SoK: Opportunities for Software-Hardware-Security Codesign for Next Generation Secure Computing

05/02/2021
by   Deeksha Dangwal, et al.
0

Users are demanding increased data security. As a result, security is rapidly becoming a first-order design constraint in next generation computing systems. Researchers and practitioners are exploring various security technologies to meet user demand such as trusted execution environments (e.g., Intel SGX, ARM TrustZone), homomorphic encryption, and differential privacy. Each technique provides some degree of security, but differs with respect to threat coverage, performance overheads, as well as implementation and deployment challenges. In this paper, we present a systemization of knowledge (SoK) on these design considerations and trade-offs using several prominent security technologies. Our study exposes the need for software-hardware-security codesign to realize efficient and effective solutions of securing user data. In particular, we explore how design considerations across applications, hardware, and security mechanisms must be combined to overcome fundamental limitations in current technologies so that we can minimize performance overhead while achieving sufficient threat model coverage. Finally, we propose a set of guidelines to facilitate putting these secure computing technologies into practice.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
04/08/2021

CRC: Fully General Model of Confidential Remote Computing

Digital services have been offered through remote systems for decades. T...
research
09/20/2023

Software Compartmentalization Trade-Offs with Hardware Capabilities

Compartmentalization is a form of defensive software design in which an ...
research
01/27/2020

Distributed systems and trusted execution environments: Trade-offs and challenges

Security and privacy concerns in computer systems have grown in importan...
research
09/24/2022

Certified Hardware Requirements Undermine Digital Currency

Design approaches based on certified hardware have featured prominently ...
research
07/31/2023

Confidential Computing across Edge-to-Cloud for Machine Learning: A Survey Study

Confidential computing has gained prominence due to the escalating volum...
research
07/23/2019

Keystone: An Open Framework for Architecting TEEs

Trusted execution environments (TEEs) are being used in all the devices ...
research
08/23/2019

Design choices for productive, secure, data-intensive research at scale in the cloud

We present a policy and process framework for secure environments for pr...

Please sign up or login with your details

Forgot password? Click here to reset