Repository logo

Infoscience

  • English
  • French
Log In
Logo EPFL, École polytechnique fédérale de Lausanne

Infoscience

  • English
  • French
Log In
  1. Home
  2. Academic and Research Output
  3. Conferences, Workshops, Symposiums, and Seminars
  4. Secured Routines: Language-based Construction of Trusted Execution Environments
 
Loading...
Thumbnail Image
conference paper

Secured Routines: Language-based Construction of Trusted Execution Environments

Ghosn, Adrien  
•
Larus, James  
•
Bugnion, Edouard  
2019
Proceedings of the 2019 Usenix Annual Technical Conference
USENIX Annual Technical Conference 2019

Trusted Execution Environments (TEEs), such as Intel SGX enclaves, use hardware to ensure the confidentiality and integrity of operations on sensitive data. While the technology is available on many processors, the complexity of its programming model and its performance overhead have limited adoption. TEEs provide a new and valuable hardware functionality that has no obvious analogue in programming languages, which means that developers must manually partition their application into trusted and untrusted components. This paper describes an approach that fully integrates trusted execution into a language. We extend the Go language to allow a programmer to execute a goroutine within an enclave, to use low-overhead channels to communicate between the trusted and untrusted environments, and to rely on a compiler to automatically extract the secure code and data. Our prototype compiler and runtime, GOTEE, is a backward-compatible fork of the Go compiler. The evaluation shows that our compiler-driven code and data partitioning efficiently executes both microbenchmarks and applications. On the former, GOTEE achieves a 5.2×throughput and a 2.3× latency improvement over the Intel SGX SDK. Our case studies, a Go ssh server, the Go tls package, and a secured keystore inspired by the go-ethereum project, demonstrate that minor source-code modifications suffice to provide confidentiality and integrity guarantees with only moderate performance overheads.

  • Files
  • Details
  • Metrics
Type
conference paper
Web of Science ID

WOS:000489756800039

Author(s)
Ghosn, Adrien  
•
Larus, James  
•
Bugnion, Edouard  
Date Issued

2019

Publisher

USENIX ASSOC

Publisher place

Berkeley

Journal
Proceedings of the 2019 Usenix Annual Technical Conference
ISBN of the book

978-1-939133-03-8

Start page

571

End page

585

Subjects

Computer Science, Software Engineering

•

Computer Science, Theory & Methods

•

Computer Science

•

attacks

Peer reviewed

REVIEWED

Written at

EPFL

EPFL units
DCSL  
UPLARUS  
Event nameEvent placeEvent date
USENIX Annual Technical Conference 2019

Renton, WA, USA

July 10-12, 2019

Available on Infoscience
July 11, 2019
Use this identifier to reference this record
https://infoscience.epfl.ch/handle/20.500.14299/159006
Logo EPFL, École polytechnique fédérale de Lausanne
  • Contact
  • infoscience@epfl.ch

  • Follow us on Facebook
  • Follow us on Instagram
  • Follow us on LinkedIn
  • Follow us on X
  • Follow us on Youtube
AccessibilityLegal noticePrivacy policyCookie settingsEnd User AgreementGet helpFeedback

Infoscience is a service managed and provided by the Library and IT Services of EPFL. © EPFL, tous droits réservés