Skip to main content

Agora: Trust Less and Open More in Verification for Confidential Computing

Publication ,  Journal Article
Chen, H; Zhou, Q; Yang, S; Dang, S; Han, X; Zhang, D; Zhang, F; Wang, XF
Published in: Proceedings of the ACM on Programming Languages
October 9, 2025

Confidential computing (CC), designed for security-critical scenarios, uses remote attestation to guarantee code integrity on cloud servers. However, CC alone cannot provide assurance of high-level security properties (e.g., no data leak) on the code. In this paper, we introduce a novel framework, Agora, scrupulously designed to provide a trustworthy and open verification platform for CC. To prompt trustworthiness, we observe that certain verification tasks can be delegated to untrusted entities, while the corresponding (smaller) validators are securely housed within the trusted computing base (TCB). Moreover, through a novel blockchain-based bounty task manager, it also utilizes crowdsourcing to remove trust in complex theorem provers. These synergistic techniques successfully ameliorate the TCB size burden associated with two procedures: binary analysis and theorem proving. To prompt openness, Agora supports a versatile assertion language that allows verification of various security policies. Moreover, the design of Agora enables untrusted parties to participate in any complex processes out of Agora's TCB. By implementing verification workflows for software-based fault isolation, information flow control, and side-channel mitigation policies, our evaluation demonstrates the efficacy of Agora.

Duke Scholars

Published In

Proceedings of the ACM on Programming Languages

DOI

EISSN

2475-1421

Publication Date

October 9, 2025

Volume

9

Issue

OOPSLA2

Start / End Page

1372 / 1399

Related Subject Headings

  • 4903 Numerical and computational mathematics
  • 4613 Theory of computation
  • 4612 Software engineering
 

Citation

APA
Chicago
ICMJE
MLA
NLM
Chen, H., Zhou, Q., Yang, S., Dang, S., Han, X., Zhang, D., … Wang, X. F. (2025). Agora: Trust Less and Open More in Verification for Confidential Computing. Proceedings of the ACM on Programming Languages, 9(OOPSLA2), 1372–1399. https://doi.org/10.1145/3763099
Chen, H., Q. Zhou, S. Yang, S. Dang, X. Han, D. Zhang, F. Zhang, and X. F. Wang. “Agora: Trust Less and Open More in Verification for Confidential Computing.” Proceedings of the ACM on Programming Languages 9, no. OOPSLA2 (October 9, 2025): 1372–99. https://doi.org/10.1145/3763099.
Chen H, Zhou Q, Yang S, Dang S, Han X, Zhang D, et al. Agora: Trust Less and Open More in Verification for Confidential Computing. Proceedings of the ACM on Programming Languages. 2025 Oct 9;9(OOPSLA2):1372–99.
Chen, H., et al. “Agora: Trust Less and Open More in Verification for Confidential Computing.” Proceedings of the ACM on Programming Languages, vol. 9, no. OOPSLA2, Oct. 2025, pp. 1372–99. Scopus, doi:10.1145/3763099.
Chen H, Zhou Q, Yang S, Dang S, Han X, Zhang D, Zhang F, Wang XF. Agora: Trust Less and Open More in Verification for Confidential Computing. Proceedings of the ACM on Programming Languages. 2025 Oct 9;9(OOPSLA2):1372–1399.

Published In

Proceedings of the ACM on Programming Languages

DOI

EISSN

2475-1421

Publication Date

October 9, 2025

Volume

9

Issue

OOPSLA2

Start / End Page

1372 / 1399

Related Subject Headings

  • 4903 Numerical and computational mathematics
  • 4613 Theory of computation
  • 4612 Software engineering