verify the integrity of a software running on a remote and potentially compromised device
(prover). The security of existing remote attestation schemes relies on the assumption that
attacks are software-only and that the prover's code cannot be modified at runtime. However,
in practice, these schemes can be bypassed in a stronger and more realistic adversary
model that is hereby capable of controlling and modifying code memory to attest benign …