2021 IEEE 37th International Conference on Data Engineering (ICDE) 2021
DOI: 10.1109/icde51399.2021.00025
|View full text |Cite
|
Sign up to set email alerts
|

Twine: An Embedded Trusted Runtime for WebAssembly

Abstract: WebAssembly is an increasingly popular lightweight binary instruction format, which can be efficiently embedded and sandboxed. Languages like C, C++, Rust, Go, and many others can be compiled into WebAssembly. This paper describes TWINE, a WebAssembly trusted runtime designed to execute unmodified, language-independent applications. We leverage Intel SGX to build the runtime environment without dealing with language-specific, complex APIs. While SGX hardware provides secure execution within the processor, TWIN… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
22
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
2
2

Relationship

1
6

Authors

Journals

citations
Cited by 38 publications
(23 citation statements)
references
References 21 publications
1
22
0
Order By: Relevance
“…Wasm is naturally slower than native because of the increasing of register pressure and code size and the presence of extra branch statements, as discussed in previous work [17]. In some rare cases, Wasm may be faster than native thanks to a reduced number of cache misses, as we observed in our previous work [24]. Finally, some workloads are not well optimised when compiled in Wasm and then recompiled ahead-of-time into native code, as can be observed for the Arm versions on the left-hand side of Figure 2.…”
Section: Polybench/c Micro-benchmarkssupporting
confidence: 62%
See 2 more Smart Citations
“…Wasm is naturally slower than native because of the increasing of register pressure and code size and the presence of extra branch statements, as discussed in previous work [17]. In some rare cases, Wasm may be faster than native thanks to a reduced number of cache misses, as we observed in our previous work [24]. Finally, some workloads are not well optimised when compiled in Wasm and then recompiled ahead-of-time into native code, as can be observed for the Arm versions on the left-hand side of Figure 2.…”
Section: Polybench/c Micro-benchmarkssupporting
confidence: 62%
“…While TEEs are not demonstrated in this work, these two platforms support trusted execution, namely Intel SGX for the former and Arm TrustZone for the latter. We already illustrated how Wasm could be embedded within SGX and TrustZone in our previous work [24,25].…”
Section: Performancementioning
confidence: 99%
See 1 more Smart Citation
“…To analyze these TEE containers, we propose a taxonomy including a set of key security properties expected from a Tcon: 1) their threat models, 2) their supports for isolation between the untrusted OS and the container (through Ecall/Ocall/exception interfaces), 3) their supports for isolation within the container (particularly for those running untrusted code), 4) their mechanism for attestation, 5) protection for storage and 6) their side-channel control. These properties are summarized from Tcon-related publications [105], [109], [50], [87], [80], [62], [81], [61], [59], [97], [48], [74] and documentations [18], [26], [34], [13]. In the rest of the section, we first present popular Tcons and their backgrounds, and then analyze them using the taxonomy.…”
Section: Survey On Mainstream Tee Containersmentioning
confidence: 99%
“…• TWINE. TWINE [81] leverages WebAssembly-Micro-Runtime (WAMR) [46] to run WASM code with WASI support. C/C++ and Rust source code developed for Linux can be easily compiled into WASI target, and TWINE also provides a SQLite example.…”
Section: A Existing Tee Containersmentioning
confidence: 99%