Survey of research on confidential computing

D Feng, Y Qin, W Feng, W Li, K Shang… - IET …, 2024 - Wiley Online Library
As the global data strategy deepens and data elements accelerate integrating and flowing
more rapidly, the demand for data security and privacy protection has become increasingly …

A survey of recent attacks and mitigation on FPGA systems

S Duan, W Wang, Y Luo, X Xu - 2021 IEEE Computer society …, 2021 - ieeexplore.ieee.org
The emergence of a large variety of compute-intensive applications has made hardware
accelerators a new necessity to deploy the corresponding high-complexity algorithms, such …

CRONUS: Fault-isolated, secure and high-performance heterogeneous computing for trusted execution environment

J Jiang, J Qi, T Shen, X Chen, S Zhao… - 2022 55th IEEE/ACM …, 2022 - ieeexplore.ieee.org
With the trend of processing a large volume of sensitive data on PaaS services (eg, DNN
training), a TEE architecture that supports general heterogeneous accelerators, enables …

A survey on FPGA cybersecurity design strategies

A Proulx, JY Chouinard, P Fortier, A Miled - ACM Transactions on …, 2023 - dl.acm.org
This article presents a critical literature review on the security aspects of field-programmable
gate array (FPGA) devices. FPGA devices present unique challenges to cybersecurity …

Building your own trusted execution environments using fpga

M Armanuzzaman, AR Sadeghi, Z Zhao - Proceedings of the 19th ACM …, 2024 - dl.acm.org
Despite of their benefits, existing Trusted Execution Environments (TEE) or enclaves have
been criticized for lack of transparency, vulnerabilities, and various restrictions. A significant …

Securing AI Inference in the Cloud: Is CPU-GPU Confidential Computing Ready?

A Mohan, M Ye, H Franke, M Srivatsa… - 2024 IEEE 17th …, 2024 - ieeexplore.ieee.org
Many applications have been offloaded onto cloud environments to achieve higher agility,
access to more powerful computational resources, and obtain better infrastructure …

Machine learning with confidential computing: A systematization of knowledge

F Mo, Z Tarkhani, H Haddadi - ACM computing surveys, 2024 - dl.acm.org
Privacy and security challenges in Machine Learning (ML) have become increasingly
severe, along with ML's pervasive development and the recent demonstration of large attack …

[HTML][HTML] Enhancing the security and privacy in the IoT supply chain using blockchain and federated learning with trusted execution environment

L Zhu, S Hu, X Zhu, C Meng, M Huang - Mathematics, 2023 - mdpi.com
Federated learning has emerged as a promising technique for the Internet of Things (IoT) in
various domains, including supply chain management. It enables IoT devices to …

Decentralized translator of trust: Supporting heterogeneous tee for critical infrastructure protection

R Karanjai, R Collier, Z Gao, L Chen, X Fan… - Proceedings of the 5th …, 2023 - dl.acm.org
Trusted execution environment (TEE) technology has found many applications in mitigating
various security risks in an efficient manner, which is attractive for critical infrastructure …

Run-Time Self Attestation of FPGA Based IoT Devices

M Usama, MN Aman, B Sikdar - IEEE Internet of Things Journal, 2024 - ieeexplore.ieee.org
Flexibility and reconfigurability make field-programmable gate arrays (FPGAs) ideal for IoT
applications because they enable efficient customization and optimization of hardware …