An overview of PIM-Enclave. Compared to the baseline, the architecture adds access control for memory banks and AES-capable DMA engine to ensure confidentiality and integrity of the computed data inside memory. The proposed modifications are colored in grey.

An overview of PIM-Enclave. Compared to the baseline, the architecture adds access control for memory banks and AES-capable DMA engine to ensure confidentiality and integrity of the computed data inside memory. The proposed modifications are colored in grey.

Source publication
Preprint
Full-text available
Demand for data-intensive workloads and confidential computing are the prominent research directions shaping the future of cloud computing. Computer architectures are evolving to accommodate the computing of large data better. Protecting the computation of sensitive data is also an imperative yet challenging objective; processor-supported secure en...

Context in source publication

Context 1
... PIM-Enclave design retrofits the generalized baseline PIM design to support confidential computing. Figure 2 shows the overall design of PIM-Enclave with the proposed modifications. Key storage containing the root endorsement key (EK) and ROM are added to service attestation and loading requests from the host enclave. ...