SoK: Opportunities for Software-Hardware-Security Codesign for Next Generation Secure Computing

被引:2
|
作者
Dangwal, Deeksha [1 ]
Cowan, Meghan [1 ]
Alaghi, Armin [1 ]
Lee, Vincent T. [1 ]
Reagen, Brandon [2 ]
Trippel, Caroline [3 ]
机构
[1] Facebook Real Labs Res, Redmond, WA 98052 USA
[2] New York Univ, New York, NY USA
[3] Stanford Univ, Stanford, CA USA
关键词
DIFFERENTIAL PRIVACY; ATTACKS; NOISE;
D O I
10.1145/3458903.3458911
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Users are demanding increased data security. As a result, security is rapidly becoming a first-order design constraint in next generation computing systems. Researchers and practitioners are exploring various security technologies to meet user demand such as trusted execution environments (e.g., Intel SGX, ARM TrustZone), homomorphic encryption, and differential privacy. Each technique provides some degree of security, but differs with respect to threat coverage, performance overheads, as well as implementation and deployment challenges. In this paper, we present a systemization of knowledge (SoK) on these design considerations and trade-offs using several prominent security technologies. Our study exposes the need for software-hardware-security codesign to realize efficient and effective solutions of securing user data. In particular, we explore how design considerations across applications, hardware, and security mechanisms must be combined to overcome fundamental limitations in current technologies so that we can minimize performance overhead while achieving sufficient threat model coverage. Finally, we propose a set of guidelines to facilitate putting these secure computing technologies into practice.
引用
收藏
页数:9
相关论文
共 50 条
  • [21] Grid and Cloud Computing: Opportunities for Integration with the Next Generation Network
    Rings, Thomas
    Caryer, Geoff
    Gallop, Julian
    Grabowski, Jens
    Kovacikova, Tatiana
    Schulz, Stephan
    Stokes-Rees, Ian
    JOURNAL OF GRID COMPUTING, 2009, 7 (03) : 375 - 393
  • [22] Grid and Cloud Computing: Opportunities for Integration with the Next Generation Network
    Thomas Rings
    Geoff Caryer
    Julian Gallop
    Jens Grabowski
    Tatiana Kovacikova
    Stephan Schulz
    Ian Stokes-Rees
    Journal of Grid Computing, 2009, 7 : 375 - 393
  • [23] Exploring Software Security Test Generation Techniques: Challenges and Opportunities
    Alenezi, Mamdouh
    Akour, Mohammed
    Basit, Hamid Abdul
    INTERNATIONAL JOURNAL OF EDUCATION AND INFORMATION TECHNOLOGIES, 2021, 15 : 106 - 121
  • [24] On the Security of a Secure and Lightweight Authentication Scheme for Next Generation IoT Infrastructure
    Das, Ashok Kumar
    Bera, Basudeb
    Wazid, Mohammad
    Jamal, Sajjad Shaukat
    Park, Youngho
    IEEE ACCESS, 2021, 9 : 71856 - 71867
  • [25] Guest Editorial: Hardware/Software Cross-Layer Technologies for Trustworthy and Secure Computing
    Hu, Shiyan
    Jin, Yier
    Heffner, Kenneth
    Tehranipoor, Mark
    IEEE TRANSACTIONS ON MULTI-SCALE COMPUTING SYSTEMS, 2016, 2 (03): : 144 - 145
  • [26] Preparing Next Generation of Software Engineers for Future Societal Challenges and Opportunities
    Dodig-Crnkovic, Gordana
    7TH INTERNATIONAL WORKSHOP ON SOCIAL SOFTWARE ENGINEERING (SSE 2015), 2015, : 49 - 52
  • [27] Building India as the destination for secure software development - Next wave of opportunities for the ICT industry
    Chand, P
    INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2005, 3803 : 49 - 65
  • [28] Next Generation Systems - Commercial Software and Free Software comparative Based on IDPS Security
    Mejia Miranda, Jezreel
    Peralta Mtz, Faleg A.
    2017 6TH INTERNATIONAL CONFERENCE ON SOFTWARE PROCESS IMPROVEMENT (CIMPS), 2017,
  • [29] A Survey of Software and Hardware Approaches to Performing Read Alignment in Next Generation Sequencing
    Al Kawam, Ahmad
    Khatri, Sunil
    Datta, Aniruddha
    IEEE-ACM TRANSACTIONS ON COMPUTATIONAL BIOLOGY AND BIOINFORMATICS, 2017, 14 (06) : 1202 - 1213
  • [30] Enhancing Security and Privacy of Next-Generation Edge Computing Technologies
    Hagan, Matthew
    Siddiqui, Fahad
    Sezer, Sakir
    2019 17TH INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2019, : 247 - 251