Formally Verified Remote Attestation Protocols with Strong Authentication

J Wilson - 2023 - diva-portal.org
Most commodity processors available today provide hardware-supported security
extensions. Remote attestation has been declared an important step towards providing …

Keystone: An open framework for architecting trusted execution environments

D Lee, D Kohlbrenner, S Shinde, K Asanović… - Proceedings of the …, 2020 - dl.acm.org
Trusted execution environments (TEEs) see rising use in devices from embedded sensors to
cloud servers and encompass a range of cost, power constraints, and security threat model …

Trusted execution environments for telecoms: Strengths, weaknesses, opportunities, and threats

M Lacoste, V Lefebvre - IEEE Security & Privacy, 2023 - ieeexplore.ieee.org
Building on our experience and other experiments, we perform a strengths, weaknesses,
opportunities, and threats analysis of x86 platform trusted execution environments (TEEs) in …

[PDF][PDF] Trusted Execution Environments in Embedded and IoT Systems: A CactiLab Perspective

Z Zhao, M Armanuzzaman, X Tan, Z Ma - tomal-kuet.github.io
While the benefits of networked embedded and Internet of Things (IoT) systems are
unparalleled, they are susceptible to cyberattacks. In recent years, Trusted Execution …

[PDF][PDF] Enclave-accelerated replay: Efficient integrity for server applications

A Awad, B Karp - ACM Workshop on System Software for Trusted …, 2022 - systex22.github.io
The limitations of the two main approaches to enforcing integrity of execution on third-party
servers, enclave-based execution (eg, Intel SGX) and log-and-replay (eg, Orochi), constrain …

Formally Verified Hardware/Software Co-Design for Remote Attestation

I De Oliveira Nunes, K Eldefrawy… - arXiv e …, 2018 - ui.adsabs.harvard.edu
In this work, we take the first step towards formal verification of Remote Attestation (RA) by
designing and verifying an architecture called VRASED: Verifiable Remote Attestation for …

A comprehensive analysis of trusted execution environments

O Hosam, F BinYuan - 2022 8th International Conference on …, 2022 - ieeexplore.ieee.org
The Trusted Execution Environment (TEE) is designed to improve the security of computing
environments. TEE is the computational isolation of the application's execution environment …

[PDF][PDF] Towards Heterogeneous Remote Attestation Protocols.

PG Wagner, J Beyerer - SECRYPT, 2022 - pdfs.semanticscholar.org
Remote attestation protocols are valuable tools to cryptographically verify the integrity of
remote software stacks. Usually these protocols rely on a specific hardware-based trusted …

Sok: Hardware-supported trusted execution environments

M Schneider, RJ Masti, S Shinde, S Capkun… - arXiv preprint arXiv …, 2022 - arxiv.org
The growing complexity of modern computing platforms and the need for strong isolation
protections among their software components has led to the increased adoption of Trusted …

A design and verification methodology for a trustzone trusted execution environment

H Sun, H Lei - IEEE Access, 2020 - ieeexplore.ieee.org
Hardware support for isolated execution (eg, ARM TrustZone) enables the development of a
trusted execution environment (TEE) that ensures the security of the code and data while …