Главная
Study mode:
on
1
Intro
2
Existing TEEs not Support Many Heterogeneous Units
3
Heterogeneous TEE Inside a Single Chip
4
Related Works
5
Our New Design: HETEE
6
Threat Model
7
HETEE Overview
8
PCIe Express Fabric
9
Elastic Resources Allocation and Isolation
10
Efficient Secure Cleanup
11
Hardware Support for Secure Reboot
12
Pooling Enclave Resources
13
SC Functions and HETEE Enclaves
14
SC Structure
15
Hardware (De)Encryption & Scheduling
16
Hardware Isolation
17
Remote Attestation and Symmetric Key Negotiation
18
Certificate Chain
19
Prototype System
20
HETEE performance overhead on single GPU with different batch sizes.
21
HETEE latency overhead on single GPU with different batch stres
22
HETEE inference throughput scalability evaluation
23
Cost Analysis
24
Outline
25
TCB definition
26
Defense against physical attack
27
Conclusion
Description:
Explore a groundbreaking conference talk on enabling large-scale confidential computing through a novel Heterogeneous Trusted Execution Environment (TEE) design called HETEE. Discover how this innovative approach addresses the limitations of current TEEs by supporting high-throughput accelerators like GPUs, FPGAs, and TPUs without requiring chip-level changes. Learn about HETEE's unique architecture, which utilizes PCIe ExpressFabric for dynamic resource allocation and strong isolation, and its implementation of a thin TCB stack for security management. Gain insights into the system's performance evaluation using popular neural network inference and training tasks, showcasing minimal throughput overhead. Delve into the technical details of HETEE's components, including its security controller, hardware encryption, and remote attestation mechanisms, as well as its defense strategies against physical attacks.

Enabling Rack-Scale Confidential Computing Using Heterogeneous Trusted Execution Environment

IEEE
Add to list