ACAI: Extending Arm Confidential Computing Architecture Protection from CPUs to Accelerators

05/25/2023
by   Supraja Sridhara, et al.
0

Trusted execution environments in several existing and upcoming CPUs demonstrate the success of confidential computing, with the caveat that tenants cannot use accelerators such as GPUs and FPGAs. If the accelerators have TEE support, the user-code executing on the CPU in a confidential VM has to rely on software-based encryption to facilitate communication between VMs and accelerators. Even after hardware changes to enable TEEs on both sides and software changes to adopt existing code to leverage these features, it results in redundant data copies and hardware encryption at the bus-level and on the accelerator thus degrading the performance and defeating the purpose of using accelerators. In this paper, we reconsider the Arm Confidential Computing Architecture (CCA) design-an upcoming TEE feature in Arm v9-to address this gap. We observe that CCA offers the right abstraction and mechanisms to allow confidential VM to use accelerators as a first class abstraction, while relying on the hardware-based memory protection to preserve security. We build Acai, a CCA-based solution, to demonstrate the feasibility of our approach without changes to hardware or software on the CPU and the accelerator. Our experimental results on GPU and FPGA show that Acai can achieve strong security guarantees with low performance overheads.

READ FULL TEXT

page 3

page 13

research
09/07/2022

SAGE: Software-based Attestation for GPU Execution

With the application of machine learning to security-critical and sensit...
research
04/09/2019

Enabling Privacy-Preserving, Compute- and Data-Intensive Computing using Heterogeneous Trusted Execution Environment

There is an urgent demand for privacy-preserving techniques capable of s...
research
10/20/2020

PIE: A Platform-wide TEE

While modern computing architectures rely on specialized hardware such a...
research
11/01/2022

Empowering Data Centers for Next Generation Trusted Computing

Modern data centers have grown beyond CPU nodes to provide domain-specif...
research
10/01/2019

Interdiction in Practice – Hardware Trojan Against a High-Security USB Flash Drive

As part of the revelations about the NSA activities, the notion of inter...
research
12/04/2022

SoK: Fully Homomorphic Encryption Accelerators

Fully Homomorphic Encryption (FHE) is a key technology enabling privacy-...
research
12/24/2016

Application-aware Retiming of Accelerators: A High-level Data-driven Approach

Flexibility at hardware level is the main driving force behind adaptive ...

Please sign up or login with your details

Forgot password? Click here to reset