Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Learn about protecting accelerator execution in confidential computing through this 12-minute conference talk from USENIX Security '24. Explore how researchers from ETH Zurich developed ACAI, a solution that extends Arm Confidential Computing Architecture (CCA) to enable secure use of accelerators like GPUs and FPGAs in trusted execution environments. Discover their principled approach to addressing security gaps in device-side access while maintaining CCA security invariants. Examine experimental results demonstrating ACAI's feasibility in protecting accelerator execution without compromising security guarantees.
Syllabus
USENIX Security '24 - ACAI: Protecting Accelerator Execution with Arm Confidential Computing...
Taught by
USENIX