Publisher Theme
Art is not a luxury, but a necessity.

Usenix Security 24 Acai Protecting Accelerator Execution With Arm Confidential Computing

Free Video Acai Protecting Accelerator Execution With Arm
Free Video Acai Protecting Accelerator Execution With Arm

Free Video Acai Protecting Accelerator Execution With Arm In this paper, we reconsider the arm confidential computing architecture (cca) design, an upcoming tee feature in armv9 a, to address this gap. we observe that cca offers the right abstraction and mechanisms to allow confidential vms to use accelerators as a first class abstraction. In this paper, we reconsider the arm confidential computing architecture (cca) design, an upcoming tee feature in armv9 a, to address this gap. we observe that cca offers the right abstraction and mechanisms to allow confidential vms to use accelerators as a first class abstraction.

Acai
Acai

Acai In this paper, we reconsider the arm confidential computing architecture (cca) design, an upcoming tee feature in armv9 a, to address this gap. we observe that cca offers the right. Acai enables arm cca protected computation to securely connect and use accelerators. to demonstrate the feasibility and overheads of acai we evaluate its design on 2 accelera tors: gpu and fpga. We build acai, a cca based solution, to demonstrate the feasibility of our approach while addressing several critical security gaps. our experimental results on gpu and fpga show that acai can achieve strong security guarantees while maintaining performance and compatibility. Acai’s novel security invariants identify security gaps in arm cca and achieve secure peripheral execution without any hardware changes to the arm cca compliant hardware or tee enabled accelerators.

Acai
Acai

Acai We build acai, a cca based solution, to demonstrate the feasibility of our approach while addressing several critical security gaps. our experimental results on gpu and fpga show that acai can achieve strong security guarantees while maintaining performance and compatibility. Acai’s novel security invariants identify security gaps in arm cca and achieve secure peripheral execution without any hardware changes to the arm cca compliant hardware or tee enabled accelerators. In this paper, we reconsider the arm confidential computing architecture (cca) design—an upcoming tee feature in arm v9—to address this gap. Trusted execution environments in several existing and upcoming cpus demonstrate the success of confidential computing, with the caveat that tenants cannot securely use accelerators such as gpus and fpgas. In this paper, we reconsider the arm confidential computing architecture (cca) design, an upcoming tee feature in armv9 a, to address this gap. we observe that cca offers the right abstraction and mechanisms to allow confidential vms to use accelerators as a first class abstraction. Learn about protecting accelerator execution in confidential computing through this 12 minute conference talk from usenix security '24.

Acai
Acai

Acai In this paper, we reconsider the arm confidential computing architecture (cca) design—an upcoming tee feature in arm v9—to address this gap. Trusted execution environments in several existing and upcoming cpus demonstrate the success of confidential computing, with the caveat that tenants cannot securely use accelerators such as gpus and fpgas. In this paper, we reconsider the arm confidential computing architecture (cca) design, an upcoming tee feature in armv9 a, to address this gap. we observe that cca offers the right abstraction and mechanisms to allow confidential vms to use accelerators as a first class abstraction. Learn about protecting accelerator execution in confidential computing through this 12 minute conference talk from usenix security '24.

Acai
Acai

Acai In this paper, we reconsider the arm confidential computing architecture (cca) design, an upcoming tee feature in armv9 a, to address this gap. we observe that cca offers the right abstraction and mechanisms to allow confidential vms to use accelerators as a first class abstraction. Learn about protecting accelerator execution in confidential computing through this 12 minute conference talk from usenix security '24.

Usenix Security 24 Grant Opportunities Usenix
Usenix Security 24 Grant Opportunities Usenix

Usenix Security 24 Grant Opportunities Usenix

Comments are closed.