A design and verification methodology for secure isolated regions

@inproceedings{Sinha2016ADA,
  title={A design and verification methodology for secure isolated regions},
  author={Rohit Sinha and Manuel Costa and Akash Lal and Nuno P. Lopes and Sriram K. Rajamani and Sanjit A. Seshia and Kapil Vaswani},
  booktitle={PLDI},
  year={2016}
}
Hardware support for isolated execution (such as Intel SGX) enables development of applications that keep their code and data confidential even while running in a hostile or compromised host. However, automatically verifying that such applications satisfy confidentiality remains challenging. We present a methodology for designing such applications in a way that enables certifying their confidentiality. Our methodology consists of forcing the application to communicate with the external world… CONTINUE READING

Similar Papers

Citations

Publications citing this paper.
SHOWING 1-10 OF 32 CITATIONS

References

Publications referenced by this paper.
SHOWING 1-6 OF 6 REFERENCES

Moat: Verifying Confidentiality of Enclave Programs

  • ACM Conference on Computer and Communications Security
  • 2015
VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL

VC3: Trustworthy Data Analytics in the Cloud Using SGX

  • 2015 IEEE Symposium on Security and Privacy
  • 2015
VIEW 8 EXCERPTS
HIGHLY INFLUENTIAL

Native Client: A Sandbox for Portable, Untrusted x86 Native Code

  • IEEE Symposium on Security and Privacy
  • 2009
VIEW 6 EXCERPTS
HIGHLY INFLUENTIAL

Formal verification of a realistic compiler

J. H. Saltzer, M. D. Schroeder
  • Proceedings of the IEEE, 63(9):1278–1308,
  • 1975
VIEW 7 EXCERPTS
HIGHLY INFLUENTIAL