Machine learning with confidential computing: A systematization of knowledge

F Mo, Z Tarkhani, H Haddadi - ACM computing surveys, 2024 - dl.acm.org
Privacy and security challenges in Machine Learning (ML) have become increasingly
severe, along with ML's pervasive development and the recent demonstration of large attack …

Aster: Fixing the android tee ecosystem with arm cca

M Kuhne, S Sridhara, A Bertschi, N Dutly… - arXiv preprint arXiv …, 2024 - arxiv.org
The Android ecosystem relies on either TrustZone (eg, OP-TEE, QTEE, Trusty) or trusted
hypervisors (pKVM, Gunyah) to isolate security-sensitive services from malicious apps and …

Devlore: Extending Arm CCA to Integrated Devices A Journey Beyond Memory to Interrupt Isolation

A Bertschi, S Sridhara, F Groschupp, M Kuhne… - arXiv preprint arXiv …, 2024 - arxiv.org
Arm Confidential Computing Architecture (CCA) executes sensitive computation in an
abstraction called realm VMs and protects it from the hypervisor, host OS, and other co …