Proceedings of the Twenty-Third International Conference on Architectural Support for Programming Languages and Operating Syste 2018
DOI: 10.1145/3173162.3173213
|View full text |Cite
|
Sign up to set email alerts
|

DATS - Data Containers for Web Applications

Abstract: Data containers enable users to control access to their data while untrusted applications compute on it. However, they require replicating an application inside each containercompromising functionality, programmability, and performance. We propose DATS-a system to run web applications that retains application usability and efficiency through a mix of hardware capability enhanced containers and the introduction of two new primitives modeled after the popular model-view-controller (MVC) pattern. (1) DATS introdu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 37 publications
0
3
0
Order By: Relevance
“…However, currently, there is no mechanism deployed in the host programs that restricts them to obey the reference monitor. The DATS architecture for web applications [49] limits request processing to a restricted set of permissions. Given recent efforts in privilege separation [44], [50], restricting the permissions of host programs after authorization is future work.…”
Section: Discussionmentioning
confidence: 99%
“…However, currently, there is no mechanism deployed in the host programs that restricts them to obey the reference monitor. The DATS architecture for web applications [49] limits request processing to a restricted set of permissions. Given recent efforts in privilege separation [44], [50], restricting the permissions of host programs after authorization is future work.…”
Section: Discussionmentioning
confidence: 99%
“…Recent architectures offer privacy-preserving offloaded computation. Data privacy techniques include Trusted Execution Environments (TEEs) [34,51,68], as well as memory access control and obfuscation [33,56,65,67]. While these prior techniques are vulnerable to side channel attacks, HE is not.…”
Section: Related Workmentioning
confidence: 99%
“…Recent architectures offer privacy-preserving offloaded computation. Some techniques ensure data privacy, such as Trusted Execution Environments (TEEs) [8]- [10] and memory access control and obfuscation [58]- [61]. While these prior techniques are vulnerable to side channel attacks, HE is not and data remain private while offloaded; HE is favorable thanks to its strong, proven privacy guarantee.…”
Section: Hardware Securitymentioning
confidence: 99%