
Providing security guarantees when executing application code in untrusted environments is vital, especially when handling sensitive data. To address this task, Trusted Execution Environments (TEEs) such as Intel’s Software Guard eXtension (SGX), which implement hardware-based techniques by silicon manufacturers, have been introduced to provide confidentiality and integrity in remote execution. Library OS technologies, e.g., SCONE, aim to facilitate the adoption of TEEs in software development. Despite their essential help, these technologies still require significant effort from developers. In this paper, we introduce SECUREEXECUTOR, a Linux utility that aims to simplify and automate leveraging SCONE in SGX enclaves, i.e., isolatedmemory areas. We analyze the design and the internal schema that SECUREEXECUTOR follows, outlining the steps of its usage.We further apply it to three real-world open-source projects, validating its application and providing important insights.
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 0 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
