A design and verification methodology for secure isolated regions

@inproceedings{Sinha2016ADA,
  title={A design and verification methodology for secure isolated regions},
  author={Rohit Sinha and Manuel Costa and Akash Lal and Nuno P. Lopes and Sriram K. Rajamani and Sanjit A. Seshia and Kapil Vaswani},
  booktitle={PLDI},
  year={2016}
}
Hardware support for isolated execution (such as Intel SGX) enables development of applications that keep their code and data confidential even while running in a hostile or compromised host. However, automatically verifying that such applications satisfy confidentiality remains challenging. We present a methodology for designing such applications in a way that enables certifying their confidentiality. Our methodology consists of forcing the application to communicate with the external world… CONTINUE READING

Citations

Publications citing this paper.
SHOWING 1-10 OF 32 CITATIONS

Glamdring: Automatic Application Partitioning for Intel SGX

  • USENIX Annual Technical Conference
  • 2017
VIEW 4 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

EnclaveDB: A Secure Database Using SGX

  • 2018 IEEE Symposium on Security and Privacy (SP)
  • 2018
VIEW 1 EXCERPT
CITES BACKGROUND

Pesos: policy enhanced secure object store

  • EuroSys
  • 2018
VIEW 1 EXCERPT
CITES BACKGROUND

A Compiler and Verifier for

VIEW 2 EXCERPTS
CITES BACKGROUND & METHODS

A Formal Foundation for Secure Remote Execution of Enclaves

  • ACM Conference on Computer and Communications Security
  • 2017
VIEW 1 EXCERPT
CITES METHODS

References

Publications referenced by this paper.
SHOWING 1-6 OF 6 REFERENCES

Moat: Verifying Confidentiality of Enclave Programs

  • ACM Conference on Computer and Communications Security
  • 2015
VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL

VC3: Trustworthy Data Analytics in the Cloud Using SGX

  • 2015 IEEE Symposium on Security and Privacy
  • 2015
VIEW 8 EXCERPTS
HIGHLY INFLUENTIAL

Formal verification of a realistic compiler

J. H. Saltzer, M. D. Schroeder
  • Proceedings of the IEEE, 63(9):1278–1308,
  • 1975
VIEW 7 EXCERPTS
HIGHLY INFLUENTIAL

Similar Papers

Loading similar papers…