Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
SoK: Confidential Quartet - Comparison of Platforms for Virtualization-Based Confidential Computing
KTH Royal Institute of Technology, Sweden.
Lund University, Sweden; CanaryBit, Sweden.ORCID iD: 0000-0003-0132-857x
RISE Research Institutes of Sweden, Digital Systems.
2022 (English)In: Proceedings - 2022 IEEE International Symposium on Secure and Private Execution Environment Design, SEED 2022, Institute of Electrical and Electronics Engineers Inc. , 2022, p. 109-120Conference paper, Published paper (Refereed)
Abstract [en]

Confidential computing allows processing sensitive workloads in securely isolated spaces. Following earlier adoption of process-based approaches to isolation, vendors are now enabling hardware and firmware support for virtualization-based confidential computing on several server platforms. Due to variations in the technology stack, threat model, implementation and functionality, the available solutions offer somewhat different capabilities, trade-offs and security guarantees. In this paper we review, compare and contextualize four virtualization-based confidential computing technologies for enterprise server platforms - AMD SEV, ARM CCA, IBM PEF and Intel TDX. 

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers Inc. , 2022. p. 109-120
Keywords [en]
Confidential Computing, Economic and social effects, Virtual reality, Virtualization, Computing technology, Contextualize, Enterprise servers, Model implementation, Process-based approach, Server platform, Threat modeling, Trade off, Virtualizations, Firmware
National Category
Computer Sciences
Identifiers
URN: urn:nbn:se:ri:diva-61597DOI: 10.1109/SEED55351.2022.00017Scopus ID: 2-s2.0-85143079315ISBN: 9781665485265 (electronic)OAI: oai:DiVA.org:ri-61597DiVA, id: diva2:1721183
Conference
2022 IEEE International Symposium on Secure and Private Execution Environment Design, SEED 2022, 26 September 2022 through 27 September 2022
Note

Funding details: Stiftelsen för Strategisk Forskning, SSF, RIT17-0035; Funding details: VINNOVA, 2021-01690; Funding text 1: We would like to thank our shepherd and the anonymous reviewers for the helpful comments. This work was supported in part by the VINNOVA grant 2021-01690 for the project CEST (Confidential Evaluation of Software Trustworthiness) and by the Swedish Foundation for Strategic Research, grant RIT17-0035.

Available from: 2022-12-21 Created: 2022-12-21 Last updated: 2022-12-21Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus

Authority records

Paladi, Nicolae

Search in DiVA

By author/editor
Paladi, Nicolae
By organisation
Digital Systems
Computer Sciences

Search outside of DiVA

GoogleGoogle Scholar

doi
isbn
urn-nbn

Altmetric score

doi
isbn
urn-nbn
Total: 340 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf