Cybersecurity: Ethical Hacking Fundamentals - Self Paced Online
Learn Excel & Financial Modeling the Way Finance Teams Actually Use Them
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Learn about protecting accelerator execution in confidential computing through this 12-minute conference talk from USENIX Security '24. Explore how researchers from ETH Zurich developed ACAI, a solution that extends Arm Confidential Computing Architecture (CCA) to enable secure use of accelerators like GPUs and FPGAs in trusted execution environments. Discover their principled approach to addressing security gaps in device-side access while maintaining CCA security invariants. Examine experimental results demonstrating ACAI's feasibility in protecting accelerator execution without compromising security guarantees.
Syllabus
USENIX Security '24 - ACAI: Protecting Accelerator Execution with Arm Confidential Computing...
Taught by
USENIX