Please use this identifier to cite or link to this item:
http://hdl.handle.net/10397/117541
| DC Field | Value | Language |
|---|---|---|
| dc.contributor | Department of Computing | - |
| dc.creator | Wang, C | - |
| dc.creator | Lu, K | - |
| dc.creator | Zhang, F | - |
| dc.creator | Deng, Y | - |
| dc.creator | Leach, K | - |
| dc.creator | Cao, J | - |
| dc.creator | Ning, Z | - |
| dc.creator | Yan, S | - |
| dc.creator | Wei, T | - |
| dc.creator | He, Z | - |
| dc.date.accessioned | 2026-02-26T03:46:44Z | - |
| dc.date.available | 2026-02-26T03:46:44Z | - |
| dc.identifier.issn | 1545-5971 | - |
| dc.identifier.uri | http://hdl.handle.net/10397/117541 | - |
| dc.language.iso | en | en_US |
| dc.publisher | Institute of Electrical and Electronics Engineers | en_US |
| dc.rights | © 2025 The Authors. This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/ | en_US |
| dc.rights | The following publication C. Wang et al., "Building Confidential Accelerator Computing Environment for Arm CCA," in IEEE Transactions on Dependable and Secure Computing, vol. 23, no. 1, pp. 1308-1325, Jan.-Feb. 2026 is available at https://doi.org/10.1109/TDSC.2025.3615787. | en_US |
| dc.subject | Arm CCA | en_US |
| dc.subject | Confidential accelerator computing | en_US |
| dc.title | Building confidential accelerator computing environment for Arm CCA | en_US |
| dc.type | Journal/Magazine Article | en_US |
| dc.identifier.spage | 1308 | - |
| dc.identifier.epage | 1325 | - |
| dc.identifier.volume | 23 | - |
| dc.identifier.issue | 1 | - |
| dc.identifier.doi | 10.1109/TDSC.2025.3615787 | - |
| dcterms.abstract | Confidential computing is an emerging technique that provides users and third-party developers with an isolated and transparent execution environment. To support this technique, Arm introduced the Confidential Computing Architecture (CCA), which creates multiple isolated regions, known as realms, to ensure data confidentiality and integrity in security-sensitive tasks. However, hardware and firmware supporting confidential accelerator workloads remain unavailable. Moreover, due to incompatible hardware or large trusted computing base (TCB) size, existing studies for protecting acceleration are unsuitable for CCA’s realm-style architecture. Thus, there is a need to complement existing Arm CCA capabilities with accelerator support. We present CAGE to support confidential accelerator computing for Arm CCA, ensuring data security with CCA’s existing security features. To adapt the accelerator workflow to CCA’s realm-style architecture, CAGE proposes a novel shadow task mechanism to manage confidential accelerator applications flexibly. Additionally, CAGE leverages the memory isolation mechanism in Arm CCA to protect data confidentiality and integrity from the strong adversary. CAGE also optimizes security operations in memory isolation to mitigate performance overhead. Without hardware changes, we design and implement CAGE on two types of accelerators: Unified-memory GPU and generic FPGA. Our evaluation shows that CAGE effectively provides confidential accelerator support for Arm CCA with moderate overhead. | - |
| dcterms.accessRights | open access | en_US |
| dcterms.bibliographicCitation | IEEE transactions on dependable and secure computing, Jan.-Feb. 2026, v. 23, no. 1, p. 1308-1325 | - |
| dcterms.isPartOf | IEEE transactions on dependable and secure computing | - |
| dcterms.issued | 2026-01 | - |
| dc.identifier.scopus | 2-s2.0-105017915925 | - |
| dc.identifier.eissn | 1941-0018 | - |
| dc.description.validate | 202602 bcch | - |
| dc.description.oa | Version of Record | en_US |
| dc.identifier.FolderNumber | OA_Scopus/WOS | en_US |
| dc.description.fundingSource | RGC | en_US |
| dc.description.fundingSource | Others | en_US |
| dc.description.fundingText | This work was supported in part by the National Natural Science Foundation of China under Grant 62372218 and Grant U24A6009, in part by HK RGC Collaborative Research Fund under Grant C5032-23GF, in part by the Research Institute for Artificial Intelligence of Things, The Hong Kong Polytechnic University, and in part by Ant Group. | en_US |
| dc.description.pubStatus | Published | en_US |
| dc.description.oaCategory | CC | en_US |
| Appears in Collections: | Journal/Magazine Article | |
Files in This Item:
| File | Description | Size | Format | |
|---|---|---|---|---|
| Wang_Building_Confidential_Accelerator.pdf | 1.38 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.



