Literature DB >> 35919377

Practical and Efficient in-Enclave Verification of Privacy Compliance.

Weijie Liu1, Wenhao Wang2, Hongbo Chen1, XiaoFeng Wang1, Yaosong Lu2, Kai Chen2, Xinyu Wang3, Qintao Shen2, Yi Chen4, Haixu Tang1.   

Abstract

A trusted execution environment (TEE) such as Intel Software Guard Extension (SGX) runs attestation to prove to a data owner the integrity of the initial state of an enclave, including the program to operate on her data. For this purpose, the data-processing program is supposed to be open to the owner or a trusted third party, so its functionality can be evaluated before trust being established. In the real world, however, increasingly there are application scenarios in which the program itself needs to be protected (e.g., proprietary algorithm). So its compliance with privacy policies as expected by the data owner should be verified without exposing its code. To this end, this paper presents Deflection, a new model for TEE-based delegated and flexible in-enclave code verification. Given that the conventional solutions do not work well under the resource-limited and TCB-frugal TEE, we come up with a new design inspired by Proof-Carrying Code. Our design strategically moves most of the workload to the code generator, which is responsible for producing easy-to-check code, while keeping the consumer simple. Also, the whole consumer can be made public and verified through a conventional attestation. We implemented this model on Intel SGX and demonstrate that it introduces a very small part of TCB. We also thoroughly evaluated its performance on micro- and macro- benchmarks and real-world applications, showing that the design only incurs a small overhead when enforcing several categories of security policies.

Entities:  

Keywords:  Confidential Computing; Enclave Shielding Runtime; Intel SGX; Proof-Carrying Code

Year:  2021        PMID: 35919377      PMCID: PMC9343090          DOI: 10.1109/dsn48987.2021.00052

Source DB:  PubMed          Journal:  Proc (Int Conf Dependable Syst Netw)        ISSN: 1530-0889


  2 in total

1.  A general method applicable to the search for similarities in the amino acid sequence of two proteins.

Authors:  S B Needleman; C D Wunsch
Journal:  J Mol Biol       Date:  1970-03       Impact factor: 5.469

2.  Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in SGX.

Authors:  Wenhao Wang; Guoxing Chen; Xiaorui Pan; Yinqian Zhang; XiaoFeng Wang; Vincent Bindschaedler; Haixu Tang; Carl A Gunter
Journal:  Conf Comput Commun Secur       Date:  2017 Oct-Nov
  2 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.