An exploratory study of attestation mechanisms for trusted execution environments

J Ménétrey, C Göttel, M Pasin, P Felber… - arXiv preprint arXiv …, 2022 - arxiv.org
Attestation is a fundamental building block to establish trust over software systems. When
used in conjunction with trusted execution environments, it guarantees that genuine code is …

Attestation mechanisms for trusted execution environments demystified

J Ménétrey, C Göttel, A Khurshid, M Pasin… - IFIP International …, 2022 - Springer
Attestation is a fundamental building block to establish trust over software systems. When
used in conjunction with trusted execution environments, it guarantees the genuineness of …

Conqueror: tamper-proof code execution on legacy systems

L Martignoni, R Paleari, D Bruschi - International Conference on Detection …, 2010 - Springer
We present Conqueror, a software-based attestation scheme for tamper-proof code
execution on untrusted legacy systems. Beside providing load-time attestation of a piece of …

EActors: Fast and flexible trusted computing using SGX

VA Sartakov, S Brenner, S Ben Mokhtar… - Proceedings of the 19th …, 2018 - dl.acm.org
Novel trusted execution support, as offered by Intel's Software Guard eXtensions (SGX),
embeds seamlessly into user space applications by establishing regions of encrypted …

SofTEE: Software-based trusted execution environment for user applications

U Lee, C Park - IEEE access, 2020 - ieeexplore.ieee.org
Commodity operating systems are considered vulnerable. Therefore, when an application
handles security-sensitive data, it is highly recommended to run the application in a trusted …

C-FLAT: control-flow attestation for embedded systems software

T Abera, N Asokan, L Davi, JE Ekberg… - Proceedings of the …, 2016 - dl.acm.org
Remote attestation is a crucial security service particularly relevant to increasingly popular
IoT (and other embedded) devices. It allows a trusted party (verifier) to learn the state of a …

Trustshadow: Secure execution of unmodified applications with arm trustzone

L Guan, P Liu, X Xing, X Ge, S Zhang, M Yu… - Proceedings of the 15th …, 2017 - dl.acm.org
The rapid evolution of Internet-of-Things (IoT) technologies has led to an emerging need to
make them smarter. A variety of applications now run simultaneously on an ARM-based …

GuaranTEE: Introducing control-flow attestation for trusted execution environments

M Morbitzer, B Kopf, P Zieris - 2023 IEEE 16th International …, 2023 - ieeexplore.ieee.org
Many cloud providers offer Trusted Execution Environments (TEEs) to protect critical data
and processes from high privileged adversaries. Unfortunately, TEEs can only be attested at …

HYDRA: hybrid design for remote attestation (using a formally verified microkernel)

K Eldefrawy, N Rattanavipanon, G Tsudik - Proceedings of the 10th ACM …, 2017 - dl.acm.org
Remote Attestation (RA) allows a trusted entity (verifier) to securely measure internal state of
a remote untrusted hardware platform (prover). RA can be used to establish a static or …

Litehax: lightweight hardware-assisted attestation of program execution

G Dessouky, T Abera, A Ibrahim… - 2018 IEEE/ACM …, 2018 - ieeexplore.ieee.org
Unlike traditional processors, embedded Internet of Things (IoT) devices lack resources to
incorporate protection against modern sophisticated attacks resulting in critical …