Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore a groundbreaking framework for trustworthy verification in confidential computing through this 16-minute conference presentation from OOPSLA 2025. Learn how Agora addresses the critical challenge of providing assurance for high-level security properties in confidential computing environments, where traditional remote attestation alone cannot guarantee protection against data leaks and other security vulnerabilities. Discover the innovative approach that reduces the trusted computing base (TCB) size by delegating verification tasks to untrusted entities while maintaining security through smaller validators housed within the TCB. Examine the novel blockchain-based bounty task manager that leverages crowdsourcing to eliminate trust dependencies in complex theorem provers, effectively addressing TCB burden in both binary analysis and theorem proving procedures. Understand how the framework's versatile assertion language enables verification of diverse security policies including software-based fault isolation, information flow control, and side-channel mitigation. Gain insights into the open design that allows untrusted parties to participate in complex processes outside the TCB, promoting both trustworthiness and accessibility in verification workflows for security-critical cloud computing scenarios.
Syllabus
[OOPSLA'25] Agora: Trust Less and Open More in Verification for Confidential Computing
Taught by
ACM SIGPLAN