Enabling privacy-preserving, compute-and data-intensive computing using heterogeneous trusted execution environment

J Zhu, R Hou, XF Wang, W Wang, J Cao, L Zhao… - arXiv preprint arXiv …, 2019 - arxiv.org
There is an urgent demand for privacy-preserving techniques capable of supporting
compute and data intensive (CDI) computing in the era of big data. However, none of …

Enabling rack-scale confidential computing using heterogeneous trusted execution environment

J Zhu, R Hou, XF Wang, W Wang, J Cao… - … IEEE Symposium on …, 2020 - ieeexplore.ieee.org
With its huge real-world demands, large-scale confidential computing still cannot be
supported by today's Trusted Execution Environment (TEE), due to the lack of scalable and …

CRONUS: Fault-isolated, secure and high-performance heterogeneous computing for trusted execution environment

J Jiang, J Qi, T Shen, X Chen, S Zhao… - 2022 55th IEEE/ACM …, 2022 - ieeexplore.ieee.org
With the trend of processing a large volume of sensitive data on PaaS services (eg, DNN
training), a TEE architecture that supports general heterogeneous accelerators, enables …

Preliminary study of trusted execution environments on heterogeneous edge platforms

Z Ning, J Liao, F Zhang, W Shi - 2018 IEEE/ACM Symposium …, 2018 - ieeexplore.ieee.org
The recent edge computing infrastructure introduces a new computing model that works as a
complement of the traditional cloud computing. The edge nodes in the infrastructure reduce …

Customizing trusted ai accelerators for efficient privacy-preserving machine learning

P Xie, X Ren, G Sun - arXiv preprint arXiv:2011.06376, 2020 - arxiv.org
The use of trusted hardware has become a promising solution to enable privacy-preserving
machine learning. In particular, users can upload their private data and models to a …

Sok: Limitations of confidential computing via tees for high-performance compute systems

A Akram, V Akella, S Peisert… - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
Trusted execution environments (TEEs) are primary enablers of confidential computing. This
paper presents a systematization of the existing trusted execution environments in industry …

Confidential execution of deep learning inference at the untrusted edge with arm trustzone

MS Islam, M Zamani, CH Kim, L Khan… - Proceedings of the …, 2023 - dl.acm.org
This paper proposes a new confidential deep learning (DL) inference system with ARM
TrustZone to provide confidentiality and integrity of DL models and data in an untrusted …

Empowering data centers for next generation trusted computing

A Dhar, S Sridhara, S Shinde, S Capkun… - arXiv preprint arXiv …, 2022 - arxiv.org
Modern data centers have grown beyond CPU nodes to provide domain-specific
accelerators such as GPUs and FPGAs to their customers. From a security standpoint, cloud …

Memory-efficient deep learning inference in trusted execution environments

JB Truong, W Gallagher, T Guo… - 2021 IEEE International …, 2021 - ieeexplore.ieee.org
This study identifies and proposes techniques to alleviate two key bottlenecks to executing
deep neural networks in trusted execution environments (TEEs): page thrashing during the …

Teep: Supporting secure parallel processing in arm trustzone

Z Li, W Li, Y Xia, B Zang - 2020 IEEE 26th International …, 2020 - ieeexplore.ieee.org
Machine learning applications are getting prevelent on various computing platforms,
including cloud servers, smart phones, IoT devices, etc. For these applications, security is …