Confidential Computing Use Cases
Federated Learning, Multi-party Computing and Trusted Pipelines with CoCo
CoCo Use Cases Work Group
Cheng Jang Thye | chengjt@mac.com |
Chester Chen | chesterc@nvidia.com |
Isaac Yang | isaacy@nvidia.com |
Pradipta Banerjee | bpradipt@redhat.com |
James Magowan | magowan@uk.ibm.com |
Zvonko Kaiser | zkaiser@nvidia.com |
Confidential Computing Use Cases:
CC use cases across industries
Federated Learning Use Cases
Concerns when using federated learning
FL Use Cases that requires CC
CC will not protect
Confidential Federated Learning: Process
Attestations
CC Policies:
Protected Assets
Key Broker Service
Bootstrap:
Multi-party Computing (data clean room, confidential spaces etc)
Multi-Party Computing Requirements for CoCo
Requirements
CI/CD Pipeline (Supply Chain)
What environment did we use to :
Trusted Pipeline (Supply Chain)
A trusted CI/CD pipeline prevents malicious code from infiltrating the software and ensures that the software can be traced and verified.
We need to use CoCo as part of our CI/CD to establish a trusted pipeline
But considering OCI Images is not enough
Our Supply chain also includes:
Bootstrap Problem?
Confidential RAG LLMs – Threat Model
LLM01 - Prompt Injection
LLM02 - Insecure Output Handling
LLM03 - Training Data Poisoning
LLM05 - Supply Chain Vulnerabilities
LLM07 - Insecure Plugin Design
LLM08 - Excessive Agency
LLM06 - Sensitive Info. Disclosure
LLM04 - Model Denial of Service
LLM09 - Overreliance
LLM10 - Model Theft
Potential Threats: OWASP Top 10 for LLMs
Potential Mitigations Strategies with CC
Limit Attack Surface, Secure Execution of Plugins, Traceability
Limit Attack Surface, Secure Execution of Plugins, Traceability
Secure Data in Use (Model, Data) , Prevent Data Injection, Supply Chain Verification (Attestation)
Virtualization, 2nd Line of Defense, Resource Overuse, Input Flood
Supply Chain Verification, Attestation, Signing and Encryption
Encrypted Data Processing, Data Integrity and Confidentiality
Untrusted Code Execution in Enclave, Privilege Escalation limited
Excessive Functionality/Permissions/Autonomy limited to the Enclave
Confidential Computing (CC) doesn't directly address the issue of overreliance
Securing Execution Patterns, Encrypted Data Processing, Secure Execution Environments
Confidential RAG LLMs – Confidential Containers
Virtualization as 2nd line of defense, resource misuse, misconfiguration, see previous slide for more points
In a confidential environment confidential models should only be released upon positive attestation of the platform, signed and encrypted for supply chain verification.
Web Frontend
API Server
Model Server
Vector DB
Data Sources
LLMs trained on confidential data, would mean that the vectors represent this sensitive information. Vectors are a abstract representation, there’s still a risk to deduce confidential information
In a confidential environment confidential data sources should only be released upon positive attestation of the platform, signed and encrypted for supply chain verification.
Secure Key Release, decrypt confidential data only in a Trusted Execution Environment (TEE)
Models trained on confidential data needs protection when in use. Protection against model theft, API misuse, … Attestation can confirm a valid and genuine configuration. (Model watermarking, … )
General considerations for CC are compliance and regulations like GDPR, HiPAA, secure multi-party computation, protection against insider threats, … - Zero Trust
Model
Store
Secure Key Release, decrypt confidential model only in a TEE
CC
CC
CC
CC
CC
Confidential Container, complete pipeline protection, theft, misuse, resource exploitation: Zero Trust
https://github.com/NVIDIA/GenerativeAIExamples