Many hardware vendors oﬀer different implementations of a Trusted Execution Environment (TEE). A TEE is a technology that provides a hardware protected execution environment for secure computations. This enables performing operations over sensitive data on untrusted hosts.
Unfortunately, developing software in high level managed languages, e.g., Java or Scala, taking advantage of existing TEE implementations is a non-trivial task.
In this talk, we discuss our work on a programming model design that seamlessly integrates a TEE,
abstracting away low-level programming details such as initialization and loading of data into the TEE.
The model is implemented in Scala with added annotations that allow specifying the data placement and information flow constraints.
Aditya Oak is a PhD student in the Reactive Software Systems group led by Prof. Guido Salvaneschi. His research focuses on providing language-level support for privacy enhancing technologies. He is a part of the project E5 within CROSSING.