2021
DOI: 10.1109/tdsc.2019.2933214
|View full text |Cite
|
Sign up to set email alerts
|

Secure Computing Enclaves Using FPGAs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
7
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(7 citation statements)
references
References 29 publications
0
7
0
Order By: Relevance
“…Furthermore, the nature of our FHE algorithm also prevents the attack as well. Readback attack [49] is another conventional attack of FPGA implementation, the idea of the attack is read the configuration of the FPGA through the programming interface or JTAG to obtain private keys or FHE algorithms. The readback attack can be prevented by setting a security bit in FPGA which is used to disable different features, and it is better to embed our FPGA-based accelerator into a secure environment, where the configuration information can be deleted once detecting interference.…”
Section: Security Discussionmentioning
confidence: 99%
“…Furthermore, the nature of our FHE algorithm also prevents the attack as well. Readback attack [49] is another conventional attack of FPGA implementation, the idea of the attack is read the configuration of the FPGA through the programming interface or JTAG to obtain private keys or FHE algorithms. The readback attack can be prevented by setting a security bit in FPGA which is used to disable different features, and it is better to embed our FPGA-based accelerator into a secure environment, where the configuration information can be deleted once detecting interference.…”
Section: Security Discussionmentioning
confidence: 99%
“…To enable FPGAs in cloud computing, several authors agreed on the necessity of a trusted authority different from the cloud provider [6], [7], [8], [9], [10]. For practical reasons, the FPGA manufacturer is usually considered as the trusted authority and has an important role in the security of the remote connection between the client and the FPGA.…”
Section: Related Work 21 Trusted Authority For Cloud-enabled Fpgamentioning
confidence: 99%
“…In [6] and [7], secure FPGA enclaves are proposed. A TA is present in the communication scheme alongside the CP and the client, but their approach and achievements differ.…”
Section: Security Of Cloud-enabled Fpgamentioning
confidence: 99%
See 2 more Smart Citations