{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T01:05:47Z","timestamp":1773277547122,"version":"3.50.1"},"reference-count":37,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,7,9]],"date-time":"2023-07-09T00:00:00Z","timestamp":1688860800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,7,9]],"date-time":"2023-07-09T00:00:00Z","timestamp":1688860800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,7,9]]},"DOI":"10.1109\/dac56929.2023.10247768","type":"proceedings-article","created":{"date-parts":[[2023,9,15]],"date-time":"2023-09-15T17:31:31Z","timestamp":1694799091000},"page":"1-6","source":"Crossref","is-referenced-by-count":12,"title":["AccShield: a New Trusted Execution Environment with Machine-Learning Accelerators"],"prefix":"10.1109","author":[{"given":"Wei","family":"Ren","sequence":"first","affiliation":[{"name":"University of Illinois Urbana-Champaign"}]},{"given":"William","family":"Kozlowski","sequence":"additional","affiliation":[{"name":"University of Illinois Urbana-Champaign"}]},{"given":"Sandhya","family":"Koteshwara","sequence":"additional","affiliation":[{"name":"IBM Research"}]},{"given":"Mengmei","family":"Ye","sequence":"additional","affiliation":[{"name":"IBM Research"}]},{"given":"Hubertus","family":"Franke","sequence":"additional","affiliation":[{"name":"IBM Research"}]},{"given":"Deming","family":"Chen","sequence":"additional","affiliation":[{"name":"University of Illinois Urbana-Champaign"}]}],"member":"263","reference":[{"key":"ref13","article-title":"Sanctum: Minimal Hardware Extensions for Strong Software Isolation","author":"costan","year":"2016","journal-title":"USENIX SEC'16"},{"key":"ref35","article-title":"Security Protocol and Data Model Specification","year":"2021"},{"key":"ref12","article-title":"Strengthening VM isolation with integrity protection and more","year":"2020"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586132"},{"key":"ref15","article-title":"Intel Trust Domain Extensions","year":"2022"},{"key":"ref37","article-title":"Protecting Data over PCIe & CXL in Cloud Computing","author":"neustadter","year":"2022"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3342195.3387532"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2018.00024"},{"key":"ref31","author":"oded","year":"2009","journal-title":"Foundations of Cryptography Volume 2 Basic Applications"},{"key":"ref30","article-title":"Modelling and Automatically Analysing Privacy Properties for Honest-but-curious Adversaries","author":"paverd","year":"2014","journal-title":"University of Oxford Technical Report Tech Rep"},{"key":"ref11","article-title":"ARM security technology - building a secure system using TrustZone technology","author":"limited","year":"2009"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ASPDAC.2014.6742869"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2487726.2488368"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/1506409.1506429"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SASP.2009.5226333"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1142155.1142161"},{"key":"ref17","article-title":"Graviton: Trusted Execution Environments on GPUs","author":"volos","year":"2018","journal-title":"OSDI 18 USENIX"},{"key":"ref16","article-title":"ARM confidential compute architecture","year":"2021"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00054"},{"key":"ref18","article-title":"Confidential Machine Learning within Graphcore IPUs","author":"vaswani","year":"2022"},{"key":"ref24","article-title":"SESAME: Software Defined Enclaves to Secure Inference Accelerators with Multi-tenant Execution","author":"banerjee","year":"2020"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3489517.3530439"},{"key":"ref26","first-page":"991","article-title":"Do OS abstractions make sense on FPGAs?","author":"korolija","year":"2020","journal-title":"USENIX OSDI &#x2019;04"},{"key":"ref25","article-title":"NVIDIA H100 Tensor Core GPU","year":"2022"},{"key":"ref20","article-title":"Sharing, Protection, and Compatibility for Reconfigurable Fabric with AmorphOS","author":"khawaja","year":"2018","journal-title":"OSDI 18 USENIX"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3069223"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/iSES52644.2021.00093"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ASAP.2017.7995257"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2897937.2898034"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3453930"},{"key":"ref7","article-title":"Amazon EC2 F1 instances","year":"2022"},{"key":"ref9","article-title":"Implementation of a Tensor Processing Unit with focus on Embedded Systems and the Internet of Things","author":"fuhrmann","year":"2018"},{"key":"ref4","first-page":"288","article-title":"Ai benchmark: Running deep neural networks on android smartphones","author":"ignatov","year":"2018","journal-title":"ECCV &#x2019;16"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3079856.3080246"},{"key":"ref6","first-page":"51","article-title":"Azure accelerated networking: SmartNICs in the public cloud","author":"firestone","year":"2018","journal-title":"USENIX NSDI '&#x2018;12"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/HCS52781.2021.9567066"}],"event":{"name":"2023 60th ACM\/IEEE Design Automation Conference (DAC)","location":"San Francisco, CA, USA","start":{"date-parts":[[2023,7,9]]},"end":{"date-parts":[[2023,7,13]]}},"container-title":["2023 60th ACM\/IEEE Design Automation Conference (DAC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10247654\/10247655\/10247768.pdf?arnumber=10247768","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,2]],"date-time":"2023-10-02T17:42:08Z","timestamp":1696268528000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10247768\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,9]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/dac56929.2023.10247768","relation":{},"subject":[],"published":{"date-parts":[[2023,7,9]]}}}