Title
Foundations of Hardware-Based Attested Computation and Application to SGX
Abstract
Exciting new capabilities of modern trusted hardware technologies allow for the execution of arbitrary code within environments completely isolated from the rest of the system and provide cryptographic mechanisms for securely reporting on these executions to remote parties. Rigorously proving security of protocols that rely on this type of hardware faces two obstacles. The first is to develop models appropriate for the induced trust assumptions (e.g., what is the correct notion of a party when the peer one wishes to communicate with is a specific instance of an an outsourced program). The second is to develop scalable analysis methods, as the inherent stateful nature of the platforms precludes the application of existing modular analysis techniques that require high degrees of independence between the components. We give the first steps in this direction by studying three cryptographic tools which have been commonly associated with this new generation of trusted hardware solutions. Specifically, we provide formal security definitions, generic constructions and security analysis for attested computation, key-exchange for attestation and secure outsourced computation. Our approach is incremental: each of the concepts relies on the previous ones according to an approach that is quasi-modular. For example we show how to build a secure outsourced computation scheme from an arbitrary attestation protocol combined together with a key-exchange and an encryption scheme.
Year
DOI
Venue
2016
10.1109/EuroSP.2016.28
2016 IEEE European Symposium on Security and Privacy (EuroS&P)
Keywords
DocType
Volume
hardware-based attested computation,SGX,software guard extension,arbitrary code execution,modern trusted hardware technologies,induced trust assumptions,scalable analysis methods,modular analysis techniques,cryptographic tools,formal security definitions,generic constructions,security analysis,attested computation,key-exchange,secure outsourced computation scheme,encryption scheme
Conference
2016
ISBN
Citations 
PageRank 
978-1-5090-1751-5
23
0.82
References 
Authors
22
4
Name
Order
Citations
PageRank
Manuel Barbosa133724.91
Bernardo Portela2383.90
Guillaume Scerri3504.15
Bogdan Warinschi4151468.98