Tailoring and Verification of the Trust Boundaries in a Heterogeneous TEE Landscape

A Galanou - 2023 53rd Annual IEEE/IFIP International …, 2023 - ieeexplore.ieee.org
Confidential computing services enable users to run or use applications in Trusted
Execution Environments (TEEs) leveraging secure hardware, like Intel SGX or AMD SEV …

Matee: Multimodal attestation for trusted execution environments

A Galanou, F Gregor, R Kapitza, C Fetzer - Proceedings of the 23rd ACM …, 2022 - dl.acm.org
Confidential computing services enable users to run their workloads in Trusted Execution
Environments (TEEs) leveraging secure hardware like Intel SGX, and verify them by …

[PDF][PDF] Secure remote credential management with mutual attestation for constrained sensing platforms with tees

C Shepherd, NA Raja, K Markantonakis - arXiv preprint arXiv:1804.10707, 2018 - arxiv.org
Trusted Execution Environments (TEEs) are rapidly emerging as the go-to root of trust for
protecting sensitive applications and data using hardware-backed isolated worlds of …

Formal Specification and Verification of Architecturally-defined Attestation Mechanisms in Arm CCA and Intel TDX

MU Sardar, T Fossati, S Frost, S Xiong - IEEE Access, 2023 - ieeexplore.ieee.org
Attestation is one of the most critical mechanisms in confidential computing (CC). We
present a holistic verification approach enabling comprehensive and rigorous security …

[图书][B] Enhancing System Security and Privacy with Trusted Hardware Components

Y Nakatsuka - 2023 - search.proquest.com
Trusted hardware components are essential when protecting the security of our devices and
privacy of our online activities. Several kinds of trusted hardware components are widely …

iperfTZ: Understanding Network Bottlenecks for TrustZone-Based Trusted Applications

C Göttel, P Felber, V Schiavoni - … on Stabilizing, Safety, and Security of …, 2019 - Springer
The growing availability of hardware-based trusted execution environments (TEEs) in
commodity processors has recently advanced support (ie, design, implementation and …

Position paper: Challenges towards securing hardware-assisted execution environments

Z Ning, F Zhang, W Shi, W Shi - Proceedings of the Hardware and …, 2017 - dl.acm.org
A Trusted Execution Environment (TEE) provides an isolated environment for sensitive
workloads. However, the code running in the TEE may contain vulnerabilities that could be …

Remote Attestation Assurance Arguments for Trusted Execution Environments

AB Usman, N Cole, M Asplund, F Boeira… - Proceedings of the 2023 …, 2023 - dl.acm.org
Remote attestation (RA) is emerging as an important security mechanism for cyber-physical
systems with strict security requirements. Trusted computing at large and Trusted Execution …

Remote credential management with mutual attestation for trusted execution environments

C Shepherd, RN Akram, K Markantonakis - Information Security Theory …, 2019 - Springer
Abstract Trusted Execution Environments (TEEs) are rapidly emerging as a root-of-trust for
protecting sensitive applications and data using hardware-backed isolated worlds of …

Sok: Hardware-supported trusted execution environments

M Schneider, RJ Masti, S Shinde, S Capkun… - arXiv preprint arXiv …, 2022 - arxiv.org
The growing complexity of modern computing platforms and the need for strong isolation
protections among their software components has led to the increased adoption of Trusted …