Understanding attestation: Analyzing protocols that use quotes

JD Guttman, JD Ramsdell - … City, Luxembourg, September 26–27, 2019 …, 2019 - Springer
Attestation protocols use digital signatures and other cryptographic values to convey
evidence of hardware state, program code, and associated keys. They require hardware …

Trusted execution environments on mobile devices

JE Ekberg, K Kostiainen, N Asokan - Proceedings of the 2013 ACM …, 2013 - dl.acm.org
A trusted execution environment (TEE) is a secure processing environment that is isolated
from the normal processing environment where the device operating system and …

Applications of Trusted Execution Environments (TEEs)

S Tamrakar - 2017 - aaltodoc.aalto.fi
Trust is vital for arbitrary entities to interact and cooperate. These entities may have different
security requirements. Trust allows them to ensure that they will behave correctly and fulfill …

User-centred attestation for layered and decentralised systems

H Lauer, A Salehi, C Rudolph… - … on Decentralized IoT …, 2018 - research.monash.edu
Virtualization is omnipresent as the backbone of cloud, edge, and fog computing as well as
X-as-a-service infrastructure. It continues to gain increased popularity even in edge or end …

[PDF][PDF] Secure remote credential management with mutual attestation for constrained sensing platforms with tees

C Shepherd, NA Raja, K Markantonakis - arXiv preprint arXiv:1804.10707, 2018 - arxiv.org
Trusted Execution Environments (TEEs) are rapidly emerging as the go-to root of trust for
protecting sensitive applications and data using hardware-backed isolated worlds of …

On the TOCTOU problem in remote attestation

I De Oliveira Nunes, S Jakkamsetti… - Proceedings of the …, 2021 - dl.acm.org
Much attention has been devoted to verifying software integrity of remote embedded (IoT)
devices. Many techniques, with different assumptions and security guarantees, have been …

Building secure distributed applications the DECENT way

H Zheng, O Arden - arXiv preprint arXiv:2004.02020, 2020 - arxiv.org
Remote attestation (RA) authenticates code running in trusted execution environments
(TEEs), allowing trusted code to be deployed even on untrusted hosts. However, trust …

Use of Trusted Computing techniques to counteract Cybersecurity attacks in Critical Infrastructures

E Bravi - 2022 - webthesis.biblio.polito.it
Nowadays to manage critical infrastructures there are largely adopted paradigms such as
Cloud Computing, Fog Computing, and Edge Computing. They introduce several …

Model-driven remote attestation: Attesting remote system from behavioral aspect

L Gu, X Ding, RH Deng, Y Zou, B Xie… - 2008 The 9th …, 2008 - ieeexplore.ieee.org
Remote attestation was introduced in TCG specifications to determine whether a remote
system is trusted to behave in a particular manner for a specific purpose; however, most of …

An approach to introducing locality in remote attestation using near field communications

R Toegl, M Hutter - The Journal of Supercomputing, 2011 - Springer
Remote Attestation, as devised by the Trusted Computing Group, is based on a secure
hardware component—the Trusted Platform Module (TPM). It allows to reach trust decisions …