Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

ACAI: Protecting Accelerator Execution with Arm Confidential Computing Architecture

USENIX via YouTube

Overview

Learn about protecting accelerator execution in confidential computing through this 12-minute conference talk from USENIX Security '24. Explore how researchers from ETH Zurich developed ACAI, a solution that extends Arm Confidential Computing Architecture (CCA) to enable secure use of accelerators like GPUs and FPGAs in trusted execution environments. Discover their principled approach to addressing security gaps in device-side access while maintaining CCA security invariants. Examine experimental results demonstrating ACAI's feasibility in protecting accelerator execution without compromising security guarantees.

Syllabus

USENIX Security '24 - ACAI: Protecting Accelerator Execution with Arm Confidential Computing...

Taught by

USENIX

Reviews

Start your review of ACAI: Protecting Accelerator Execution with Arm Confidential Computing Architecture

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.