Information flow control for distributed trusted execution environments

15Citations
Citations of this article
19Readers
Mendeley users who have this article in their library.

Abstract

Distributed applications cannot assume that their security policies will be enforced on untrusted hosts. Trusted execution environments (TEEs) combined with cryptographic mechanisms enable execution of known code on an untrusted host and the exchange of confidential and authenticated messages with it. TEEs do not, however, establish the trustworthiness of code executing in a TEE. Thus, developing secure applications using TEEs requires specialized expertise and careful auditing. This paper presents DFLATE, a core security calculus for distributed applications with TEEs. DFLATE offers high-level abstractions that reflect both the guarantees and limitations of the underlying security mechanisms they are based on. The accuracy of these abstractions is exhibited by asymmetry between confidentiality and integrity in our formal results: DFLATE enforces a strong form of noninterference for confidentiality, but only a weak form for integrity. This reflects the asymmetry of the security guarantees of a TEE: a malicious host cannot access secrets in the TEE or modify its contents, but they can suppress or manipulate the sequence of its inputs and outputs. Therefore DFLATE cannot protect against the suppression of high-integrity messages, but when these messages are delivered, their contents cannot have been influenced by an attacker.

References Powered by Scopus

ObliVM: A programming framework for secure computation

233Citations
N/AReaders
Get full text

The theory and practice of first-class prompts

204Citations
N/AReaders
Get full text

Gradual release: Unifying declassification, encryption and key release policies

130Citations
N/AReaders
Get full text

Cited by Powered by Scopus

Viaduct: An extensible, optimizing compiler for secure distributed programs

21Citations
N/AReaders
Get full text

Quick Boot of Trusted Execution Environment with Hardware Accelerators

16Citations
N/AReaders
Get full text

Language Support for Secure Software Development with Enclaves

11Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Gollamudi, A., Chong, S., & Arden, O. (2019). Information flow control for distributed trusted execution environments. In Proceedings - IEEE Computer Security Foundations Symposium (Vol. 2019-June, pp. 304–318). IEEE Computer Society. https://doi.org/10.1109/CSF.2019.00028

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 9

75%

Researcher 3

25%

Readers' Discipline

Tooltip

Computer Science 12

86%

Physics and Astronomy 1

7%

Engineering 1

7%

Save time finding and organizing research with Mendeley

Sign up for free