Advanced Computing and Security

Report on Current Developments in Advanced Computing and Security

General Direction of the Field

The latest research in advanced computing and security is pushing the boundaries of efficiency, privacy, and integrity in heterogeneous systems. A significant trend is the integration of hardware acceleration with innovative software techniques to enhance the performance and security of various computing paradigms. This includes the development of specialized architectures for accelerating complex cryptographic operations, such as Fully Homomorphic Encryption (FHE), and the implementation of robust runtime integrity mechanisms to safeguard against control flow attacks.

In the realm of cloud computing, there is a growing emphasis on addressing security risks associated with data persistence in FPGA platforms, highlighting the need for automated and secure data management practices. Additionally, the perception of security challenges in Identity Access Management (IAM) solutions is being shaped by industry feedback, revealing critical gaps in both cloud-based and on-premise IAM implementations.

Confidential computing on heterogeneous systems is also a focal point, with researchers exploring the implications of extending Trusted Execution Environments (TEEs) to GPUs and other specialized computing cores. This research aims to identify and mitigate potential security risks, ensuring the efficient and secure operation of these systems.

Noteworthy Developments

  • Osiris: A Systolic Approach to Accelerating Fully Homomorphic Encryption - This paper introduces a novel systolic architecture that significantly accelerates FHE operations, outperforming existing state-of-the-art accelerators on standard benchmarks.
  • Cage: Hardware-Accelerated Safe WebAssembly - The proposal of Cage leverages Arm's hardware features to enhance the memory safety and security properties of WebAssembly, demonstrating minimal overheads and significant performance improvements.

These developments underscore the field's commitment to advancing both the theoretical foundations and practical implementations of secure and efficient computing systems.

Sources

Osiris: A Systolic Approach to Accelerating Fully Homomorphic Encryption

Security Risks Due to Data Persistence in Cloud FPGA Platforms

SoK: Runtime Integrity

Industry Perception of Security Challenges with Identity Access Management Solutions

Confidential Computing on Heterogeneous Systems: Survey and Implications

Cage: Hardware-Accelerated Safe WebAssembly