Trusted And Confidential Program Analysis

12/01/2021
by   Han Liu, et al.
0

We develop the concept of Trusted and Confidential Program Analysis (TCPA) which enables program certification to be used where previously there was insufficient trust. Imagine a scenario where a producer may not be trusted to certify its own software (perhaps by a foreign regulator), and the producer is unwilling to release its sources and detailed design to any external body. We present a protocol that can, using trusted computing based on encrypted sources, create certification via which all can trust the delivered object code without revealing the unencrypted sources to any party. Furthermore, we describe a realization of TCPA with trusted execution environments (TEE) that enables general and efficient computation. We have implemented the TCPA protocol in a system called TCWasm for web assembly architectures. In our evaluation with 33 benchmark cases, TCWasm managed to finish the analysis with relatively slight overheads.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
04/14/2022

An Exploratory Study of Attestation Mechanisms for Trusted Execution Environments

Attestation is a fundamental building block to establish trust over soft...
research
03/16/2016

A Review of Theoretical and Practical Challenges of Trusted Autonomy in Big Data

Despite the advances made in artificial intelligence, software agents, a...
research
06/28/2018

When Can a Distributed Ledger Replace a Trusted Third Party?

The functionality that distributed ledger technology provides, i.e., an ...
research
03/18/2019

Securely Trading Unverifiable Information without Trust

In future, information may become one of the most important assets in ec...
research
09/18/2020

The Boon and Bane of Cross-Signing: Shedding Light on a Common Practice in Public Key Infrastructures

Public Key Infrastructures (PKIs) with their trusted Certificate Authori...
research
05/11/2019

Artificial Consciousness and Security

This paper describes a possible way to improve computer security by impl...
research
05/16/2023

Flexible remote attestation of pre-SNP SEV VMs using SGX enclaves

We propose a protocol that explores a synergy between two TEE implementa...

Please sign up or login with your details

Forgot password? Click here to reset