Blogs (9) >>
SPLASH 2016
Sun 30 October - Fri 4 November 2016 Amsterdam, Netherlands
Thu 3 Nov 2016 10:30 - 10:55 at Matterhorn 2 - Language Design and Programming Models II Chair(s): Olivier Tardieu

Hardware-based enclave protection mechanisms, such as Intel’s
SGX, ARM’s TrustZone, and Apple’s Secure Enclave,
can protect code and data from powerful low-level attackers.
In this work, we use enclaves to enforce strong application-specific
information security policies.

We present $IMP_E$, a novel calculus that captures the
essence of SGX-like enclave mechanisms, and show that a
security-type system for $IMP_E$ can enforce expressive confidentiality
policies (including erasure policies and delimited
release policies) against powerful low-level attackers,
including attackers that can arbitrarily corrupt non-enclave
code, and, under some circumstances, corrupt enclave code.
We present a translation from an expressive security-typed
calculus (that is not aware of enclaves) to $IMP_E$. The
translation automatically places code and data into enclaves
to enforce the security policies of the source program.

Thu 3 Nov

splash-2016-oopsla
10:30 - 12:10: OOPSLA - Language Design and Programming Models II at Matterhorn 2
Chair(s): Olivier TardieuIBM Research
splash-2016-oopsla147816540000010:30 - 10:55
Talk
Anitha Gollamudi, Stephen ChongHarvard University
DOI
splash-2016-oopsla147816690000010:55 - 11:20
Talk
Alexei ColinCarnegie Mellon University, Brandon LuciaCarnegie Mellon University
DOI Pre-print
splash-2016-oopsla147816840000011:20 - 11:45
Talk
Daniele BonettaOracle Labs, Luca SalucciUniversità della Svizzera italiana (USI), Stefan MarrJohannes Kepler University Linz, Walter BinderUniversity of Lugano
DOI
splash-2016-oopsla147816990000011:45 - 12:10
Talk
Arthur Michener PetersThe University of Texas at Austin, Texas, USA, David KitchinGoogle, Inc., John A. ThywissenThe University of Texas at Austin, William CookUT Austin
DOI Pre-print