HasTEE: Programming Trusted Execution Environments with Haskell

Abhiroop Sarkar, Robert Krook, Alejandro Russo, Koen Claessen
{"title":"HasTEE: Programming Trusted Execution Environments with Haskell","authors":"Abhiroop Sarkar, Robert Krook, Alejandro Russo, Koen Claessen","doi":"10.1145/3609026.3609731","DOIUrl":null,"url":null,"abstract":"Trusted Execution Environments (TEEs) are hardware enforced memory isolation units, emerging as a pivotal security solution for security-critical applications. TEEs, like Intel SGX and ARM TrustZone, allow the isolation of confidential code and data within an untrusted host environment, such as the cloud and IoT. Despite strong security guarantees, TEE adoption has been hindered by an awkward programming model. This model requires manual application partitioning and the use of error-prone, memory-unsafe, and potentially information-leaking low-level C/C++ libraries. We address the above with HasTEE, a domain-specific language (DSL) embedded in Haskell for programming TEE applications. HasTEE includes a port of the GHC runtime for the Intel-SGX TEE.HasTEE uses Haskell’s type system to automatically partition an application and to enforce Information Flow Control on confidential data. The DSL, being embedded in Haskell, allows for the usage of higher-order functions, monads, and a restricted set of I/O operations to write any standard Haskell application. Contrary to previous work, HasTEE is lightweight, simple, and is provided as a simple security library; thus avoiding any GHC modifications. We show the applicability of HasTEE by implementing case studies on federated learning, an encrypted password wallet, and a differentially-private data clean room.","PeriodicalId":184785,"journal":{"name":"Proceedings of the 16th ACM SIGPLAN International Haskell Symposium","volume":"28 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 16th ACM SIGPLAN International Haskell Symposium","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3609026.3609731","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Trusted Execution Environments (TEEs) are hardware enforced memory isolation units, emerging as a pivotal security solution for security-critical applications. TEEs, like Intel SGX and ARM TrustZone, allow the isolation of confidential code and data within an untrusted host environment, such as the cloud and IoT. Despite strong security guarantees, TEE adoption has been hindered by an awkward programming model. This model requires manual application partitioning and the use of error-prone, memory-unsafe, and potentially information-leaking low-level C/C++ libraries. We address the above with HasTEE, a domain-specific language (DSL) embedded in Haskell for programming TEE applications. HasTEE includes a port of the GHC runtime for the Intel-SGX TEE.HasTEE uses Haskell’s type system to automatically partition an application and to enforce Information Flow Control on confidential data. The DSL, being embedded in Haskell, allows for the usage of higher-order functions, monads, and a restricted set of I/O operations to write any standard Haskell application. Contrary to previous work, HasTEE is lightweight, simple, and is provided as a simple security library; thus avoiding any GHC modifications. We show the applicability of HasTEE by implementing case studies on federated learning, an encrypted password wallet, and a differentially-private data clean room.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
HasTEE:用Haskell编程可信执行环境
可信执行环境(tee)是硬件强制的内存隔离单元,是安全关键型应用程序的关键安全解决方案。tee,如Intel SGX和ARM TrustZone,允许在不受信任的主机环境(如云和物联网)中隔离机密代码和数据。尽管有强大的安全性保证,但TEE的采用一直受到笨拙的编程模型的阻碍。该模型需要手动对应用程序进行分区,并使用容易出错、内存不安全且可能泄露信息的低级C/ c++库。我们使用HasTEE来解决上述问题,这是一种嵌入在Haskell中的领域特定语言(DSL),用于编程TEE应用程序。HasTEE包括一个用于Intel-SGX TEE的GHC运行时端口。HasTEE使用Haskell的类型系统来自动划分应用程序,并对机密数据实施信息流控制。DSL嵌入到Haskell中,允许使用高阶函数、单子和一组受限的I/O操作来编写任何标准的Haskell应用程序。与以前的工作相反,HasTEE是轻量级的,简单的,并且作为一个简单的安全库提供;从而避免任何温室气体的变化。我们通过实现关于联邦学习、加密密码钱包和差异私有数据洁净室的案例研究来展示HasTEE的适用性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Don’t Go Down the Rabbit Hole: Reprioritizing Enumeration for Property-Based Testing Haskell Library for Safer Virtual Machine Introspection (Experience Report) Haskell for Choice-Based Learning (Keynote) The Evolution of Effects (Keynote) This Is Driving Me Loopy: Efficient Loops in Arrowized Functional Reactive Programs
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1