2016
DOI: 10.1145/3022671.2984002
|View full text |Cite
|
Sign up to set email alerts
|

Automatic enforcement of expressive security policies using enclaves

Abstract: Hardware-based enclave protection mechanisms, such as Intel's SGX, ARM's TrustZone, and Apple's Secure Enclave, can protect code and data from powerful low-level attackers. In this work, we use enclaves to enforce strong applicationspecific information security policies.We present IMPE, a novel calculus that captures the essence of SGX-like enclave mechanisms, and show that a security-type system for IMPE can enforce expressive confidentiality policies (including erasure policies and delimited release policies… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
4
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 10 publications
(12 citation statements)
references
References 25 publications
0
12
0
Order By: Relevance
“…However, downgrading in DFLATE is carefully controlled and restricted: well-typed assume terms can only execute in contexts with sufficient integrity, and endorsement of TEEs reflect measurement and verification of code executing in a TEE. We thus expect that well-typed DFLATE programs satisfy a variety of expressive noninterference-based security guarantees, based on controlled downgrading (e.g., [12,25,8,9,13,3]), suitably adapted to be consistent with our threat model IV.…”
Section: Security Guaranteesmentioning
confidence: 99%
See 1 more Smart Citation
“…However, downgrading in DFLATE is carefully controlled and restricted: well-typed assume terms can only execute in contexts with sufficient integrity, and endorsement of TEEs reflect measurement and verification of code executing in a TEE. We thus expect that well-typed DFLATE programs satisfy a variety of expressive noninterference-based security guarantees, based on controlled downgrading (e.g., [12,25,8,9,13,3]), suitably adapted to be consistent with our threat model IV.…”
Section: Security Guaranteesmentioning
confidence: 99%
“…Gollamudi and Chong [25] use enclaves to enforce information flow policies against low-level attackers that can inject arbitrary code into non-enclave parts of a program. DFLATE uses enclaves to enforce confidentiality and integrity against low-level attackers in a distributed setting.…”
Section: A Enclaves and Information Flowmentioning
confidence: 99%
“…Sinha et al [30,29] verify the security of programs which use SGX enclaves to ensure that hardware security features are used correctly. Gollamudi et al [13] use information flow in software to partition programs into TrustZone worlds or SGX enclaves. This work is complementary to ours, which verifies the hardware security features.…”
Section: Related Workmentioning
confidence: 99%
“…An active attacker may force the enclave program to violate the security policy by compromising the integrity of inputs at the interface or by controlling the execution order of interface components, e.g., to trigger execution paths and side effects that were not possible in the original program. Current research adopts Information Flow Control (IFC) to ensure that the code within an enclave does not leak sensitive information to the non-enclave environment [15], [16], [17]. This research, however, either takes a limited view of a passive attacker that only observes the data leaving the enclave, or it incorporates the effects of an active attacker into the execution semantics and the security condition, thus requiring additional verification effort to secure enclave programs.…”
Section: Introductionmentioning
confidence: 99%