{SAPIC+}: protocol verifiers of the world, unite!

V Cheval, C Jacomme, S Kremer… - 31st USENIX Security …, 2022 - usenix.org
Symbolic security protocol verifiers have reached a high degree of automation and maturity.
Today, experts can model real-world protocols, but this often requires model-specific …

A physical layer, zero-round-trip-time, multifactor authentication protocol

M Mitev, M Shakiba-Herfeh, A Chorti, M Reed… - IEEE …, 2022 - ieeexplore.ieee.org
Lightweight physical layer security schemes that have recently attracted a lot of attention
include physical unclonable functions (PUFs), RF fingerprinting/proximity based …

Towards formal verification of state continuity for enclave programs

MK Jangid, G Chen, Y Zhang, Z Lin - 30th USENIX Security Symposium …, 2021 - usenix.org
Trusted Execution Environments such as Intel SGX provide software applications with
hardware support for preventing attacks from privileged software. However, these …

A survey of secure computation using trusted execution environments

X Li, B Zhao, G Yang, T Xiang, J Weng… - arXiv preprint arXiv …, 2023 - arxiv.org
As an essential technology underpinning trusted computing, the trusted execution
environment (TEE) allows one to launch computation tasks on both on-and off-premises …

Symbolic modelling of remote attestation protocols for device and app integrity on Android

A Aldoseri, T Chothia, J Moreira, D Oswald - Proceedings of the 2023 …, 2023 - dl.acm.org
Ensuring the integrity of a remote app or device is one of the most challenging concerns for
the Android ecosystem. Software-based solutions provide limited protection and can usually …

Automated Security Analysis for Real-World IoT Devices

L Brun, I Hasuo, Y Ono, T Sekiyama - Proceedings of the 12th …, 2023 - dl.acm.org
Automatic security protocol analysis is a fruitful research topic that demonstrates the
application of formal methods to security analysis. Several endeavors in the last decades …

A symbolic model for systematically analyzing TEE-based protocols

S Xu, Y Zhao, Z Ren, L Wu, Y Tong, H Zhang - … Security: 22nd International …, 2020 - Springer
Abstract Trusted Execution Environment (TEE) has been widely used as an approach to
provide an isolated storage and computation environment for various protocols, and thus …

Formal Security Analysis of the AMD SEV-SNP Software Interface

P Paradžik, A Derek, M Horvat - arXiv preprint arXiv:2403.10296, 2024 - arxiv.org
AMD Secure Encrypted Virtualization technologies enable confidential computing by
protecting virtual machines from highly privileged software such as hypervisors. In this work …

Breaking boundaries: analysis of the interfaces between applications, systems and enclaves

A Aldoseri - 2023 - etheses.bham.ac.uk
Application interfaces allow apps to communicate with each other or use resources. Several
platforms, namely: browser, mobile and computer, offer various instances of these interfaces …

IMPULP: A hardware approach for in-process memory protection via user-level partitioning

YY Zhao, MY Chen, YH Liu, ZH Yang, XJ Zhu… - Journal of Computer …, 2020 - Springer
In recent years many security attacks occur when malicious codes abuse in-process memory
resources. Due to the increasing complexity, an application program may call third-party …