SoK: Opportunities for Software-Hardware-Security Codesign for Next Generation Secure Computing

被引:2
|
作者
Dangwal, Deeksha [1 ]
Cowan, Meghan [1 ]
Alaghi, Armin [1 ]
Lee, Vincent T. [1 ]
Reagen, Brandon [2 ]
Trippel, Caroline [3 ]
机构
[1] Facebook Real Labs Res, Redmond, WA 98052 USA
[2] New York Univ, New York, NY USA
[3] Stanford Univ, Stanford, CA USA
关键词
DIFFERENTIAL PRIVACY; ATTACKS; NOISE;
D O I
10.1145/3458903.3458911
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Users are demanding increased data security. As a result, security is rapidly becoming a first-order design constraint in next generation computing systems. Researchers and practitioners are exploring various security technologies to meet user demand such as trusted execution environments (e.g., Intel SGX, ARM TrustZone), homomorphic encryption, and differential privacy. Each technique provides some degree of security, but differs with respect to threat coverage, performance overheads, as well as implementation and deployment challenges. In this paper, we present a systemization of knowledge (SoK) on these design considerations and trade-offs using several prominent security technologies. Our study exposes the need for software-hardware-security codesign to realize efficient and effective solutions of securing user data. In particular, we explore how design considerations across applications, hardware, and security mechanisms must be combined to overcome fundamental limitations in current technologies so that we can minimize performance overhead while achieving sufficient threat model coverage. Finally, we propose a set of guidelines to facilitate putting these secure computing technologies into practice.
引用
收藏
页数:9
相关论文
共 50 条
  • [41] Software-Defined Hardware-Assisted Isolation for Trusted Next-Generation IoT Systems
    Kolimbianakis, Filippos-George
    Kornaros, George
    37TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, 2022, : 139 - 146
  • [42] Software-Controlled Next Generation Optical Circuit Switching for HPC and Cloud Computing Datacenters
    Imran, Muhammad
    Collier, Martin
    Landais, Pascal
    Katrinis, Kostas
    ELECTRONICS, 2015, 4 (04): : 909 - 921
  • [43] Hardware Implementation of Next Generation Reservoir Computing with RRAM-Based Hybrid Digital-Analog System
    Dong, Danian
    Zhang, Woyu
    Xie, Yuanlu
    Yue, Jinshan
    Ren, Kuan
    Huang, Hongjian
    Zheng, Xu
    Sun, Wen Xuan
    Lai, Jin Ru
    Fan, Shaoyang
    Wang, Hongzhou
    Yu, Zhaoan
    Yao, Zhihong
    Xu, Xiaoxin
    Shang, Dashan
    Liu, Ming
    ADVANCED INTELLIGENT SYSTEMS, 2024, 6 (10)
  • [44] Physically Unclonable Function using GSHE driven SOT assisted MTJ for next Generation Hardware Security Applications
    Divyanshu, Divyanshu
    Kumar, Rajat
    Khan, Danial
    Amara, Selma
    Massoud, Yehia
    2022 IEEE 65TH INTERNATIONAL MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS (MWSCAS 2022), 2022,
  • [45] A new computing and communication paradigm for next generation wireless services: Low power, secure wireless sensor networks
    Raghunathan, V
    Sultan, F
    Nagaraja, K
    Chakradhar, S
    2006 IEEE RADIO AND WIRELESS SYMPOSIUM, PROCEEDINGS, 2006, : 311 - 314
  • [46] Software-defined networks-enabled fog computing for IoT-based healthcare: Security, challenges and opportunities
    Kumhar, Malaram
    Bhatia, Jitendra
    SECURITY AND PRIVACY, 2023, 6 (05)
  • [47] Next-Generation Optimization Models and Algorithms in Cloud and Fog Computing Virtualization Security: The Present State and Future
    Verma, Rohit
    Rane, Dheeraj
    Jha, Ravi Shankar
    Ibrahim, Wubshet
    SCIENTIFIC PROGRAMMING, 2022, 2022
  • [48] SECURITY ENABLED NEW TERM WEIGHT MEASURE TECHNIQUE WITH DATA DRIVEN FOR NEXT GENERATION MOBILE COMPUTING NETWORKS
    Budati, Anil kumar
    Islam, Shayla
    Rafee, Shaik mohammad
    Chitteti, Chengamma
    Narayana, T. lakshmi
    SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2024, 25 (02): : 1191 - 1198
  • [49] Physically Unclonable Function Using GSHE Driven SOT Assisted p-MTJ for Next Generation Hardware Security Applications
    Divyanshu, Divyanshu
    Kumar, Rajat
    Khan, Danial
    Amara, Selma
    Massoud, Yehia
    IEEE ACCESS, 2022, 10 : 93029 - 93038
  • [50] Next-Generation Security: Detecting Suspicious Liquids Through Software Defined Radio Frequency Sensing and Machine Learning
    Daud, Ahmad
    Khan, Muhammad Bilal
    Khattak, Abdul Basit
    Tanoli, Shujaat Ali Khan
    Mustafa, Ali
    Rehman, Mubashir
    Lopez, Onel L. A.
    IEEE SENSORS JOURNAL, 2024, 24 (05) : 7140 - 7152