skip to main content
10.1145/3466752.3480109acmconferencesArticle/Chapter ViewAbstractPublication PagesmicroConference Proceedingsconference-collections
research-article
Public Access

IceClave: A Trusted Execution Environment for In-Storage Computing

Published:17 October 2021Publication History

ABSTRACT

In-storage computing with modern solid-state drives (SSDs) enables developers to offload programs from the host to the SSD. It has been proven to be an effective approach to alleviate the I/O bottleneck. To facilitate in-storage computing, many frameworks have been proposed. However, few of them treat the in-storage security as the first citizen. Specifically, since modern SSD controllers do not have a trusted execution environment, an offloaded (malicious) program could steal, modify, and even destroy the data stored in the SSD.

In this paper, we first investigate the attacks that could be conducted by offloaded in-storage programs. To defend against these attacks, we build a lightweight trusted execution environment, named IceClave for in-storage computing. IceClave enables security isolation between in-storage programs and flash management functions that include flash address translation, data access control, and garbage collection, with TrustZone extensions. IceClave also achieves security isolation between in-storage programs by enforcing memory integrity verification of in-storage DRAM with low overhead. To protect data loaded from flash chips, IceClave develops a lightweight data encryption/decryption mechanism in flash controllers. We develop IceClave with a full system simulator. We evaluate IceClave with a variety of data-intensive applications such as databases. Compared to state-of-the-art in-storage computing approaches, IceClave introduces only 7.6% performance overhead, while enforcing security isolation in the SSD controller with minimal hardware cost. IceClave still keeps the performance benefit of in-storage computing by delivering up to 2.31 × better performance than the conventional host-based trusted computing approach.

References

  1. 2018. Amazon EC2 F1 Instances: Enable faster FPGA accelerator development and deployment in the cloud. https://aws.amazon.com/ec2/instance-types/f1/.Google ScholarGoogle Scholar
  2. 2018. Intel® Optane™ SSD DC P4801X Series. (2018).Google ScholarGoogle Scholar
  3. 2020. TPM 2.0 Library Specification. https://trustedcomputinggroup.org/resource/tpm-library-specification/.Google ScholarGoogle Scholar
  4. Ahmed Abulila, Vikram S Mailthody, Zaid Qureshi, Jian Huang, Nam Sung Kim, Jinjun Xiong, and Wen-mei Hwu. 2019. FlatFlash: Exploiting the Byte-Accessibility of SSDs within A Unified Memory-Storage Hierarchy. In Proceedings of the 24th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS’19). Providence, RI, USA.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Adil Ahmad, Kyungtae Kim, Muhammad Ihsanulhaq Sarfaraz, and Byoungyoung Lee. 2018. OBLIVIATE: A Data Oblivious Filesystem for Intel SGX. In NDSS’18.Google ScholarGoogle Scholar
  6. Anandtech. 2019. Memblaze’s PBlaze5 X26: Toshiba’s XL-Flash-Based Ultra-Low Latency SSD.Google ScholarGoogle Scholar
  7. ARM. 2007. ARM1156T2F-S Technical Reference Manual.Google ScholarGoogle Scholar
  8. Arm. 2013. Arm CoreLink TZC-400 TrustZone Address Space Controller. http://infocenter.arm.com/help/topic/com.arm.doc.ddi0504c/DDI0504C_tzc400_r0p1_trm.pdf.Google ScholarGoogle Scholar
  9. ARM. 2020. ARM Architecture Reference Manual for ARMv8-A.Google ScholarGoogle Scholar
  10. ARM. 2020. ARM Storage. https://www.arm.com/solutions/storage.Google ScholarGoogle Scholar
  11. Sergei Arnautov, Bohdan Trach, Franz Gregor, Thomas Knauth, Andre Martin, Christian Priebe, Joshua Lind, Divya Muthukumaran, Dan O’Keeffe, Mark L. Stillwell, David Goltzsche, Dave Eyers, Rüdiger Kapitza, Peter Pietzuch, and Christof Fetzer. 2016. SCONE: Secure Linux Containers with Intel SGX. In 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI’16). Savannah, GA.Google ScholarGoogle Scholar
  12. Amro Awad, Mao Ye, Yan Solihin, Laurent Njilla, and Kazi Abu Zubair. 2019. Triad-nvm: Persistency for integrity-protected and encrypted non-volatile memories. In Proceedings of the 46th International Symposium on Computer Architecture. 104–115.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Duck-Ho Bae, Jin-Hyung Kim, Sang-Wook Kim, Hyunok Oh, and Chanik Park. 2013. Intelligent SSD: A Turbo for Big Data Mining. In Proceedings of the 22nd ACM International Conference of Information Knowledge Management (CIKM’13). San Francisco, CA.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Maurice Bailleu, Jörg Thalheim, Pramod Bhatotia, Christof Fetzer, Michio Honda, and Kapil Vaswani. 2019. SPEICHER: Securing LSM-based Key-Value Stores using Shielded Execution. In 17th USENIX Conference on File and Storage Technologies (FAST’19). Boston, MA.Google ScholarGoogle Scholar
  15. R. Balasubramonian, J. Chang, T. Manning, J. H. Moreno, R. Murphy, R. Nair, and S. Swanson. 2014. Near-Data Processing: Insights from a MICRO-46 Workshop. IEEE Micro 34, 4 (2014).Google ScholarGoogle Scholar
  16. Andrew Baumann, Marcus Peinado, and Galen Hunt. 2014. Shielding Applications from an Untrusted Cloud with Haven. In 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI’14). Broomfield, CO.Google ScholarGoogle Scholar
  17. Andrew Baumann, Marcus Peinado, and Galen Hunt. 2014. Shielding Applications from an Untrusted Cloud with Haven. In 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI’14). Broomfield, CO.Google ScholarGoogle Scholar
  18. Matias Bjørling, Javier Gonzalez, and Philippe Bonnet. 2017. LightNVM: The Linux Open-Channel SSD Subsystem. In Proceedings of the 15th USENIX Conference on File and Storage Technologies (FAST’17). Santa Clara, CA.Google ScholarGoogle Scholar
  19. S. Boboila, Y. Kim, S. S. Vazhkudai, P. Desnoyers, and G. M. Shipman. 2012. Active Flash: Out-of-core Data Analytics on Flash Storage. In Proceedings of the IEEE 28th Symposium on Mass Storage Systems and Technologies (MSST’12). Monterey, CA.Google ScholarGoogle ScholarCross RefCross Ref
  20. Wei Cao, Yang Liu, Zhushi Cheng, Ning Zheng, Wei Li, Wenjie Wu, Linqiang Ouyang, Peng Wang, Yijing Wang, Ray Kuan, Zhenjun Liu, Feng Zhu, and Tong Zhang. 2020. POLARDB Meets Computational Storage: Efficiently Support Analytical Workloads in Cloud-Native Relational Database. In 18th USENIX Conference on File and Storage Technologies (FAST’20). Santa Clara, CA.Google ScholarGoogle Scholar
  21. Niladrish Chatterjee, Rajeev Balasubramonian, Manjunath Shevgoor, Seth Pugsley, Aniruddha Udipi, Ali Shafiee, Kshitij Sudan, Manu Awasthi, and Zeshan Chishti. 2012. Usimm: the utah simulated memory module. University of Utah, Tech. Rep(2012).Google ScholarGoogle Scholar
  22. Rakesh Cheerla. 2019. Computational SSDs. Storage Networking Industry Association(2019).Google ScholarGoogle Scholar
  23. Feng Chen, Rubao Lee, and Xiaodong Zhang. 2011. Essential roles of exploiting internal parallelism of flash memory based solid state drives in high-speed data processing. In Proceedings of the 17th IEEE International Symposium on High Performance Computer Architecture (HPCA’11).Google ScholarGoogle ScholarCross RefCross Ref
  24. Benjamin Y. Cho, Won Seob Jeong, Doohwan Oh, and Won Woo Ro. 2013. XSD: Accelerating MapReduce by Harnessing the GPU inside an SSD. In Proceedings of the 1st Workshop on Near-Data Processing in Conjunction with the 46th IEEE/ACM International Symposium on Microarchitecture (WoNDP). Davis, CA.Google ScholarGoogle Scholar
  25. Victor Costan and Srinivas Devadas. [n. d.]. Intel SGX Explained. https://eprint.iacr.org/2016/086.pdf.Google ScholarGoogle Scholar
  26. Victor Costan, Ilia Lebedev, and Srinivas Devadas. 2016. Sanctum: Minimal Hardware Extensions for Strong Software Isolation. In 25th USENIX Security Symposium (USENIX Security’16). Austin, TX.Google ScholarGoogle Scholar
  27. Victor Costan, Ilia Lebedev, and Srinivas Devadas. 2016. Sanctum: Minimal Hardware Extensions for Strong Software Isolation. In 25th USENIX Security Symposium (USENIX Security 16). USENIX Association, Austin, TX, 857–874. https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/costanGoogle ScholarGoogle ScholarDigital LibraryDigital Library
  28. Crispin Cowan, Steve Beattie, John Johansen, and Perry Wagle. 2003. PointGuard: Protecting Pointers From Buffer Overflow Vulnerabilities. In Proceedings of the 12th USENIX Security Symposium (USENIX Security’03).Google ScholarGoogle Scholar
  29. Ankur Dave, Chester Leung, Raluca Ada Popa, Joseph E. gonzalez, and Ion Stoica. 2020. Oblivious Coopetive Analytics Using Hardware Enclaves. In Proceedings of European Conference on Computer Systems (EuroSys’20). Crete, Greece.Google ScholarGoogle Scholar
  30. Christophe De Canniere and Bart Preneel. 2005. Trivium specifications. In eSTREAM, ECRYPT Stream Cipher Project.Google ScholarGoogle Scholar
  31. Delkin Industrial. 2019. Encryption and Security Development in Solid State Storage Devices (SSD). https://www.delkin.com/blog/encryption-and-security-development-in-solid-state-storage-devices-ssd/.Google ScholarGoogle Scholar
  32. Western Digital. 2019. RISC-V: Accelerating Next-Generation Compute Requirements. https://www.westerndigital.com/company/innovations/risc-v.Google ScholarGoogle Scholar
  33. Jaeyoung Do, Yang-Suk Kee, Jignesh M. Patel, Chanik Park, Kwanghyun Park, and David J. DeWitt. 2013. Query Processing on Smart SSDs: Opportunities and Challenges. In Proceedings of the ACM SIGMOD International Conference on Management of Data (SIGMOD’13). New York, NY.Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Jaeyoung Do, Yang-Suk Kee, Jignesh M. Patel, Chanik Park, Kwanghyun Park, and David J. DeWitt. 2013. Query Processing on Smart SSDs: Opportunities and Challenges. In Proceedings of the 2013 ACM SIGMOD International Conference on Management of Data (SIGMOD’13). New York, NY, USA.Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Andrew Ferraiuolo, Andrew Baumann, Chris Hawblitzel, and Bryan Parno. 2017. Komodo: Using Verification to Disentangle Secure-Enclave Hardware from Software. In Proceedings of the 26th Symposium on Operating Systems Principles (SOSP’17). Shanghai, China.Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. RISC-V Foundation. 2017. The RISC-V Instruction Set Manual. https://content.riscv.org/wp-content/uploads/2017/05/riscv-privileged-v1.10.pdf.Google ScholarGoogle Scholar
  37. gem5 development team. 2020. gem5 simulator.Google ScholarGoogle Scholar
  38. Donghyun Gouk, Miryeong Kwon, Jie Zhang, Sungjoon Koh, Wonil Choi, Nam Sung Kim, Mahmut Kandemir, and Myoungsoo Jung. 2018. Amber*: Enabling Precise Full-System Simulation with Detailed Modeling of All SSD Resources. In 2018 51st Annual IEEE/ACM International Symposium on Microarchitecture (MICRO). IEEE, 469–481.Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. B. Gu, A. S. Yoon, D. H. Bae, I. Jo, J. Lee, J. Yoon, J. U. Kang, M. Kwon, C. Yoon, S. Cho, J. Jeong, and D. Chang. 2016. Biscuit: A Framework for Near-Data Processing of Big Data Workloads. In 2016 ACM/IEEE 43rd Annual International Symposium on Computer Architecture (ISCA’16). Seoul, Korea.Google ScholarGoogle Scholar
  40. Aayush Gupta, Youngjae Kim, and Bhuvan Urgaonkar. 2009. DFTL: A Flash Translation Layer Employing Demand-based Selective Caching of Page-level Address Mappings. In Proceedings of the 14th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS’09). Washington, DC, USA.Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. Gareth Halfacree. 2018. SiFive’s RISC-V cores launch in two SSD families. https://www.bit-tech.net/news/tech/storage/sifives-risc-v-cores-launch-in-two-ssd-families/1/.Google ScholarGoogle Scholar
  42. Zhichao Hua, Jinyu Gu, Yubin Xia, Haibo Chen, Binyu Zang, and Haibing Guan. 2017. vTZ: Virtualizing ARM TrustZone. In 26th USENIX Security Symposium (USENIX Security’17). Vancouver, BC.Google ScholarGoogle Scholar
  43. Jian Huang, Anirudh Badam, Laura Caulfield, Suman Nath, Sudipta Sengupta, Bikash Sharma, and Moinuddin K. Qureshi. 2017. FlashBlox: Achieving Both Performance Isolation and Uniform Lifetime for Virtualized SSDs. In Proceedings of the 15th Usenix Conference on File and Storage Technologies (FAST’17). Santa clara, CA.Google ScholarGoogle Scholar
  44. Jian Huang, Anirudh Badam, Moinuddin K. Qureshi, and Karsten Schwan. 2015. Unified Address Translation for Memory-mapped SSDs with FlashMap. In Proceedings of the 42nd Annual International Symposium on Computer Architecture (ISCA’15). Portland, OR.Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. S. Jun, A. Wright, S. Zhang, S. Xu, and Arvind. 2018. GraFBoost: Using Accelerated Flash Storage for External Graph Analytics. In Proceedings of the 45th Annual International Symposium on Computer Architecture (ISCA’18). Los Angeles, CA.Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. Sang-Woo Jun, Ming Liu, Sungjin Lee, Jamey Hicks, John Ankcorn, Myron King, Shuotao Xu, and Arvind. 2015. BlueDBM: An Appliance for Big Data Analytics. SIGARCH Comput. Archit. News 43, 3 (June 2015).Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. Y. Kang, Y. Kee, E. L. Miller, and C. Park. 2013. Enabling cost-effective data processing with smart SSD. In Proceedings of the 28th IEEE Conference on Mass Storage Systems and Technologies (MSST’13). Lake Arrowhead, CA.Google ScholarGoogle Scholar
  48. Ahmed Khawaja, Joshua Landgraf, Rohith Prakash, Michael Wei, Eric Schkufza, and Christopher J. Rossbach. 2018. Sharing, Protection, and Compatibility for Reconfigurable Fabric with AmorphOS. In 13th USENIX Symposium on Operating Systems Design and Implementation (OSDI 18). Carlsbad, CA.Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. Jaeho Kim, Donghee Lee, and Sam H. Noh. 2015. Towards SLO Complying SSDs Through OPS Isolation. In Proceedings of the 13th USENIX Conference on File and Storage Technologies (FAST 15). Santa Clara, CA.Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. Taehoon Kim, Joongun Park, Jaewook Woo, Seungheun Jeon, and Jaehyuk Huh. 2019. ShieldStore: Shielded In-Memory Key-Value Storage with SGX. In Proceedings of the Fourteenth EuroSys Conference (EuroSys’19).Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. P. Kocher, J. Horn, A. Fogh, D. Genkin, D. Gruss, W. Haas, M. Hamburg, M. Lipp, S. Mangard, T. Prescher, M. Schwarz, and Y. Yarom. 2019. Spectre Attacks: Exploiting Speculative Execution. In Proceedings of the 2019 IEEE Symposium on Security and Privacy (Oakland’19).Google ScholarGoogle Scholar
  52. Gunjae Koo, Kiran Kumar Matam, Te I, H. V. Krishna Giri Narra, Jing Li, Hung-Wei Tseng, Steven Swanson, and Murali Annavaram. 2017. Summarizer: Trading Communication with Computing Near Storage. In Proceedings of the 50th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO’17). Cambridge, Massachusetts.Google ScholarGoogle ScholarDigital LibraryDigital Library
  53. Robert Krahn, Bohdan Trach, Anjo Vahldiek-Oberwagner, Thomas Knauth, Pramod Bhatotia, and Christof Fetzer. 2018. Pesos: Policy Enhanced Secure Object Store. In Proceedings of the Thirteenth EuroSys Conference (EuroSys’18).Google ScholarGoogle ScholarDigital LibraryDigital Library
  54. Dayeol Lee, David Kohlbrenner, Shweta Shinde, Krste Asanović, and Dawn Song. 2020. Keystone: An Open Framework for Architecting Trusted Execution Environments. In Proceedings of the Fifteenth European Conference on Computer Systems (EuroSys’20). Heraklion, Greece.Google ScholarGoogle ScholarDigital LibraryDigital Library
  55. David Lo, Liqun Cheng, Rama Govindaraju, Parthasarathy Ranganathan, and Christos Kozyrakis. 2015. Heracles: Improving Resource Efficiency at Scale. In Proceedings of the 42nd Annual International Symposium on Computer Architecture (ISCA’15).Google ScholarGoogle ScholarDigital LibraryDigital Library
  56. Vikram Sharma Mailthoday, Zaid Qureshi, Weixin Liang, Ziyan Feng, Simon Garcia de Gonzalo, Youjie Li, Hubertus Franke, Jinjun Xiong, Jian Huang, and Wenmei Hwu. 2019. DeepStore: In-Storage Acceleration for Intelligent Queries. In Proceedings of the 52nd IEEE/ACM International Symposium on Microarchitecture (MICRO’19). Columbus, OH.Google ScholarGoogle ScholarDigital LibraryDigital Library
  57. Kiran Kumar Matam, Gunjae Koo, Haipeng Zha, Hung-Wei Tseng, and Murali Annavaram. 2019. GraphSSD: Graph Semantics Aware SSD. In Proceedings of the 46th Annual International Symposium on Computer Architecture (ISCA’19). Phoenix, AZ.Google ScholarGoogle ScholarDigital LibraryDigital Library
  58. J. M. McCune, Y. Li, N. Qu, Z. Zhou, A. Datta, V. Gligor, and A. Perrig. 2010. TrustVisor: Efficient TCB Reduction and Attestation. In 2010 IEEE Symposium on Security and Privacy (Oakland’10).Google ScholarGoogle Scholar
  59. Jonathan M. McCune, Bryan J. Parno, Adrian Perrig, Michael K. Reiter, and Hiroshi Isozaki. 2008. Flicker: An Execution Infrastructure for Tcb Minimization. In Proceedings of the 3rd ACM SIGOPS/EuroSys European Conference on Computer Systems (EuroSys’08).Google ScholarGoogle ScholarDigital LibraryDigital Library
  60. Micron. 2019. Micron 3D NAND Flash Memory.Google ScholarGoogle Scholar
  61. Naveen Muralimanohar, Rajeev Balasubramonian, and Norman P Jouppi. 2009. CACTI 6.0: A Tool to Model Large Caches. HP laboratories (2009).Google ScholarGoogle Scholar
  62. Oleksii Oleksenko, Bohdan Trach, Robert Krahn, Mark Silberstein, and Christof Fetzer. 2018. Varys: Protecting SGX Enclaves from Practical Side-Channel Attacks. In 2018 USENIX Annual Technical Conference (USENIX ATC’18). Boston, MA.Google ScholarGoogle Scholar
  63. C. Priebe, K. Vaswani, and M. Costa. 2018. EnclaveDB: A Secure Database Using SGX. In 2018 IEEE Symposium on Security and Privacy (Oakland’18).Google ScholarGoogle Scholar
  64. Joel Reardon, Srdjan Capkun, and David Basin. 2012. Data Node Encrypted File System: Efficient Secure Deletion for Flash Memory. In Presented as part of the 21st USENIX Security Symposium (USENIX Security’12). Bellevue, WA.Google ScholarGoogle Scholar
  65. Brian Rogers, Siddhartha Chhabra, Milos Prvulovic, and Yan Solihin. 2007. Using address independent seed encryption and bonsai merkle trees to make secure processors os-and performance-friendly. In 40th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO 2007). IEEE, 183–196.Google ScholarGoogle ScholarDigital LibraryDigital Library
  66. Zhenyuan Ruan, Tong He, and Jason Cong. 2019. INSIDER: Designing In-Storage Computing System for Emerging High-Performance Drive. In 2019 USENIX Annual Technical Conference (USENIX ATC 19). USENIX Association, Renton, WA, 379–394. https://www.usenix.org/conference/atc19/presentation/ruanGoogle ScholarGoogle Scholar
  67. Gururaj Saileshwar, Prashant Nair, Prakash Ramrakhyani, Wendy Elsasser, Jose Joao, and Moinuddin Qureshi. 2018. Morphable counters: Enabling compact integrity trees for low-overhead secure memories. In 2018 51st Annual IEEE/ACM International Symposium on Microarchitecture (MICRO). IEEE, 416–427.Google ScholarGoogle ScholarDigital LibraryDigital Library
  68. Samsung. 2020. SmartSSD Computational Storage Drive. https://samsungsemiconductor-us.com/smartssd/index.html.Google ScholarGoogle Scholar
  69. Nuno Santos, Himanshu Raj, Stefan Saroiu, and Alec Wolman. 2014. Using ARM Trustzone to Build a Trusted Language Runtime for Mobile Applications. In Proceedings of the 19th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS’14).Google ScholarGoogle ScholarDigital LibraryDigital Library
  70. F. Schuster, M. Costa, C. Fournet, C. Gkantsidis, M. Peinado, G. Mainar-Ruiz, and M. Russinovich. 2015. VC3: Trustworthy Data Analytics in the Cloud Using SGX. In 2015 IEEE Symposium on Security and Privacy (Oakland’15).Google ScholarGoogle Scholar
  71. [71] Security Flaws Found in Intel Software, Data Center SSDs.[n. d.]. https://www.tomshardware.com/news/intel-security-vulnerabilities-processor-diagnostic-tool-ssd,39845.html.Google ScholarGoogle Scholar
  72. Sudharsan Seshadri, Mark Gahagan, Sundaram Bhaskaran, Trevor Bunker, Arup De, Yanqin Jin, Yang Liu, and Steven Swanson. 2014. Willow: A User-programmable SSD. In Proceedings of the 11th USENIX Conference on Operating Systems Design and Implementation (OSDI’14). Broomfield, CO.Google ScholarGoogle ScholarDigital LibraryDigital Library
  73. Anton Shilov. 2019. Samsung to Use SiFive RISC-V Cores for SoCs, Automotive, 5G Applications. https://www.anandtech.com/show/15228/samsung-to-use-riscv-cores.Google ScholarGoogle Scholar
  74. David Shue and Michael J. Freedman. 2014. From Application Requests to Virtual IOPs: Provisioned Key-Value Storage with Libra. In Proceedings of the Ninth European Conference on Computer Systems (EuroSys’14). New York, NY, USA.Google ScholarGoogle ScholarDigital LibraryDigital Library
  75. David Shue, Michael J. Freedman, and Anees Shaikh. 2012. Performance Isolation and Fairness for Multi-Tenant Cloud Storage. In Proceedings of the 10th USENIX Symposium on Operating Systems Design and Implementation (OSDI 12). Hollywood, CA.Google ScholarGoogle Scholar
  76. Dharma Shukla, Shireesh Thota, Karthik Raman, Madhan Gajendran, Ankur Shah, Sergii Ziuzin, Krishnan Sundaram, Miguel Gonzalez Guajardo, Anna Wawrzyniak, Samer Boshra, Renato Ferreira, Mohamed Nassar, Michael Koltachev, Ji Huang, Sudipta Sengupta, Justin Levandoski, and David Lomet. 2015. Schema-Agnostic Indexing with Azure DocumentDB. Proceeding of VLDB Endow. 8, 12 (Aug. 2015).Google ScholarGoogle Scholar
  77. Emin Gün Sirer, Willem de Bruijn, Patrick Reynolds, Alan Shieh, Kevin Walsh, Dan Williams, and Fred B. Schneider. 2011. Logical Attestation: An Authorization Architecture for Trustworthy Computing. In Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles (SOSP’11).Google ScholarGoogle ScholarDigital LibraryDigital Library
  78. Stavros Volos and Kapil Vaswani and Rodrigo Bruno. 2018. Graviton: Trusted Execution Environments on GPUs. In Proceedings of the 13th USENIX Symposium on Operating Systems Design and Implementation (OSDI’18). Carlsbad, CA.Google ScholarGoogle Scholar
  79. L. Szekeres, M. Payer, T. Wei, and D. Song. 2013. SoK: Eternal War in Memory. In Proceedings of the 2013 IEEE Symposium on Security and Privacy (Oakland’13).Google ScholarGoogle Scholar
  80. Meysam Taassori, Ali Shafiee, and Rajeev Balasubramonian. 2018. VAULT: Reducing paging overheads in SGX with efficient integrity verification structures. In Proceedings of the Twenty-Third International Conference on Architectural Support for Programming Languages and Operating Systems. 665–678.Google ScholarGoogle ScholarDigital LibraryDigital Library
  81. Devesh Tiwari, Simona Boboila, Sudharshan S. Vazhkudai, Youngjae Kim, Xiaosong Ma, Peter J. Desnoyers, and Yan Solihin. 2013. Active Flash: Towards Energy-efficient, In-situ Data Analytics on Extreme-scale Machines. In Proceedings of the 11th USENIX Conference on File and Storage Technologies (FAST’13). San Jose, CA.Google ScholarGoogle ScholarDigital LibraryDigital Library
  82. Devesh Tiwari, Sudharshan S. Vazhkudai, Youngjae Kim, Xiaosong Ma, Simona Boboila, and Peter J. Desnoyers. 2012. Reducing Data Movement Costs Using Energy Efficient, Active Computation on SSD. In Proceedings of the 2012 USENIX Conference on Power-Aware Computing and Systems (HotPower’12). Hollywood, CA.Google ScholarGoogle ScholarDigital LibraryDigital Library
  83. Hung-Wei Tseng, Laura M. Grupp, and Steven Swanson. 2013. Underpowering NAND Flash: Profits and Perils. In Proceedings of the 50th Annual Design Automation Conference (DAC’13).Google ScholarGoogle ScholarDigital LibraryDigital Library
  84. Hanyang University. 2020. The OpenSSD Project: Open-Source Solid-State Drive Project for Research and Education.Google ScholarGoogle Scholar
  85. Xiaohao Wang, You Zhou, Chance C. Coats, and Jian Huang. 2019. Project Almanac: A Time-Traveling Solid-State Drive. In Proceedings of the 14th European Conference on Computer Systems (EuroSys’19). Dresden, Germany.Google ScholarGoogle ScholarDigital LibraryDigital Library
  86. Steve Weis. 2014. Protecting Data In-Use from Firmware and Physical Attacks. Proceedings of Black Hat(2014).Google ScholarGoogle Scholar
  87. J. Weng, S. Liu, V. Dadu, Z. Wang, P. Shah, and T. Nowatzki. 2020. DSAGEN: Synthesizing Programmable Spatial Accelerators. In Proceedings of the ACM/IEEE 47th Annual International Symposium on Computer Architecture (ISCA’20).Google ScholarGoogle Scholar
  88. [88] What is a buffer overflow? And how hackers exploit these vulnerabilities.[n. d.]. https://www.csoonline.com/article/3513477/what-is-a-buffer-overflow-and-how-hackers-exploit-these-vulnerabilities.html.Google ScholarGoogle Scholar
  89. Bruce Wile. 2014. Coherent Accelerator Processor Interface (CAPI) for POWER8 Systems. White Paper (Sep 2014).Google ScholarGoogle Scholar
  90. Chenyu Yan, Daniel Englender, Milos Prvulovic, Brian Rogers, and Yan Solihin. 2006. Improving cost, performance, and security of memory encryption and authentication. ACM SIGARCH Computer Architecture News 34, 2 (2006), 179–190.Google ScholarGoogle ScholarDigital LibraryDigital Library
  91. Jiansong Zhang, Yongqiang Xiong, Ningyi Xu, Ran Shu, Bojie Li, Peng Cheng, Guo Chen, and Thomas Moscibroda. 2017. The Feniks FPGA Operating System for Cloud Computing. In Proceedings of the 8th Asia-Pacific Workshop on Systems (APSys’17).Google ScholarGoogle ScholarDigital LibraryDigital Library
  92. Ning Zhang, Junichi Tatemura, Jignesh Patel, and Hakan Hacigumus. 2014. Re-Evaluating Designs for Multi-Tenant OLTP Workloads on SSD-BasedI/O Subsystems. In Proceedings of the 2014 ACM SIGMOD International Conference on Management of Data (SIGMOD’14).Google ScholarGoogle ScholarDigital LibraryDigital Library
  93. Wenting Zheng, Ankur Dave, Jethro G. Beekman, Raluca Ada Popa, Joseph E. Gonzalez, and Ion Stoica. 2017. Opaque: An Oblivious and Encrypted Distributed Analytics Platform. In 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI’17). Boston, MA.Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Conferences
    MICRO '21: MICRO-54: 54th Annual IEEE/ACM International Symposium on Microarchitecture
    October 2021
    1322 pages
    ISBN:9781450385572
    DOI:10.1145/3466752

    Copyright © 2021 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 17 October 2021

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited

    Acceptance Rates

    Overall Acceptance Rate484of2,242submissions,22%

    Upcoming Conference

    MICRO '24

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format .

View HTML Format