Proceedings of the ACM SIGOPS 28th Symposium on Operating Systems Principles 2021
DOI: 10.1145/3477132.3483554
|View full text |Cite
|
Sign up to set email alerts
|

TwinVisor

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
8
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 22 publications
(8 citation statements)
references
References 30 publications
0
8
0
Order By: Relevance
“…LITE [82] proposes a co-design framework between CPU TEE and its GPU TEE though it is not adapted to endpoint GPUs. Existing Arm TEEs (e.g., SANCTUARY [72], TrustICE [83], Inktag [84], Trustshadow [85] and vTZ [73]) leverage the non-secure [73] and secure [40] Stage-2 translation to achieve access control, or protect the untrusted applications with traditional TrustZone techniques [84], [85]. However, they are yet to consider the confidential computation on endpoint GPU.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…LITE [82] proposes a co-design framework between CPU TEE and its GPU TEE though it is not adapted to endpoint GPUs. Existing Arm TEEs (e.g., SANCTUARY [72], TrustICE [83], Inktag [84], Trustshadow [85] and vTZ [73]) leverage the non-secure [73] and secure [40] Stage-2 translation to achieve access control, or protect the untrusted applications with traditional TrustZone techniques [84], [85]. However, they are yet to consider the confidential computation on endpoint GPU.…”
Section: Related Workmentioning
confidence: 99%
“…Most works [72], [73], [83], [86] defend against the threat from the non-secure components but consider Secure OS and secure applications as trusted. Recent studies [40], [53], [87], [88] start to confine and isolate the integrated and potentially vulnerable Secure OS. TEEv [88] implements a minimal controller on the same privilege of Secure OS (i.e., S-EL1), while PrOS [87] monitors them in EL3.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…We envision scenarios where users or third-party developers request a realm to persistently store and execute the confidential GPU applications. The realm user transfers sensitive data through a secure and encrypted channel [32], [58], [79] to the requested realm. To follow Arm CCA's realm-style architecture, the realm user provides (1) GPU task code and (2) descriptions of data buffers to the untrusted GPU software to help construct a stub execution environment, including metadata, GPU buffers, and GPU page table.…”
Section: A Cage Overviewmentioning
confidence: 99%