1、Strengthening Research Integritywith High-PerformanceComputing(HPC)SecurityAcknowledgmentsLead AuthorsChristopher FrenzYuvaraj MadheswaranAuthorsAbhishek JulkaChristopher FrenzIvan CasacubertaJohn SoaresMichael RozaParth JamodkarVictor Holanda RusuVijay VelusamyYuvaraj MadheswaranReviewersRichard Pr
2、escott Stearns Jr.Meghana ParwateKenneth MorasVaibhav MalikRakesh DattaHimanshu SharmaHarie Srinivasa Bangalore Ram ThilakAkesh DamarajuCSA Global StaffHillary BaronClaire LehnertStephen Smith Copyright 2024,Cloud Security Alliance.All rights reserved.2The permanent and official location for the Hig
3、h Performance Computing(HPC)Working Group ishttps:/cloudsecurityalliance.org/research/working-groups/high-performance-computing-cloud-security 2024 Cloud Security Alliance All Rights Reserved.You may download,store,display on yourcomputer,view,print,and link to the Cloud Security Alliance at https:/
4、cloudsecurityalliance.org subject tothe following:(a)the draft may be used solely for your personal,informational,noncommercial use;(b)the draft may not be modified or altered in any way;(c)the draft may not be redistributed;and(d)thetrademark,copyright or other notices may not be removed.You may qu
5、ote portions of the draft aspermitted by the Fair Use provisions of the United States Copyright Act,provided that you attribute theportions to the Cloud Security Alliance.Copyright 2024,Cloud Security Alliance.All rights reserved.3Table of ContentsAcknowledgments.2Table of Contents.4Introduction.5Go
6、al.6Audience.6Overview.6HPC Security Challenges.7HPC Architecture.8Better Security Makes Better Science.10Input Validation.10Error Handling.11Techniques for High-Performance Cloud Computing with Error Handling.12Encoding and Escaping.13Defensive Strategies:Input Escaping and Encoding.15Update Mechan