Privilege-based remote attestation: Towards integrity assurance for lightweight clients

T Rauter, A Höller, N Kajtazovic, C Kreiner - … of the 1st ACM Workshop on …, 2015 - dl.acm.org
… In this work PRIBA, a lightweight approach for remote attestation for embedded system, has
been presented. In contrast to plain binary attestation methods, PRIBA reduces the number …

Measuring semantic integrity for remote attestation

F Baiardi, D Cilea, D Sgandurra… - … 2009, Oxford, UK, April 6-8 …, 2009 - Springer
… framework for the attestation of the integrity of a remote system that … The resulting architecture,
called Virtual machine Integrity … the Client (C-VM) and the Assurance VM (A-VM). A generic …

Remote attestation with domain-based integrity model and policy analysis

W Xu, X Zhang, H Hu, GJ Ahn… - IEEE Transactions on …, 2011 - ieeexplore.ieee.org
… innovative remote attestation framework called DR@FT for efficiently measuring a target
system based on an information flow-based integrity model. With this model, the high integrity

Beyond kernel-level integrity measurement: enabling remote attestation for the android platform

M Nauman, S Khan, X Zhang, JP Seifert - International Conference on …, 2010 - Springer
… However, existing remote attestation techniques cannot be deployed on Android due to the
… an attestation mechanism tailored specifically for Android that can measure the integrity of a …

Principles of remote attestation

G Coker, J Guttman, P Loscocco, A Herzog… - International Journal of …, 2011 - Springer
… Abstract Remote attestation is the activity of making a claim about … guide development of
attestation systems. We argue that (i) … assurance for the integrity of the domain separation itself? …

Analysis of existing remote attestation techniques

M Alam, T Ali, S Khan, S Khan, M Ali… - Security and …, 2012 - Wiley Online Library
… After it has been ascertained that the challenge response came from the same target
system that we are interested in attesting, the integrity challenge mechanism determines the …

Remote attestation for low-end embedded devices: the prover's perspective

F Brasser, KB Rasmussen, AR Sadeghi… - Proceedings of the 53rd …, 2016 - dl.acm.org
… In it, system integrity is verified at boot time: the root of trust is a small bootloader which …
A TPM can store an integrity checksum computed over the memory at boot time in protected …

Attestation-based policy enforcement for remote access

R Sailer, T Jaeger, X Zhang, L Van Doorn - Proceedings of the 11th ACM …, 2004 - dl.acm.org
… on remote clients running Linux that enforces confidentiality policies. Because we can measure
the integrity of the remote … of using integrity measurement to estimate system integrity and …

Method of Data Service Integrity Verification Based on Remote Attestation

张溯, 张颖, 张伟, 黄罡 - Journal of Software, 2023 - jos.org.cn
… 1.1 远程证明 远程证明 (remote attestation) 是一种验证远程设备上软件完整性的方法. 通常, 它
被实现为一种质询-响应协 议, 在该协议中不受信任的设备 (称为证明者, prover) 可以向远程受信…

Remote attestation on legacy operating systems with trusted platform modules

D Schellekens, B Wyseur, B Preneel - Science of Computer Programming, 2008 - Elsevier
… We define the problem of remote code integrity verification as the act of delivering such
attestations to a verification entity that guarantee code executes untampered on a remote