The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2019
DOI: 10.48550/arxiv.1908.11143
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

SGX-LKL: Securing the Host OS Interface for Trusted Execution

Abstract: Hardware support for trusted execution in modern CPUs enables tenants to shield their data processing workloads in otherwise untrusted cloud environments. Runtime systems for the trusted execution must rely on an interface to the untrusted host OS to use external resources such as storage, network, and other functions. Attackers may exploit this interface to leak data or corrupt the computation.We describe SGX-LKL, a system for running Linux binaries inside of Intel SGX enclaves that only exposes a minimal, pr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
26
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
2

Relationship

3
5

Authors

Journals

citations
Cited by 15 publications
(27 citation statements)
references
References 30 publications
0
26
0
Order By: Relevance
“…Enclaves are part of processes and cannot be accessed by privileged software or other enclaves. Frameworks such as Graphene-SGX [19], SGX-LKL [46], Panoply [56], and the Spons and Shield Framework [53] deploy programs inside enclaves together with a library OS. This design decreases the possible impact of the untrusted kernel on enclaved software.…”
Section: Related Workmentioning
confidence: 99%
“…Enclaves are part of processes and cannot be accessed by privileged software or other enclaves. Frameworks such as Graphene-SGX [19], SGX-LKL [46], Panoply [56], and the Spons and Shield Framework [53] deploy programs inside enclaves together with a library OS. This design decreases the possible impact of the untrusted kernel on enclaved software.…”
Section: Related Workmentioning
confidence: 99%
“…There are two different approaches to provide system call services to enclave execution: system call emulation and system call delegation. First, the system call emulation approach imports the entire library OS [73,75,90] and C standard libraries [9] inside an enclave [30,32,68,74,82,91]. With the intra-enclave libOS, porting efforts for existing applications to SGX is minimized.…”
Section: Os Interactions With Bi-enclavementioning
confidence: 99%
“…TEEMon is framework-agnostic and can be used with many SGX frameworks such as SCONE [25], Graphene-SGX [70], or SGX-LKL [59].…”
Section: Generalitymentioning
confidence: 99%
“…To run legacy applications with Intel SGX without any source code modification, SGX frameworks such as SCONE [25], SGX-LKL [59], and Graphene-SGX [70] can be utilized. SCONE and SGX-LKL.…”
Section: Sgx Frameworkmentioning
confidence: 99%
See 1 more Smart Citation