Quantitative and Qualitative Investigations into Trusted Execution Environments

被引:0
|
作者
Karl, Ryan [1 ]
机构
[1] Univ Notre Dame, Notre Dame, IN 46556 USA
关键词
Trusted Execution Environment; Hybrid secure computation; Performance optimization and modeling; DATA ANALYTICS;
D O I
10.1007/978-3-030-90022-9_19
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
I propose to develop a quantitative and qualitative framework to integrate a Trusted Execution Environment (TEE) into the pipeline of secure computation by combining it with other cryptographic primitives. Such a hybrid framework will utilize mathematical and statistical modeling techniques to decide how to combine TEE and cryptographic primitives and evaluate the potential for performance improvement by moving secure computation processes into or out of a TEE. Ideally, I will be able to determine when to combine TEEs with pure-cryptography techniques to improve performance for a task, instead of simply using either method alone and only achieving suboptimal performance. The final goal is to design and develop an actionable decision-making framework, and utilize it to optimize the secure computation process.
引用
收藏
页码:372 / 383
页数:12
相关论文
共 50 条
  • [41] SoK: Understanding Designs Choices and Pitfalls of Trusted Execution Environments
    Li, Mengyuan
    Yang, Yuheng
    Chen, Guoxing
    Yan, Mengjia
    Zhang, Yinqian
    PROCEEDINGS OF THE 19TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, ACM ASIACCS 2024, 2024, : 1600 - 1616
  • [42] Formal Verification of Virtualization-Based Trusted Execution Environments
    Witharana, Hasini
    Weerasena, Hansika
    Mishra, Prabhat
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2024, 43 (11) : 4262 - 4273
  • [43] How Trusted Execution Environments Fuel Research on Microarchitectural Attacks
    Schwarz, Michael
    Gruss, Daniel
    IEEE SECURITY & PRIVACY, 2020, 18 (05) : 18 - 27
  • [44] Secret Sharing in Pub/Sub Using Trusted Execution Environments
    Munster, Javier
    Jacobsen, Hans-Arno
    DEBS'18: PROCEEDINGS OF THE 12TH ACM INTERNATIONAL CONFERENCE ON DISTRIBUTED AND EVENT-BASED SYSTEMS, 2018, : 28 - 39
  • [45] Preliminary Study of Trusted Execution Environments on Heterogeneous Edge Platforms
    Ning, Zhenyu
    Liao, Jinghui
    Zhang, Fengwei
    Shi, Weisong
    2018 THIRD IEEE/ACM SYMPOSIUM ON EDGE COMPUTING (SEC), 2018, : 421 - 426
  • [46] A Secure IIoT Gateway Architecture based on Trusted Execution Environments
    Antônio Augusto Fröhlich
    Leonardo Passig Horstmann
    José Luis Conradi Hoffmann
    Journal of Network and Systems Management, 2023, 31
  • [47] Mitigating Adversarial Attacks in Federated Learning with Trusted Execution Environments
    Queyrut, Simon
    Schiavoni, Valerio
    Felber, Pascal
    2023 IEEE 43RD INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, ICDCS, 2023, : 626 - 637
  • [48] Building Your Own Trusted Execution Environments Using FPGA
    Armanuzzaman, Md
    Sadeghi, Ahmad-Reza
    Zhao, Ziming
    PROCEEDINGS OF THE 19TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, ACM ASIACCS 2024, 2024, : 1584 - 1599
  • [49] SYSTEMATIZATION OF TRUSTED I/O SOLUTIONS FOR ISOLATED EXECUTION ENVIRONMENTS
    Stancu, Florin-Alexandru
    Mircea, Alexandru-Alin
    Rughinis, Razvan
    Chiroiu, Mihai
    UNIVERSITY POLITEHNICA OF BUCHAREST SCIENTIFIC BULLETIN SERIES C-ELECTRICAL ENGINEERING AND COMPUTER SCIENCE, 2022, 84 (02): : 3 - 14
  • [50] Revisiting the Design of Parallel Stream Joins on Trusted Execution Environments
    Meftah, Souhail
    Zhang, Shuhao
    Veeravalli, Bharadwaj
    Aung, Khin Mi Mi
    ALGORITHMS, 2022, 15 (06)