Title
Towards Memory Safe Enclave Programming with Rust-SGX
Abstract
Intel Software Guard eXtension (SGX), a hardware supported trusted execution environment (TEE), is designed to protect security critical applications. However, it does not terminate traditional memory corruption vulnerabilities for the software running inside enclave, since enclave software is still developed with type unsafe languages such as C/C++. This paper presents RUST-SGX, an efficient and layered approach to exterminating memory corruption for software running inside SGX enclaves. The key idea is to enable the development of enclave programs with an efficient memory safe system language Rust with a RUST-SGX SDK by solving the key challenges of how to (1) make the SGX software memory safe and (2) meanwhile run as efficiently as with the SDK provided by Intel. We therefore propose to build RUST-SGX atop Intel SGX SDK, and tame unsafe components with formally proven memory safety. We have implemented RUST-SGX and tested with a series of benchmark programs. Our evaluation results show that RUST-SGX imposes little extra overhead (less than 5% with respect to the SGX specific features and services compared to software developed by Intel SGX SDK), and meanwhile have stronger memory safety.
Year
DOI
Venue
2019
10.1145/3319535.3354241
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security
Keywords
Field
DocType
SGX, memory safety, rust programming language, type system soundness
Internet privacy,Computer science,Computer security,Rust
Conference
ISBN
Citations 
PageRank 
978-1-4503-6747-9
4
0.43
References 
Authors
0
10
Name
Order
Citations
PageRank
Huibo Wang192.89
Pei Wang240.43
Yu Ding3303.50
Mingshen Sun452.13
Yiming Jing540.77
Ran Duan638735.90
Long Li740.43
Yulong Zhang8806.35
Tao Wei972735.34
Zhiqiang Lin10108264.49