Building and Maintaining a Third-Party Library Supply Chain for Productive and Secure SGX Enclave Development

05/09/2020
by   Pei Wang, et al.
0

The big data industry is facing new challenges as concerns about privacy leakage soar. One of the remedies to privacy breach incidents is to encapsulate computations over sensitive data within hardware-assisted Trusted Execution Environments (TEE). Such TEE-powered software is called secure enclaves. Secure enclaves hold various advantages against competing for privacy-preserving computation solutions. However, enclaves are much more challenging to build compared with ordinary software. The reason is that the development of TEE software must follow a restrictive programming model to make effective use of strong memory encryption and segregation enforced by hardware. These constraints transitively apply to all third-party dependencies of the software. If these dependencies do not officially support TEE hardware, TEE developers have to spend additional engineering effort in porting them. High development and maintenance cost is one of the major obstacles against adopting TEE-based privacy protection solutions in production. In this paper, we present our experience and achievements with regard to constructing and continuously maintaining a third-party library supply chain for TEE developers. In particular, we port a large collection of Rust third-party libraries into Intel SGX, one of the most mature trusted computing platforms. Our supply chain accepts upstream patches in a timely manner with SGX-specific security auditing. We have been able to maintain the SGX ports of 159 open-source Rust libraries with reasonable operational costs. Our work can effectively reduce the engineering cost of developing SGX enclaves for privacy-preserving data processing and exchange.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
11/12/2020

Revisiting Secure Computation Using Functional Encryption: Opportunities and Research Directions

Increasing incidents of security compromises and privacy leakage have ra...
research
01/20/2021

Exploring Design and Governance Challenges in the Development of Privacy-Preserving Computation

Homomorphic encryption, secure multi-party computation, and differential...
research
07/29/2019

Secure Stream Processing for Medical Data

Medical data belongs to whom it produces it. In an increasing manner, th...
research
07/31/2023

S3C2 Summit 2023-02: Industry Secure Supply Chain Summit

Recent years have shown increased cyber attacks targeting less secure el...
research
06/17/2019

Using Trusted Execution Environments for Secure Stream Processing of Medical Data

Processing sensitive data, such as those produced by body sensors, on th...
research
10/31/2017

DynSGX: A Privacy Preserving Toolset for Dynamically Loading Functions into Intel(R) SGX Enclaves

Intel(R) Software Guard eXtensions (SGX) is a hardware-based technology ...
research
01/09/2020

Secure multiparty computations in floating-point arithmetic

Secure multiparty computations enable the distribution of so-called shar...

Please sign up or login with your details

Forgot password? Click here to reset