Privacy concerns of tpm 2.0

I Loutfi, A Jøsang - European Conference on Cyber Warfare and …, 2016 - books.google.com
The goal of trusted computing is to provide solutions that allow users to bootstrap trust into
their machines based on hardware. The flagship technology for trusted computing is the …

Position paper: Challenges towards securing hardware-assisted execution environments

Z Ning, F Zhang, W Shi, W Shi - Proceedings of the Hardware and …, 2017 - dl.acm.org
A Trusted Execution Environment (TEE) provides an isolated environment for sensitive
workloads. However, the code running in the TEE may contain vulnerabilities that could be …

Design and formal verification of a copland-based attestation protocol

A Petz, G Jurgensen, P Alexander - Proceedings of the 19th ACM-IEEE …, 2021 - dl.acm.org
We present the design and formal analysis of a remote attestation protocol and
accompanying security architecture that generate evidence of trustworthy execution for …

Trusted execution environment-based authentication gauge (TEEBAG)

RA Balisane, A Martin - Proceedings of the 2016 New Security …, 2016 - dl.acm.org
We present a new approach to authentication using Trusted Execution Environments
(TEEs), by changing the location of authentication from a remote device (eg remote …

{ACFA}: Secure Runtime Auditing & Guaranteed Device Healing via Active Control Flow Attestation

A Caulfield, N Rattanavipanon, IDO Nunes - 32nd USENIX Security …, 2023 - usenix.org
Embedded devices are increasingly used in a wide range of “smart” applications and
spaces. At the lower-end of the scale, they are implemented under strict cost and energy …

Aion: Enabling open systems through strong availability guarantees for enclaves

F Alder, J Van Bulck, F Piessens… - Proceedings of the 2021 …, 2021 - dl.acm.org
Embedded Trusted Execution Environments (TEEs) can provide strong security for software
in the IoT or in critical control systems. Approaches to combine this security with real-time …

Presence attestation: The missing link in dynamic trust bootstrapping

Z Zhang, X Ding, G Tsudik, J Cui, Z Li - Proceedings of the 2017 ACM …, 2017 - dl.acm.org
Many popular modern processors include an important hardware security feature in the form
of a DRTM (Dynamic Root of Trust for Measurement) that helps bootstrap trust and resists …

Tee-perf: A profiler for trusted execution environments

M Bailleu, D Dragoti, P Bhatotia… - 2019 49th Annual IEEE …, 2019 - ieeexplore.ieee.org
We introduce TEE-PERF, an architecture-and platform-independent performance
measurement tool for trusted execution environments (TEEs). More specifically, TEE-PERF …

Logical attestation: An authorization architecture for trustworthy computing

EG Sirer, W de Bruijn, P Reynolds, A Shieh… - Proceedings of the …, 2011 - dl.acm.org
This paper describes the design and implementation of a new operating system
authorization architecture to support trustworthy computing. Called logical attestation, this …

Scalable Remote Attestation with Privacy Protection: (Work in Progress)

TA Tanveer, M Alam, M Nauman - International Conference on Trusted …, 2009 - Springer
Assurance of fulfillment of stakeholder's expectations on a target platform is termed as
remote attestation. Without such an assurance, there is no way of knowing whether the …