1. DelegaTEE: Brokered Delegation Using Trusted Execution Environments 2018 IntelSGX TEE Usenix
    Sinisa Matetic, Moritz Schneider, Andrew Miller, Ari Juels, Srdjan Capkun
    [View PDF on usenix.org]
    [Show BibTex Citation]

    @inproceedings {217521,
    author = {Sinisa Matetic and Moritz Schneider and Andrew Miller and Ari Juels and Srdjan Capkun},
    title = {DelegaTEE: Brokered Delegation Using Trusted Execution Environments},
    booktitle = {27th {USENIX} Security Symposium ({USENIX} Security 18)},
    year = {2018},
    isbn = {978-1-939133-04-5},
    address = {Baltimore, MD},
    pages = {1387--1403},
    url = {https://www.usenix.org/conference/usenixsecurity18/presentation/matetic},
    publisher = {{USENIX} Association},
    month = aug,
    }

We introduce a new concept called brokered delegation. Brokered delegation allows users to flexibly delegate credentials and rights for a range of service providers to other users and third parties. We explore how brokered delegation can be implemented using novel trusted execution environments (TEEs). We introduce a system called DelegaTEE that enables users (Delegatees) to log into different online services using the credentials of other users (Owners). Credentials in DelegaTEE are never revealed to Delegatees and Owners can restrict access to their accounts using a range of rich, contextually dependent delegation policies.

DelegaTEE fundamentally shifts existing access control models for centralized online services. It does so by using TEEs to permit access delegation at the user’s discretion. DelegaTEE thus effectively reduces mandatory access control (MAC) in this context to discretionary access control (DAC). The system demonstrates the significant potential for TEEs to create new forms of resource sharing around online services without the direct support from those services.

We present a full implementation of DelegaTEE using Intel SGX and demonstrate its use in four real-world applications: email access (SMTP/IMAP), restricted website access using a HTTPS proxy, e-banking/credit card, and a third-party payment system (PayPal).

  1.