Proceedings of the 20th International Middleware Conference 2019
DOI: 10.1145/3361525.3361541
|View full text |Cite
|
Sign up to set email alerts
|

AccTEE

Abstract: Remote computation has numerous use cases such as cloud computing, client-side web applications or volunteer computing. Typically, these computations are executed inside a sandboxed environment for two reasons: first, to isolate the execution in order to protect the host environment from unauthorised access, and second to control and restrict resource usage. Often, there is mutual distrust between entities providing the code and the ones executing it, owing to concerns over three potential problems: (i) loss o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 31 publications
(6 citation statements)
references
References 25 publications
0
6
0
Order By: Relevance
“…WebAssembly and TEEs. ACCTEE [16] runs Wasm inside Intel SGX, with the specific goal of implementing trustworthy resource accounting under malicious OSs. It leverages the SGX-LKL [15] library OS and V8 JavaScript/WebAssembly engine to execute Wasm binaries inside SGX enclaves.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…WebAssembly and TEEs. ACCTEE [16] runs Wasm inside Intel SGX, with the specific goal of implementing trustworthy resource accounting under malicious OSs. It leverages the SGX-LKL [15] library OS and V8 JavaScript/WebAssembly engine to execute Wasm binaries inside SGX enclaves.…”
Section: Related Workmentioning
confidence: 99%
“…PolyBench/C [60] is a CPU-bound benchmark suite commonly used to validate compiler optimisations and compare the performance of Wasm execution environments [16], [61]. We leveraged PolyBench/C due to the practicality of deploying it in SGX enclaves.…”
Section: Micro-benchmarks: Polybench/cmentioning
confidence: 99%
See 1 more Smart Citation
“…TEE provides secure enclaves within hardware architecture, such as SGX's isolated compartments, safeguarding critical code and data from unauthorized access, software vulnerabilities, and hardware threats. AccTEE [23] executes WASM binary compiled for a specific target system in Intel's SGX enclaves to protect critical operations in unsafe OS or host systems. TWINE [24] runs a lightweight Wasm virtual machine in a trusted execution environment and supports WASI (WebAssembly system interface) so that existing WASM applications can be executed without recompilation.…”
Section: Related Work a Wasm Securitymentioning
confidence: 99%
“…Finally, there are also numerous efforts of using TEEs for various client side security applications, and these include web application sandboxing by AccTee [20], Tor security and privacy enhancement by SGX-Tor [26], and cheating prevention of computer games [11], [33]. Our protocol design is inspired by these efforts, but go beyond by exploring the new applications of TEE for CAVs.…”
Section: Related Workmentioning
confidence: 99%