Research & Innovation
Technological leadership through research contributions
CanaryBit maintains its technological leadership through active research in Confidential Computing and Privacy-Enhancing Technologies (PETs). As a partner in research and innovation actions, CanaryBit applies state-of-the-art cybersecurity solutions to enable end-to-end encryption of data throughout its lifecycle.
Research and Innovation Projects
Publications
CanaryBit’s solutions build on cutting-edge research conducted by our staff R&D engineers, world-class academic partners and talented students from all over the world who choose CanaryBit for their degree projects.
We are proud to continue advancing the state of the art in security and privacy while transferring results into to robust commercial products.
Understanding the performance overhead of Confidential Computing on High-Performance Computing: Profiling and benchmarking of HPC workloads on systems secured by AMD SEV-SNP
Anton Iacobaeus
2025, MSc, Linköping University, Sweden
Abstract
High-performance computing (HPC) has expanded beyond traditional on-premise systems, increasing the need to secure sensitive data and proprietary algorithms. Confidential Computing addresses this need by securing data in use through hardware-based Trusted Execution Environments (TEEs). Combining HPC with Confidential Computing can facilitate broader and more secure access to HPC resources, particularly in cloud environments. However, the additional confidentiality added by Confidential Computing comes at a performance cost.
This thesis extends previous research on the performance impact of AMD Secure Encrypted Virtualization-Secure Nested Paging (SEV-SNP) on HPC workloads. It provides new benchmarking results for workloads utilizing Message Passing Interface (MPI) and explores strategies to mitigate the performance overhead introduced by AMD SEV-SNP.
The results show that AMD SEV-SNP’s baseline overhead can reach up to 13%. Profiling reveals decreased translation lookaside buffer (TLB) utilization, increased cache misses, and both higher frequency and longer resolve time for VMEXIT events. Optimization strategies such as the use of huge pages and paravirtualization demonstrate potential methods for reducing this overhead and improving performance.
Impact of Operating Systems on Edge Devices: Benchmarking Performance, Reliability, and Post-Quantum Readiness
Fabien Guihard
2025, MSc, University of Turku, Finland
Abstract
As edge computing advances, the growing threat of quantum computers is driving public key cryptographic standards toward deprecation by 2030. Many studies focus on postquantum algorithms for constrained devices, and others tackle scalable edge management, yet very few examine the edge operating system as the point where performance, reliability, and post-quantum security converge. This thesis begins by outlining a framework of key requirements for reliable and scalable edge operating systems, then addresses the research gap through an empirical comparison of three OS architectures (mutable, immutable, and container-based) using six Linux distributions deployed on a Raspberry Pi 4B edge node.
A reproducible testbed was used to conduct three evaluations. The first measured system-level performance, including CPU, RAM, and disk I/O. The second assessed the operating system’s resilience during system updates interrupted by power loss. The third evaluated the latency of two NIST post-quantum cryptography standards: ML-KEM and ML-DSA. Statistical analysis revealed that the immutable design of NixOS provides the best overall balance, offering top-tier throughput with atomic and declarative updates that withstood every fault-injection scenario. The container-based system openSUSE MicroOS matched NixOS in automated rollback capability and passed every power-failure test, yet introduced higher PQC latencies and disk-I/O overhead. Mutable systems (Ultramarine Linux, Manjaro ARM, DietPi, Raspberry Pi OS Lite) showed varied performance strengths but shared a critical weakness. Ultramarine delivered the fastest post-quantum operations, Manjaro offered a well-rounded balance, DietPi excelled in RAM throughput thanks to its minimal footprint, and Raspberry Pi OS Lite provided a stable baseline. Yet every one of these mutable distributions failed to reboot cleanly after power-cut interruptions and required manual repair.
These results confirm that OS architecture directly affects system performance, operational resilience, and the runtime cost of quantum-safe cryptography. OS choice must be treated as a primary design decision for future edge deployments rather than a question of convenience or familiarity.
TAPShield: Securing Trigger-Action Platforms against Strong Attackers
Mojtaba Moazen, Nicolae Paladi, Adnan Jamil Ahsan, Musard Balliu
2025, 10th IEEE European Symposium on Security and Privacy (Euro S&P).
Abstract
Automation apps enable seamless connection of IoT devices and services to provide useful functionality for end-users. Apps are typically executed on cloud-based Trigger-Action Platforms (TAPs) such as IFTTT and NodeRED, supporting both single- and multi-tenant models. Such models raise security and privacy concerns in the face of cloud attackers and malicious app makers, resulting in massive and uncontrolled exfiltration of sensitive user data.
To address these concerns, we design TAPShield, an architecture that uses confidential computing and languagelevel sandboxing to protect user data against untrustworthy TAPs and malicious apps. TAPShield targets JavaScriptdriven TAPs built on the Node.js environment and uses trusted execution environments implemented with Intel SGX to protect against cloud attackers. It further uses languagelevel sandboxes such as vm2 and SandTrap to protect against malicious apps. We implement TAPShield for two popular TAPs, Node-RED and IFTTT, and report on the security, performance, and compatibility trade-offs on a range of realworld apps. Our results show clear security benefits with acceptable performance overhead, while adhering to existing development practices of production-scale TAPs.
Confidential Federated Learning with Homomorphic Encryption
Zekun Wang
2023, MSc, KTH School of Electrical Engineering and Computer Science (EECS), Sweden.
Abstract
Federated Learning (FL), one variant of Machine Learning (ML) technology, has emerged as a prevalent method for multiple parties to collaboratively train ML models in a distributed manner with the help of a central server normally supplied by a Cloud Service Provider (CSP). Nevertheless, many existing vulnerabilities pose a threat to the advantages of FL and cause potential risks to data security and privacy, such as data leakage, misuse of the central server, or the threat of eavesdroppers illicitly seeking sensitive information.
Promisingly advanced cryptography technologies such as Homomorphic Encryption (HE) and Confidential Computing (CC) can be utilized to enhance the security and privacy of FL. However, the development of a framework that seamlessly combines these technologies together to provide confidential FL while retaining efficiency remains an ongoing challenge. In this degree project, we develop a lightweight and user-friendly FL framework called Heflp, which integrates HE and CC to ensure data confidentiality and integrity throughout the entire FL lifecycle. Heflp supports four HE schemes to fit diverse user requirements, comprising three pre-existing schemes and one optimized scheme that we design, named Flashev2, which achieves the highest time and spatial efficiency across most scenarios.
The time and memory overheads of all four HE schemes are also evaluated and a comparison between the pros and cons of each other is summarized. To validate the effectiveness, Heflp is tested on the MNIST dataset and the Threat Intelligence dataset provided by CanaryBit, and the results demonstrate that it successfully preserves data privacy without compromising model accuracy.
Securing cloud-hosted IoT Workflows with Intel SGX
Adnan, Jamil Ahsan
2023, MSc. Thesis, KTH School of Electrical Engineering and Computer Science (EECS), Sweden.
Abstract
The rapid increase in the number of IoT devices and their widespread applications demands secure and scalable solutions for managing and executing IoT workflows. This thesis investigates the security of IoT workflows created in Node-RED, an opensource visual programming tool, and deployed on untrusted hosts managed by a major cloud service provider, Azure. The hypothesis was that the security of IoT workflows could be improved by utilizing a trusted execution environment, such as Intel SGX. Additionally, an assessment of consequent performance degradation was proposed. A threat model for an IoT workflow system scenario was established using the STRIDE threat modeling framework. An evaluation of the security guarantees provided by the prototype system was performed using an analysis comparing the security guarantees of underlying technologies, predominantly Intel SGX, and aggregating them to establish the security promises of the final system. The performance evaluation of the system was conducted using a set of experimental workflows, executed both natively on Linux and inside Intel SGX. The proposed prototype system was deemed to be capable of mitigating 15 out of 18 potential threats defined in the threat model, which indicates a significant threat risk reduction. However, the added security resulted in degraded performance, which was considerable when executing system calls and significantly noticeable for workflows requiring multi-threading. The results showed that node execution time inside SGX was 4.8 times slower and the mean round trip time for workflow execution was 6 times slower than the native execution. The thesis aims to provide a starting point for estimating performance degradation for potential future applications requiring secure IoT workflow deployment on untrusted hosts.
Automating Deployments of Trusted Execution Environments
Gordon Zsolt, Gidófalvy
2023, MSc. Thesis, KTH School of Electrical Engineering and Computer Science (EECS), Sweden.
Confidential Quartet: Comparison of Platforms for Virtualization-Based Confidential Computing
2022, IEEE International Symposium on Secure and Private Execution Environment Design (SEED)
Exploring approaches for secure workload deployment and attestation in virtualization-based confidential computing environment
Ustiukhin, Artemii
2022, MSc. Thesis, Lappeenranta–Lahti University of Technology (LUT), Finland.
Chuchotage: In-line Software Network Protocol Translation for (D)TLS
Pegah N Bideh, Nicolae Paladi
2022, Proceedings of the 24th International Conference on Information and Communications Security (ICICS’22)
SGX-Bundler: speeding up enclave transitions for IO-intensive applications
Jakob Svenningsson, Nicolae Paladi, Vahidi Arash
2022, Proceedings of the 22nd IEEE/ACM International Symposium on Cluster, Cloud and Internet Computing
Trusted Execution Environment deployment through cloud Virtualization: A project on scalable deployment of virtual machines
Luca Staboli
2022, MSc. Thesis, KTH School of Electrical Engineering and Computer Science (EECS).
Protecting OpenFlow Flow Tables with Intel SGX
Nicolae Paladi, Jakob Svenningsson, Jorge Medina, Patrik Arlos
2019, IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN)
Privacy-enabled Recommendations for Software Vulnerabilities
Linus Karlsson, Nicolae Paladi
2019, IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress
Towards Secure Cloud Orchestration for Multi-Cloud Deployments
Nicolae Paladi, Antonis Michalas, Hai-Van Dang
2018, Proceedings of the 5th Workshop on CrossCloud Infrastructures & Platforms
Safeguarding VNF credentials with Intel SGX
Nicolae Paladi, Linus Karlsson
2017, Proceedings of the SIGCOMM Posters and Demos, 144-146
Bootstrapping trust in software defined networks
Nicolae Paladi, Christian Gehrmann
2017, EAI Endorsed Transactions on Security and Safety
A survey on design and implementation of protected searchable data in the cloud
Rafael Dowsley, Antonis Michalas, Matthias Nagel, Nicolae Paladi
2017, Computer Science Review