Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2022
DOI: 10.1145/3548606.3560627
|View full text |Cite
|
Sign up to set email alerts
|

StrongBox

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
12
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(13 citation statements)
references
References 33 publications
0
12
0
Order By: Relevance
“…For Intel architecture, HIX [71] extends the protection scope of the original Intel SGX technology to GPU computation by modifying the bus between the CPU and GPU, and the GPU driver to ensure an isolated GPU execution environment; SGX‐FPGA [72] designs a scheme to create a TEE between SGX and FPGA by embedding a CPU controller and FPGA security monitor in the CPU‐FPGA architecture to authenticate and encrypt communication data between the CPU and FPGA components. For ARM architecture, StrongBox [73] utilizes traditional Arm TrustZone technology to ensure GPU data security on edge devices; Cronus [74] utilizes ARM secure virtualization technology to build an isolated TEE for heterogeneous chips such as GPU and FPGA, ensuring the heterogeneous computation security of Arm cloud servers; CAGE [75] utilizes the RME hardware extension introduced by Arm CCA to achieve access control of GPU memory, providing confidential GPU computing support for the next generation of ARM cloud and edge devices. In addition, HETEE [76] designs a rack‐scale heterogeneous confidential computing environment that physically isolates protected devices as a whole, allowing the use of trusted peripherals in the TEE.…”
Section: Confidential Computing Architecture and Technologymentioning
confidence: 99%
“…For Intel architecture, HIX [71] extends the protection scope of the original Intel SGX technology to GPU computation by modifying the bus between the CPU and GPU, and the GPU driver to ensure an isolated GPU execution environment; SGX‐FPGA [72] designs a scheme to create a TEE between SGX and FPGA by embedding a CPU controller and FPGA security monitor in the CPU‐FPGA architecture to authenticate and encrypt communication data between the CPU and FPGA components. For ARM architecture, StrongBox [73] utilizes traditional Arm TrustZone technology to ensure GPU data security on edge devices; Cronus [74] utilizes ARM secure virtualization technology to build an isolated TEE for heterogeneous chips such as GPU and FPGA, ensuring the heterogeneous computation security of Arm cloud servers; CAGE [75] utilizes the RME hardware extension introduced by Arm CCA to achieve access control of GPU memory, providing confidential GPU computing support for the next generation of ARM cloud and edge devices. In addition, HETEE [76] designs a rack‐scale heterogeneous confidential computing environment that physically isolates protected devices as a whole, allowing the use of trusted peripherals in the TEE.…”
Section: Confidential Computing Architecture and Technologymentioning
confidence: 99%
“…CAGE can combine them to generate an attestation report for each realm to validate the GPU computing environment. CAGE can benefit from other works [32], [39], [63] to manage keys for each realm. Specifically, the user can exchange keys with its realm via Diffie-Hellman [40] or Elliptic-curve Diffie-Hellman [64] protocol.…”
Section: E Trust Establishment In Cagementioning
confidence: 99%
“…However, most solutions [31], [39], [52], [54], [61], [67], [70], [76], [81] rely on hardware security primitives that are not suitable for next-generation Arm devices (e.g., customized hardware, Intel-based security primitive, or traditional Arm security hardware), incurring tremendous challenges in mitigation. For example, HIX [52] leverages the Intel SGX, which is not supported in Arm devices, and StrongBox [39] trusts secure world software, which are not trusted in Arm CCA. Overall, it leads to a critical question: How can we extend the support of GPU acceleration to Arm CCA?…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…This paper is an extended version of our previous work [38] accepted in ACM Conference on Computer and Communications Security 2022. Based on that work, we further reduce the TCB size by defending against vulnerable implementations of secure world.…”
mentioning
confidence: 99%