Papers
Communities
Events
Blog
Pricing
Search
Open menu
Home
Papers
2305.15986
Cited By
ACAI: Protecting Accelerator Execution with Arm Confidential Computing Architecture
25 May 2023
Supraja Sridhara
Andrin Bertschi
Benedict Schluter
Mark Kuhne
Fabio Aliberti
Shweta Shinde
Re-assign community
ArXiv
PDF
HTML
Papers citing
"ACAI: Protecting Accelerator Execution with Arm Confidential Computing Architecture"
7 / 7 papers shown
Title
T-Edge: Trusted Heterogeneous Edge Computing
Jiamin Shen
Yao Chen
Weng-Fai Wong
Ee-Chien Chang
67
0
0
18 Dec 2024
TEESlice: Protecting Sensitive Neural Network Models in Trusted Execution Environments When Attackers have Pre-Trained Models
Ding Li
Ziqi Zhang
Mengyu Yao
Y. Cai
Yao Guo
Xiangqun Chen
FedML
37
2
0
15 Nov 2024
Devlore: Extending Arm CCA to Integrated Devices A Journey Beyond Memory to Interrupt Isolation
Andrin Bertschi
Supraja Sridhara
Friederike Groschupp
Mark Kuhne
Benedict Schluter
Clément Thorens
Nicolas Dutly
Srdjan Capkun
Shweta Shinde
18
2
0
11 Aug 2024
Aster: Fixing the Android TEE Ecosystem with Arm CCA
Mark Kuhne
Supraja Sridhara
Andrin Bertschi
Nicolas Dutly
Srdjan Capkun
Shweta Shinde
23
1
0
23 Jul 2024
Ascend-CC: Confidential Computing on Heterogeneous NPU for Emerging Generative AI Workloads
Aritra Dhar
Clément Thorens
Lara Magdalena Lazier
Lukas Cavigelli
41
1
0
16 Jul 2024
virtCCA: Virtualized Arm Confidential Compute Architecture with TrustZone
Xiang Xu
Wenhao Wang
Yongzheng Wu
Chenyu Wang
Huifeng Zhu
Haocheng Ma
Zhennan Min
Zixuan Pang
Rui Hou
Yier Jin
27
5
0
19 Jun 2023
Minimum Viable Device Drivers for ARM TrustZone
Liwei Guo
F. Lin
24
18
0
15 Oct 2021
1