all InfoSec news
ACAI: Extending Arm Confidential Computing Architecture Protection from CPUs to Accelerators. (arXiv:2305.15986v1 [cs.CR])
cs.CR updates on arXiv.org arxiv.org
Trusted execution environments in several existing and upcoming CPUs
demonstrate the success of confidential computing, with the caveat that tenants
cannot use accelerators such as GPUs and FPGAs. If the accelerators have TEE
support, the user-code executing on the CPU in a confidential VM has to rely on
software-based encryption to facilitate communication between VMs and
accelerators. Even after hardware changes to enable TEEs on both sides and
software changes to adopt existing code to leverage these features, it results …
architecture arm code computing computing architecture confidential confidential computing cpu cpus environments gpus protection support upcoming