Please use this identifier to cite or link to this item: http://hdl.handle.net/10397/117541
PIRA download icon_1.1View/Download Full Text
DC FieldValueLanguage
dc.contributorDepartment of Computing-
dc.creatorWang, C-
dc.creatorLu, K-
dc.creatorZhang, F-
dc.creatorDeng, Y-
dc.creatorLeach, K-
dc.creatorCao, J-
dc.creatorNing, Z-
dc.creatorYan, S-
dc.creatorWei, T-
dc.creatorHe, Z-
dc.date.accessioned2026-02-26T03:46:44Z-
dc.date.available2026-02-26T03:46:44Z-
dc.identifier.issn1545-5971-
dc.identifier.urihttp://hdl.handle.net/10397/117541-
dc.language.isoenen_US
dc.publisherInstitute of Electrical and Electronics Engineersen_US
dc.rights© 2025 The Authors. This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/en_US
dc.rightsThe following publication C. Wang et al., "Building Confidential Accelerator Computing Environment for Arm CCA," in IEEE Transactions on Dependable and Secure Computing, vol. 23, no. 1, pp. 1308-1325, Jan.-Feb. 2026 is available at https://doi.org/10.1109/TDSC.2025.3615787.en_US
dc.subjectArm CCAen_US
dc.subjectConfidential accelerator computingen_US
dc.titleBuilding confidential accelerator computing environment for Arm CCAen_US
dc.typeJournal/Magazine Articleen_US
dc.identifier.spage1308-
dc.identifier.epage1325-
dc.identifier.volume23-
dc.identifier.issue1-
dc.identifier.doi10.1109/TDSC.2025.3615787-
dcterms.abstractConfidential computing is an emerging technique that provides users and third-party developers with an isolated and transparent execution environment. To support this technique, Arm introduced the Confidential Computing Architecture (CCA), which creates multiple isolated regions, known as realms, to ensure data confidentiality and integrity in security-sensitive tasks. However, hardware and firmware supporting confidential accelerator workloads remain unavailable. Moreover, due to incompatible hardware or large trusted computing base (TCB) size, existing studies for protecting acceleration are unsuitable for CCA’s realm-style architecture. Thus, there is a need to complement existing Arm CCA capabilities with accelerator support. We present CAGE to support confidential accelerator computing for Arm CCA, ensuring data security with CCA’s existing security features. To adapt the accelerator workflow to CCA’s realm-style architecture, CAGE proposes a novel shadow task mechanism to manage confidential accelerator applications flexibly. Additionally, CAGE leverages the memory isolation mechanism in Arm CCA to protect data confidentiality and integrity from the strong adversary. CAGE also optimizes security operations in memory isolation to mitigate performance overhead. Without hardware changes, we design and implement CAGE on two types of accelerators: Unified-memory GPU and generic FPGA. Our evaluation shows that CAGE effectively provides confidential accelerator support for Arm CCA with moderate overhead.-
dcterms.accessRightsopen accessen_US
dcterms.bibliographicCitationIEEE transactions on dependable and secure computing, Jan.-Feb. 2026, v. 23, no. 1, p. 1308-1325-
dcterms.isPartOfIEEE transactions on dependable and secure computing-
dcterms.issued2026-01-
dc.identifier.scopus2-s2.0-105017915925-
dc.identifier.eissn1941-0018-
dc.description.validate202602 bcch-
dc.description.oaVersion of Recorden_US
dc.identifier.FolderNumberOA_Scopus/WOSen_US
dc.description.fundingSourceRGCen_US
dc.description.fundingSourceOthersen_US
dc.description.fundingTextThis work was supported in part by the National Natural Science Foundation of China under Grant 62372218 and Grant U24A6009, in part by HK RGC Collaborative Research Fund under Grant C5032-23GF, in part by the Research Institute for Artificial Intelligence of Things, The Hong Kong Polytechnic University, and in part by Ant Group.en_US
dc.description.pubStatusPublisheden_US
dc.description.oaCategoryCCen_US
Appears in Collections:Journal/Magazine Article
Files in This Item:
File Description SizeFormat 
Wang_Building_Confidential_Accelerator.pdf1.38 MBAdobe PDFView/Open
Open Access Information
Status open access
File Version Version of Record
Access
View full-text via PolyU eLinks SFX Query
Show simple item record

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.