2016
DOI: 10.1145/2980983.2908113
|View full text |Cite
|
Sign up to set email alerts
|

A design and verification methodology for secure isolated regions

Abstract: Hardware support for isolated execution (such as Intel SGX) enables development of applications that keep their code and data confidential even while running on a hostile or compromised host. However, automatically verifying that such applications satisfy confidentiality remains challenging. We present a methodology for designing such applications in a way that enables certifying their confidentiality. Our methodology consists of forcing the application to communicate with the external world through a narrow i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
22
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 23 publications
(22 citation statements)
references
References 41 publications
0
22
0
Order By: Relevance
“…Since Wahbe et al [35] proposed their initial technique for SFI, there has been a number of proposals for efficiently confining untrusted software to a memory sandbox (see [23,24,31,32,34,37,39]). One of the most prominent is Google's Native Client (NaCl) [37], which provides an infrastructure for executing untrusted native code in a web browser.…”
Section: Related Workmentioning
confidence: 99%
“…Since Wahbe et al [35] proposed their initial technique for SFI, there has been a number of proposals for efficiently confining untrusted software to a memory sandbox (see [23,24,31,32,34,37,39]). One of the most prominent is Google's Native Client (NaCl) [37], which provides an infrastructure for executing untrusted native code in a web browser.…”
Section: Related Workmentioning
confidence: 99%
“…Sinha et al [30,29] verify the security of programs which use SGX enclaves to ensure that hardware security features are used correctly. Gollamudi et al [13] use information flow in software to partition programs into TrustZone worlds or SGX enclaves.…”
Section: Related Workmentioning
confidence: 99%
“…Various works consider properties of assembly code running in IEEs. Notably in [12] Sinha et al provide a tool and design methodology ensuring confidentiality of private values and code contained in IEEs. In [13] Patrignani and Clarke give an abstraction of isolation mechanisms at the source code level.…”
Section: Related Workmentioning
confidence: 99%