2021 IEEE 34th Computer Security Foundations Symposium (CSF) 2021
DOI: 10.1109/csf51468.2021.00037
|View full text |Cite
|
Sign up to set email alerts
|

Language Support for Secure Software Development with Enclaves

Abstract: Confidential computing is a promising technology for securing code and data-in-use on untrusted host machines, e.g., the cloud. Many hardware vendors offer different implementations of Trusted Execution Environments (TEEs). A TEE is a hardware protected execution environment that allows performing confidential computations over sensitive data on untrusted hosts. Despite the appeal of achieving strong security guarantees against low-level attackers, two challenges hinder the adoption of TEEs. First, developing … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 11 publications
(1 citation statement)
references
References 50 publications
0
1
0
Order By: Relevance
“…Recently, a few proposals have leveraged information-flow analyses to enforce data security in Cloud applications when the Cloud-Edge provider is untrusted. For example, Oak et al [42] have extended Java with information-flow annotations that allow verification of whether partitioning an application into components that run inside and outside an SGX enclave violates confidentiality security policies. In this proposal, partitioning is decided by the programmer.…”
Section: Information-flow Securitymentioning
confidence: 99%
“…Recently, a few proposals have leveraged information-flow analyses to enforce data security in Cloud applications when the Cloud-Edge provider is untrusted. For example, Oak et al [42] have extended Java with information-flow annotations that allow verification of whether partitioning an application into components that run inside and outside an SGX enclave violates confidentiality security policies. In this proposal, partitioning is decided by the programmer.…”
Section: Information-flow Securitymentioning
confidence: 99%