Confidential Machine Learning within Graphcore IPUs

05/18/2022
by   Kapil Vaswani, et al.
0

We present IPU Trusted Extensions (ITX), a set of experimental hardware extensions that enable trusted execution environments in Graphcore's AI accelerators. ITX enables the execution of AI workloads with strong confidentiality and integrity guarantees at low performance overheads. ITX isolates workloads from untrusted hosts, and ensures their data and models remain encrypted at all times except within the IPU. ITX includes a hardware root-of-trust that provides attestation capabilities and orchestrates trusted execution, and on-chip programmable cryptographic engines for authenticated encryption of code and data at PCIe bandwidth. We also present software for ITX in the form of compiler and runtime extensions that support multi-party training without requiring a CPU-based TEE. Experimental support for ITX is included in Graphcore's GC200 IPU taped out at TSMC's 7nm technology node. Its evaluation on a development board using standard DNN training workloads suggests that ITX adds less than 5 overhead, and delivers up to 17x better performance compared to CPU-based confidential computing systems relying on AMD SEV-SNP.

READ FULL TEXT

page 1

page 8

research
05/11/2022

Trusted Container Extensions for Container-based Confidential Computing

Cloud computing has emerged as a corner stone of today's computing lands...
research
03/02/2022

Computation offloading to hardware accelerators in Intel SGX and Gramine Library OS

The Intel Software Guard Extensions (SGX) technology enables application...
research
06/26/2023

SoK: A Systematic Review of TEE Usage for Developing Trusted Applications

Trusted Execution Environments (TEEs) are a feature of modern central pr...
research
11/01/2022

Empowering Data Centers for Next Generation Trusted Computing

Modern data centers have grown beyond CPU nodes to provide domain-specif...
research
11/07/2017

StealthDB: a Scalable Encrypted Database with Full SQL Query Support

Encrypted database systems provide a great method for protecting sensiti...
research
05/28/2022

TinyIREE: An ML Execution Environment for Embedded Systems from Compilation to Deployment

Machine learning model deployment for training and execution has been an...
research
05/19/2019

Toward Scalable Fully Homomorphic Encryption Through Light Trusted Computing Assistance

It has been a long standing problem to securely outsource computation ta...

Please sign up or login with your details

Forgot password? Click here to reset