Oak, Aditya ; Ahmadian, Amir M. ; Balliu, Musard ; Salvaneschi, Guido (2021)
Enclave-Based Secure Programming with JE.
6th IEEE Secure Development Conference (SecDev 2021). virtual Conference (18.10.2021-20.10.2021)
doi: 10.1109/SecDev51306.2021.00026
Konferenzveröffentlichung, Bibliographie
Kurzbeschreibung (Abstract)
Over the past few years, major hardware vendors have started offering processors that support Trusted Execution Environments (TEEs) allowing confidential computations over sensitive data on untrusted hosts. Unfortunately, developing applications that use TEEs remains challenging. Current solutions require using low-level languages (e.g., C/C++) to handle the TEE management process manually – a complex and error-prone task. Worse, the separation of the application into components that run inside and outside the TEE may lead to information leaks. In summary, TEEs are a powerful means to design secure applications, but there is still a long way to building secure software with TEEs alone.In this work, we present J E, a programming model for developing TEE-enabled applications where developers only need to annotate Java programs to define application-level security policies and run them securely inside enclaves.
Typ des Eintrags: | Konferenzveröffentlichung |
---|---|
Erschienen: | 2021 |
Autor(en): | Oak, Aditya ; Ahmadian, Amir M. ; Balliu, Musard ; Salvaneschi, Guido |
Art des Eintrags: | Bibliographie |
Titel: | Enclave-Based Secure Programming with JE |
Sprache: | Englisch |
Publikationsjahr: | 23 Dezember 2021 |
Verlag: | IEEE |
Buchtitel: | Proceedings: 2021 IEEE Secure Development Conference |
Veranstaltungstitel: | 6th IEEE Secure Development Conference (SecDev 2021) |
Veranstaltungsort: | virtual Conference |
Veranstaltungsdatum: | 18.10.2021-20.10.2021 |
DOI: | 10.1109/SecDev51306.2021.00026 |
Kurzbeschreibung (Abstract): | Over the past few years, major hardware vendors have started offering processors that support Trusted Execution Environments (TEEs) allowing confidential computations over sensitive data on untrusted hosts. Unfortunately, developing applications that use TEEs remains challenging. Current solutions require using low-level languages (e.g., C/C++) to handle the TEE management process manually – a complex and error-prone task. Worse, the separation of the application into components that run inside and outside the TEE may lead to information leaks. In summary, TEEs are a powerful means to design secure applications, but there is still a long way to building secure software with TEEs alone.In this work, we present J E, a programming model for developing TEE-enabled applications where developers only need to annotate Java programs to define application-level security policies and run them securely inside enclaves. |
Zusätzliche Informationen: | , SecDev 2021, , October 18-20, 2021 |
Fachbereich(e)/-gebiet(e): | 20 Fachbereich Informatik 20 Fachbereich Informatik > Softwaretechnik DFG-Sonderforschungsbereiche (inkl. Transregio) DFG-Sonderforschungsbereiche (inkl. Transregio) > Sonderforschungsbereiche DFG-Sonderforschungsbereiche (inkl. Transregio) > Sonderforschungsbereiche > SFB 1119: CROSSING – Kryptographiebasierte Sicherheitslösungen als Grundlage für Vertrauen in heutigen und zukünftigen IT-Systemen |
Hinterlegungsdatum: | 11 Mai 2022 08:07 |
Letzte Änderung: | 11 Mai 2022 08:07 |
PPN: | |
Export: | |
Suche nach Titel in: | TUfind oder in Google |
Frage zum Eintrag |
Optionen (nur für Redakteure)
Redaktionelle Details anzeigen |