conference on Learning Representations, 2019

  69. [69]

    Ehsan Ullah et al. Challenges and barriers of using large language models (LLM) such as ChatGPT for diagnostic medicine with a focus on digital pathology–a recent scoping review.Diagnostic pathology, 19(1):43, 2024

  70. [70]

    Attention is all you need.Ad- vances in neural information processing systems, 30, 2017

    Ashish Vaswani et al. Attention is all you need.Ad- vances in neural information processing systems, 30, 2017

  71. [71]

    Yangyang Yu et al. Fincon: A synthesized LLM multi- agent system with conceptual verbal reinforcement for enhanced financial decision making.Advances in Neural Information Processing Systems, 37:137010–137045, 2024

  72. [72]

    Adversarial examples

    Rui Zhang et al. “Adversarial examples” for proof-of- learning. In2022 IEEE Symposium on Security and Privacy (SP), pages 1408–1422. IEEE, 2022

  73. [73]

    No privacy left outside: On the (in-) security of TEE-shielded DNN partition for on-device ML

    Ziqi Zhang et al. No privacy left outside: On the (in-) security of TEE-shielded DNN partition for on-device ML. In2024 IEEE Symposium on Security and Privacy (SP), pages 3327–3345. IEEE, 2024

  74. [74]

    Aligning books and movies: Towards story-like visual explanations by watching movies and reading books

    Yukun Zhu et al. Aligning books and movies: Towards story-like visual explanations by watching movies and reading books. InProceedings of the IEEE international conference on computer vision, pages 19–27, 2015. 16 A Operations and Properties in PAL ∗M Table 7 describes supported operations in PAL∗M and result- ing property attestations. Table 7: Operation...