TICAL: Trusted and Integrity-protected Compilation of AppLications

📅 2025-11-21
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
To address the vulnerability of compilation-phase environments to malicious code injection—thereby threatening application and system security—this paper proposes an end-to-end trusted compilation framework that ensures confidentiality, integrity, and traceability across the entire source-to-executable build pipeline. The framework innovatively integrates hardware-enforced Trusted Execution Environments (Intel SGX/TDX), a lightweight filesystem shield with encrypted storage, and versioned, immutable audit logging. This combination achieves strong isolation of the compilation environment and comprehensive, tamper-proof provenance recording of all compilation operations. Experimental evaluation in representative CI/CD scenarios demonstrates that the framework effectively mitigates compilation-time attacks while incurring an average performance overhead of less than 12%, confirming its practical deployability in real-world software development infrastructure.

Technology Category

Application Category

📝 Abstract
During the past few years, we have witnessed various efforts to provide confidentiality and integrity for applications running in untrusted environments such as public clouds. In most of these approaches, hardware extensions such as Intel SGX, TDX, AMD SEV, etc., are leveraged to provide encryption and integrity protection on process or VM level. Although all of these approaches increase the trust in the application at runtime, an often overlooked aspect is the integrity and confidentiality protection at build time, which is equally important as maliciously injected code during compilation can compromise the entire application and system.In this paper, we present Tical, a practical framework for trusted compilation that provides integrity protection and confidentiality in build pipelines from source code to the final executable. Our approach harnesses TEEs as runtime protection but enriches TEEs with file system shielding and an immutable audit log with version history to provide accountability. This way, we can ensure that the compiler chain can only access trusted files and intermediate output, such as object files produced by trusted processes. Our evaluation using micro- and macro-benchmarks shows that Tical can protect the confidentiality and integrity of whole CI/CD pipelines with an acceptable performance overhead.
Problem

Research questions and friction points this paper is trying to address.

Protecting application integrity during compilation against malicious code injection
Ensuring confidentiality in build pipelines from source code to executable
Securing CI/CD pipelines with trusted compilation and minimal performance overhead
Innovation

Methods, ideas, or system contributions that make the work stand out.

Leverages TEEs for runtime protection
Adds file system shielding for trusted access
Uses immutable audit log for accountability
🔎 Similar Papers
No similar papers found.
Robert Krahn
Robert Krahn
TU Dresden
N
Nikson Kanti Paul
Chair for Systems Engineering, Institute of Systems Architecture, Computer Science, Technische Universität Dresden, Germany
F
Franz Gregor
Chair for Systems Engineering, Institute of Systems Architecture, Computer Science, Technische Universität Dresden, Germany
Le Quoc Do
Le Quoc Do
Principal Research Engineer - Huawei Munich Research Center
distributed systemssystem securityconfidential computingcloud computingmiddleware
A
Andrey Brito
Chair for Systems Engineering, Institute of Systems Architecture, Computer Science, Technische Universität Dresden, Germany
A
André Martin
Chair for Systems Engineering, Institute of Systems Architecture, Computer Science, Technische Universität Dresden, Germany
Christof Fetzer
Christof Fetzer
TU Dresden
dependabilitySGXdistributed systemscloud computing