YoVDO

BlindAI: Secure Remote ML Inference with Intel SGX Enclaves

Offered By: Confidential Computing Consortium via YouTube

Tags

Intel SGX Courses Cybersecurity Courses Machine Learning Courses Privacy Courses Side Channel Attacks Courses Confidential Computing Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore secure remote ML inference using Intel SGX enclaves in this 57-minute talk from the Confidential Computing Consortium. Delve into BlindAI, an open-source confidential computing solution that balances security, privacy, and performance in machine learning applications. Learn about the motivation behind BlindAI, its design considerations for Intel SGX specifics, and the results of an independent security audit. Discover how this solution protects model and user data confidentiality while ensuring prediction integrity. Examine topics such as on-device machine learning, homomorphic encryption, trusted computing bases, threat mitigation strategies, and transparency in reproducibility and auditability. Access accompanying slides and the BlindAI repository for further exploration, and join the Discord community for questions and discussions.

Syllabus

Intro
Security and ML inference
On-device Machine Learning
Homomorphic encryption
Confidential Computing
Trusted computing base
Shrink the TCB
Overview
Enclave manifest
Threat: Memory vulnerability
Defense: SGX enclave in Rust
Threat: lago attacks, Confused dep
Threat: Software side channels
Defense : Constant-time programming
Side channel mitigation for the application code Hard to enforce in all code: ⚫ Compiler are allowed to add "side channel" when optimizing
Threat: n-day attacks
Defense: Plan for the worst
Transparency: reproducibility
Transparency: optimize for auditability
How do we protect ourselves?


Taught by

Confidential Computing Consortium

Related Courses

Systems & Networks Seminar - Andrew Bauman - Komodo: Using Verification to Disentangle Secure-Enclave Hardware from Software
Paul G. Allen School via YouTube
Plundervolt - Flipping Bits from Software without Rowhammer
Black Hat via YouTube
When Good Turns Evil - Using Intel SGX to Stealthily Steal Bitcoins
Black Hat via YouTube
CLKscrew - Exposing the Perils of Security-Oblivious Energy Management
Black Hat via YouTube
Port Contention for Fun and Profit
IEEE via YouTube