{VRASED}: A verified {Hardware/Software}{Co-Design} for remote attestation

IDO Nunes, K Eldefrawy, N Rattanavipanon… - 28th USENIX Security …, 2019 - usenix.org
Remote Attestation (RA) is a distinct security service that allows a trusted verifier (Vrf) to
measure the software state of an untrusted remote prover (Prv). If correctly implemented, RA …

Open virtual trusted execution environment

T Dettenborn - 2016 - trepo.tuni.fi
Hardware-based Trusted Execution Environments (TEEs) are widely deployed in mobile
devices. Yet their use has been limited primarily to applications developed by the device …

Delegated attestation: scalable remote attestation of commodity cps by blending proofs of execution with software attestation

M Ammar, B Crispo, I De Oliveira Nunes… - Proceedings of the 14th …, 2021 - dl.acm.org
Remote Attestation (RA) is an interaction between a trusted verifier (Vrf) and one or more
remote and potentially compromised devices (provers or Prv-s) that allow the former to …

A sense of others: behavioral attestation of unix processes on remote platforms

TA Syed, R Ismail, S Musa, M Nauman… - Proceedings of the 6th …, 2012 - dl.acm.org
Remote attestation is a technique in Trusted Computing to verify the trustworthiness of a
client platform. The most well-known method of verifying the client system to the remote end …

[PDF][PDF] Model-Driven Remote Attestation: Attesting Remote System from Behavioral Aspect.(2008)

L GU, X DING, RH DENG, Y ZOU, B XIE… - 2008 9th International … - ink.library.smu.edu.sg
Remote attestation was introduced in TCG specifications to determine whether a remote
system is trusted to behave in a particular manner for a specific purpose; however, most of …

The case for a virtualization-based trusted execution environment in mobile devices

S Mirzamohammadi, AA Sani - Proceedings of the 9th Asia-Pacific …, 2018 - dl.acm.org
ARM processors used in modern mobile devices, such as smartphones and tablets, use
TrustZone to implement a trusted execution environment (TEE). In this paper, we argue that …

Msrr: Measurement framework for remote attestation

J Gevargizian, P Kulkarni - 2018 IEEE 16th Intl Conf on …, 2018 - ieeexplore.ieee.org
Measurers are critical to a remote attestation (RA) system to verify the integrity of a remote
untrusted host. Run-time measurers in a dynamic RA system sample the dynamic program …

Runtime Verification for Trustworthy Computing

R Abela, C Colombo, A Curmi, M Fenech… - arXiv preprint arXiv …, 2023 - arxiv.org
Autonomous and robotic systems are increasingly being trusted with sensitive activities with
potentially serious consequences if that trust is broken. Runtime verification techniques …

Secure distributed applications the decent way

H Zheng, O Arden - Proceedings of the 2021 International Symposium …, 2021 - dl.acm.org
Remote attestation (RA) authenticates code running in trusted execution environments
(TEEs), allowing trusted code to be deployed even on untrusted hosts. However, trust …

A flexible trust manager for remote attestation in heterogeneous critical infrastructures

E Bravi, DG Berbecaru, A Lioy - 2023 IEEE International …, 2023 - ieeexplore.ieee.org
Nowadays, critical infrastructures are managed through paradigms such as cloud/fog/edge
computing and Network Function Virtualization (NFV), providing advantages as flexibility …