Learn Backend Development Part-Time, Online
AI Adoption - Drive Business Value and Organizational Impact
Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Learn about protecting accelerator execution in confidential computing through this 12-minute conference talk from USENIX Security '24. Explore how researchers from ETH Zurich developed ACAI, a solution that extends Arm Confidential Computing Architecture (CCA) to enable secure use of accelerators like GPUs and FPGAs in trusted execution environments. Discover their principled approach to addressing security gaps in device-side access while maintaining CCA security invariants. Examine experimental results demonstrating ACAI's feasibility in protecting accelerator execution without compromising security guarantees.
Syllabus
USENIX Security '24 - ACAI: Protecting Accelerator Execution with Arm Confidential Computing...
Taught by
USENIX