kth.sePublications KTH
Change search
Link to record
Permanent link

Direct link
Publications (3 of 3) Show all publications
Birgersson, M., Artho, C. & Balliu, M. (2025). Trust and Verify: Formally Verified and Upgradable Trusted Functions. In: Proceedings - 2025 IEEE International Conference on Software Maintenance and Evolution, ICSME 2025: . Paper presented at 41st IEEE International Conference on Software Maintenance and Evolution, ICSME 2025, Auckland, New Zealand, September 7-12, 2025 (pp. 356-367). Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>Trust and Verify: Formally Verified and Upgradable Trusted Functions
2025 (English)In: Proceedings - 2025 IEEE International Conference on Software Maintenance and Evolution, ICSME 2025, Institute of Electrical and Electronics Engineers (IEEE) , 2025, p. 356-367Conference paper, Published paper (Refereed)
Abstract [en]

Computation over sensitive data requires that the computation function is secure and trusted. Existing approaches either do not enforce formal verification, require the user to verify the proof, or lack secure attestation guarantees. In addition, neither addresses the issue of having users once again inspect the application after upgrading the code running in the enclave. We propose an approach that uses a formal specification to guarantee that the behavior of the computation function conforms to the desired functionality. By combining automated verification with attestation on a trusted execution environment, we ensure that only conformant applications are executed. At the same time, we allow updates of the computation function without changing the attestation response, as long as the formal specification still holds. We implement and evaluate the system on several functions; our results show an average overhead of only 50 %. Finally, we demonstrate the validity of the system using a real-world application, Dafny-EVM.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2025
Keywords
confidential computation, formal verification, secure multi-party computation, trusted execution environments
National Category
Computer Sciences Computer Systems
Identifiers
urn:nbn:se:kth:diva-373856 (URN)10.1109/ICSME64153.2025.00040 (DOI)2-s2.0-105022433284 (Scopus ID)
Conference
41st IEEE International Conference on Software Maintenance and Evolution, ICSME 2025, Auckland, New Zealand, September 7-12, 2025
Note

Part of ISBN 9798331595876

QC 20251211

Available from: 2025-12-11 Created: 2025-12-11 Last updated: 2025-12-11Bibliographically approved
Birgersson, M., Artho, C. & Balliu, M. (2024). Sharing without Showing: Secure Cloud Analytics with Trusted Execution Environments. In: Proceedings - 2024 IEEE Secure Development Conference, SecDev 2024: . Paper presented at 2024 IEEE Secure Development Conference, SecDev 2024, Pittsburgh, United States of America, Oct 7 2024 - Oct 9 2024 (pp. 105-116). Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>Sharing without Showing: Secure Cloud Analytics with Trusted Execution Environments
2024 (English)In: Proceedings - 2024 IEEE Secure Development Conference, SecDev 2024, Institute of Electrical and Electronics Engineers (IEEE) , 2024, p. 105-116Conference paper, Published paper (Refereed)
Abstract [en]

Many applications benefit from computations over the data of multiple users while preserving confidentiality. We present a solution where multiple mutually distrusting users' data can be aggregated with an acceptable overhead, while allowing users to be added to the system at any time without re-encrypting data. Our solution to this problem is to use a Trusted Execution Environment (Intel SGX) for the computation, while the confidential data is encrypted with the data owner's key and can be stored anywhere, without trust in the service provider. We do not require the user to be online during the computation phase and do not require a trusted party to store data in plain text. Still, the computation can only be carried out if the data owner explicitly has given permission.Experiments using common functions such as the sum, least square fit, histogram, and SVM classification, exhibit an average overhead of 1.6×. In addition to these performance experiments, we present a use case for computing the distributions of taxis in a city without revealing the position of any other taxi to the other parties.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2024
Keywords
Confidential computation, Multi-party computation, SGX, Trusted execution platform
National Category
Computer Sciences Other Computer and Information Science Computer Engineering
Identifiers
urn:nbn:se:kth:diva-357693 (URN)10.1109/SecDev61143.2024.00016 (DOI)001348939600011 ()2-s2.0-85210578964 (Scopus ID)
Conference
2024 IEEE Secure Development Conference, SecDev 2024, Pittsburgh, United States of America, Oct 7 2024 - Oct 9 2024
Note

Part of ISBN 979-8-3503-9193-0

QC 20241217

Available from: 2024-12-12 Created: 2024-12-12 Last updated: 2024-12-17Bibliographically approved
Birgersson, M., Artho, C. & Balliu, M. (2021). Security-Aware Multi-User Architecture for IoT. In: 2021 IEEE 21ST INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY (QRS 2021): . Paper presented at 21st IEEE International Conference on Software Quality, Reliability and Security (QRS), DEC 06-10, 2021, Hainan, CHINA (pp. 102-113). Institute of Electrical and Electronics Engineers Inc.
Open this publication in new window or tab >>Security-Aware Multi-User Architecture for IoT
2021 (English)In: 2021 IEEE 21ST INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY (QRS 2021), Institute of Electrical and Electronics Engineers Inc. , 2021, p. 102-113Conference paper, Published paper (Refereed)
Abstract [en]

IoT systems, such as in smart cities or hospitals, generate data that may be subject to different security classifications, privacy regulations, and access rights. However, popular IoT platforms do not consider data classification and security-aware data analysis. In this paper, we present a novel architecture based on open-source solutions that handles the issue of collecting and classifying data at the source and presents the data analysis to users at different authorization levels. Our architecture consists of three layers: a layer for exposing collected and classified data to a middleware, the middleware to handle storage and analysis of the data and expose it to a dashboard, and the dashboard responsible for authenticating users and visualizing data according to the users' classification level. Our solution distinguishes itself by focusing on data classification rather than data collection, supporting fine-grained access control and declassification. Our implementation, using the Web of Things API, Node-RED and Grafana, demonstrates the security benefits of our design on use cases in the smart city and healthcare domains.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers Inc., 2021
Series
IEEE International Conference on Software Quality Reliability and Security, ISSN 2693-9185
Keywords
secure IoT architecture, user-centric data classification, decentralized label model, fine-grained access control, multi-user IoT platform, data-centric architecture
National Category
Computer Systems
Identifiers
urn:nbn:se:kth:diva-305259 (URN)10.1109/QRS54544.2021.00021 (DOI)000814747000011 ()2-s2.0-85146199452 (Scopus ID)
Conference
21st IEEE International Conference on Software Quality, Reliability and Security (QRS), DEC 06-10, 2021, Hainan, CHINA
Projects
CDISDigital FuturesTrustfull
Note

Part of proceedings: ISBN 978-1-6654-5813-9

QC 20211129

QC 20220708

Available from: 2021-11-24 Created: 2021-11-24 Last updated: 2023-06-08Bibliographically approved
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0009-0006-5139-8110

Search in DiVA

Show all publications