TU Darmstadt / ULB / TUbiblio

Enclave-Based Secure Programming with JE

Oak, Aditya ; Ahmadian, Amir M. ; Balliu, Musard ; Salvaneschi, Guido (2021)
Enclave-Based Secure Programming with JE.
6th IEEE Secure Development Conference (SecDev 2021). virtual Conference (18.-20.10.2021)
doi: 10.1109/SecDev51306.2021.00026
Konferenzveröffentlichung, Bibliographie

Kurzbeschreibung (Abstract)

Over the past few years, major hardware vendors have started offering processors that support Trusted Execution Environments (TEEs) allowing confidential computations over sensitive data on untrusted hosts. Unfortunately, developing applications that use TEEs remains challenging. Current solutions require using low-level languages (e.g., C/C++) to handle the TEE management process manually – a complex and error-prone task. Worse, the separation of the application into components that run inside and outside the TEE may lead to information leaks. In summary, TEEs are a powerful means to design secure applications, but there is still a long way to building secure software with TEEs alone.In this work, we present J E, a programming model for developing TEE-enabled applications where developers only need to annotate Java programs to define application-level security policies and run them securely inside enclaves.

Typ des Eintrags: Konferenzveröffentlichung
Erschienen: 2021
Autor(en): Oak, Aditya ; Ahmadian, Amir M. ; Balliu, Musard ; Salvaneschi, Guido
Art des Eintrags: Bibliographie
Titel: Enclave-Based Secure Programming with JE
Sprache: Englisch
Publikationsjahr: 23 Dezember 2021
Verlag: IEEE
Buchtitel: Proceedings: 2021 IEEE Secure Development Conference
Veranstaltungstitel: 6th IEEE Secure Development Conference (SecDev 2021)
Veranstaltungsort: virtual Conference
Veranstaltungsdatum: 18.-20.10.2021
DOI: 10.1109/SecDev51306.2021.00026
Kurzbeschreibung (Abstract):

Over the past few years, major hardware vendors have started offering processors that support Trusted Execution Environments (TEEs) allowing confidential computations over sensitive data on untrusted hosts. Unfortunately, developing applications that use TEEs remains challenging. Current solutions require using low-level languages (e.g., C/C++) to handle the TEE management process manually – a complex and error-prone task. Worse, the separation of the application into components that run inside and outside the TEE may lead to information leaks. In summary, TEEs are a powerful means to design secure applications, but there is still a long way to building secure software with TEEs alone.In this work, we present J E, a programming model for developing TEE-enabled applications where developers only need to annotate Java programs to define application-level security policies and run them securely inside enclaves.

Zusätzliche Informationen:

, SecDev 2021, , October 18-20, 2021

Fachbereich(e)/-gebiet(e): 20 Fachbereich Informatik
20 Fachbereich Informatik > Softwaretechnik
DFG-Sonderforschungsbereiche (inkl. Transregio)
DFG-Sonderforschungsbereiche (inkl. Transregio) > Sonderforschungsbereiche
DFG-Sonderforschungsbereiche (inkl. Transregio) > Sonderforschungsbereiche > SFB 1119: CROSSING – Kryptographiebasierte Sicherheitslösungen als Grundlage für Vertrauen in heutigen und zukünftigen IT-Systemen
Hinterlegungsdatum: 11 Mai 2022 08:07
Letzte Änderung: 11 Mai 2022 08:07
PPN:
Export:
Suche nach Titel in: TUfind oder in Google
Frage zum Eintrag Frage zum Eintrag

Optionen (nur für Redakteure)
Redaktionelle Details anzeigen Redaktionelle Details anzeigen