A Trusted Execution Environment (TEE) provides an isolated environment for sensitive workloads. However, the code running in the TEE may contain vulnerabilities that could be …
We present the design and formal analysis of a remote attestation protocol and accompanying security architecture that generate evidence of trustworthy execution for …
RA Balisane, A Martin - Proceedings of the 2016 New Security …, 2016 - dl.acm.org
We present a new approach to authentication using Trusted Execution Environments (TEEs), by changing the location of authentication from a remote device (eg remote …
Embedded devices are increasingly used in a wide range of “smart” applications and spaces. At the lower-end of the scale, they are implemented under strict cost and energy …
Embedded Trusted Execution Environments (TEEs) can provide strong security for software in the IoT or in critical control systems. Approaches to combine this security with real-time …
Many popular modern processors include an important hardware security feature in the form of a DRTM (Dynamic Root of Trust for Measurement) that helps bootstrap trust and resists …
M Bailleu, D Dragoti, P Bhatotia… - 2019 49th Annual IEEE …, 2019 - ieeexplore.ieee.org
We introduce TEE-PERF, an architecture-and platform-independent performance measurement tool for trusted execution environments (TEEs). More specifically, TEE-PERF …
EG Sirer, W de Bruijn, P Reynolds, A Shieh… - Proceedings of the …, 2011 - dl.acm.org
This paper describes the design and implementation of a new operating system authorization architecture to support trustworthy computing. Called logical attestation, this …
Assurance of fulfillment of stakeholder's expectations on a target platform is termed as remote attestation. Without such an assurance, there is no way of knowing whether the …