V Gligor,
M Woo - 2018 - kilthub.cmu.edu
Root-of-Trust (RoT) establishment ensures either that the state of an untrusted system
contains all and only content chosen by a trusted local verifier and the system code begins
execution in that state, or that the verifier discovers the existence of unaccounted for content.
This ensures program booting into system states that are free of persistent malware. An
adversary can no longer retain undetected control of one's local system. We establish RoT
unconditionally; ie, without secrets, trusted hardware modules and instructions, or bounds …