SoK: Opportunities for Software-Hardware-Security Codesign for Next Generation Secure Computing

被引:1
|
作者
Dangwal, Deeksha [1 ]
Cowan, Meghan [1 ]
Alaghi, Armin [1 ]
Lee, Vincent T. [1 ]
Reagen, Brandon [2 ]
Trippel, Caroline [3 ]
机构
[1] Facebook Real Labs Res, Redmond, WA 98052 USA
[2] New York Univ, New York, NY USA
[3] Stanford Univ, Stanford, CA USA
关键词
DIFFERENTIAL PRIVACY; ATTACKS; NOISE;
D O I
10.1145/3458903.3458911
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Users are demanding increased data security. As a result, security is rapidly becoming a first-order design constraint in next generation computing systems. Researchers and practitioners are exploring various security technologies to meet user demand such as trusted execution environments (e.g., Intel SGX, ARM TrustZone), homomorphic encryption, and differential privacy. Each technique provides some degree of security, but differs with respect to threat coverage, performance overheads, as well as implementation and deployment challenges. In this paper, we present a systemization of knowledge (SoK) on these design considerations and trade-offs using several prominent security technologies. Our study exposes the need for software-hardware-security codesign to realize efficient and effective solutions of securing user data. In particular, we explore how design considerations across applications, hardware, and security mechanisms must be combined to overcome fundamental limitations in current technologies so that we can minimize performance overhead while achieving sufficient threat model coverage. Finally, we propose a set of guidelines to facilitate putting these secure computing technologies into practice.
引用
收藏
页数:9
相关论文
共 50 条
  • [1] Reconfigurable Computing and Hardware/Software Codesign
    Plaks, Toomas P.
    Santambrogio, Marco D.
    Sciuto, Donatella
    EURASIP JOURNAL ON EMBEDDED SYSTEMS, 2008, (01)
  • [2] Hardware/Software Codesign and Implementation for Secure NFC Applications
    Baskir, Subutay Giray
    Ors, Berna
    2015 23RD SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU), 2015, : 2392 - 2395
  • [3] Integrated hardware/software codesign for heterogeneous computing systems
    Lam, Y. M.
    Coutinho, J. G. F.
    Luk, W.
    Leong, R. H. W.
    2008 4TH SOUTHERN CONFERENCE ON PROGRAMMABLE LOGIC, PROCEEDINGS, 2008, : 217 - +
  • [4] Automatic Software and Computing Hardware Codesign for Predictive Control
    Khusainov, Bulat
    Kerrigan, Eric C.
    Constantinides, George A.
    IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY, 2019, 27 (05) : 2295 - 2304
  • [5] CPU core generation for hardware-software codesign
    Jang, KS
    Kunieda, H
    APCCAS '96 - IEEE ASIA PACIFIC CONFERENCE ON CIRCUITS AND SYSTEMS '96, 1996, : 306 - 309
  • [6] Computing communication cost by Petri nets for hardware/software codesign
    Maciel, P
    Barros, E
    Rosenstiel, W
    8TH IEEE INTERNATIONAL WORKSHOP ON RAPID SYSTEM PROTOTYPING, PROCEEDINGS: SHORTENING THE PATH FROM SPECIFICATION TO PROTOTYPE, 1997, : 44 - 56
  • [7] MONET special issue on next generation hardware architectures for secure mobile computing
    Sklavos, Nicolas
    McLoone, Maire
    Zhang, Xinmiao
    MOBILE NETWORKS & APPLICATIONS, 2007, 12 (04): : 229 - 230
  • [8] Generation of software tools from processor descriptions for hardware/software codesign
    Hartoog, MR
    Rowson, JA
    Reddy, PD
    Desai, S
    Dunlop, DD
    Harcourt, EA
    Khullar, N
    DESIGN AUTOMATION CONFERENCE - PROCEEDINGS 1997, 1997, : 303 - 306
  • [9] MONET Special Issue on Next Generation Hardware Architectures for Secure Mobile Computing
    Nicolas Sklavos
    Máire McLoone
    Xinmiao Zhang
    Mobile Networks and Applications, 2007, 12 : 229 - 230
  • [10] SoK: Analysis of Software Supply Chain Security by Establishing Secure Design Properties
    Okafor, Chinenye
    Schorlemmer, Taylor R.
    Torres-Arias, Santiago
    Davis, James C.
    PROCEEDINGS OF THE 2022 ACM WORKSHOP ON SOFTWARE SUPPLY CHAIN OFFENSIVE RESEARCH AND ECOSYSTEM DEFENSES, SCORED 2022, 2022, : 15 - 24