Securing AI Inference in the Cloud: Is CPU-GPU Confidential Computing ready ?Apoorve MohanMengmei Yeet al.2024CLOUD 2024
S2TAR-Cloud: Shared Secure Trusted Accelerators with Reconfiguration for Machine Learning in the CloudWei RenSandhya Koteshwaraet al.2024CLOUD 2024
Remote attestation of confidential VMs using ephemeral vTPMsVikram NarayananClaudio Siqueira de Carvalhoet al.2023ACSAC 2023
The Cost of Flexibility and Security in Cloud-Based HPC - A Case Study Running EDA Workloads With Confidential Computing TechnologyMengmei YeDerren Dunn2023SC 2023
From Confidential Computing to Zero Trust, Come Along for the (Bumpy?) RideMengmei YeSandhya Koteshwaraet al.2024MICRO 2024
Free the Turtles: Removing Nested Virtualization for Performance and Confidentiality in the CloudMengmei YeAngelo Ruoccoet al.2023CLOUD 2023
Zero Trust Hardware Architectures: when we “never trust”, what can we do to “always verify?”Mengmei YeSandhya Koteshwara2022WISE 2022
No More Turtles: The SecondaryVM Framework - An Alternative to Nested VirtualizationMengmei YeAngelo Ruocco2022KVM Forum 2022