@inproceedings{sinha2017a, author = {Sinha, Rohit and Rajamani, Sriram and Seshia, Sanjit}, title = {A Compiler and Verifier for Page Access Oblivious Computation}, booktitle = {Foundations of Software Engineering (FSE), 2017}, year = {2017}, month = {July}, abstract = {Trusted hardware primitives such as Intel’s SGX instructions provide applications with a protected address space, called an enclave, for trusted code and data. However, building enclaves that preserve confidentiality of sensitive data continues to be a challenge. The developer must not only avoid leaking secrets via the enclave’s outputs but also prevent leaks via side channels induced by interactions with the untrusted platform. Recent attacks have demonstrated that simply observing the page faults incurred during an enclave’s execution can reveal its secrets if the enclave makes data accesses or control flow decisions based on secret values. To address this problem, a developer needs compilers to automatically produce confidential programs, and verification tools to certify the absence of secret-dependent page access patterns (a property that we formalize as page-access obliviousness). To that end, we implement an efficient compiler for a type and memory-safe language, a compiler pass that enforces page-access obliviousness with low runtime overheads, and an automatic, modular verifier that certifies page-access obliviousness at the machine-code level, thus removing the compiler from our trusted computing base. We evaluate this toolchain on several machine learning algorithms and image processing routines that we run within SGX enclaves.}, publisher = {ACM}, url = {http://approjects.co.za/?big=en-us/research/publication/compiler-verifier-page-access-oblivious-computation/}, }