Attestation mechanisms for trusted execution environments demystified

J Ménétrey, C Göttel, A Khurshid, M Pasin… - IFIP International …, 2022 - Springer
Attestation is a fundamental building block to establish trust over software systems. When
used in conjunction with trusted execution environments, it guarantees the genuineness of …

Trusted execution environments: Applications and organizational challenges

T Geppert, S Deml, D Sturzenegger… - Frontiers in Computer …, 2022 - frontiersin.org
A lack of trust in the providers is still a major barrier to cloud computing adoption–especially
when sensitive data is involved. While current privacy-enhancing technologies, such as …

Benzene: Scaling blockchain with cooperation-based sharding

Z Cai, J Liang, W Chen, Z Hong, HN Dai… - … on Parallel and …, 2022 - ieeexplore.ieee.org
Sharding has been considered as a prominent approach to enhance the limited
performance of blockchain. However, most sharding systems leverage a non-cooperative …

Demystifying attestation in intel trust domain extensions via formal verification

MU Sardar, S Musaev, C Fetzer - IEEE access, 2021 - ieeexplore.ieee.org
In August 2020, Intel asked the research community for feedback on the newly offered
architecture extensions, called Intel Trust Domain Extensions (TDX), which give more control …

Remote attestation: A literature review

AS Banks, M Kisiel, P Korsholm - arXiv preprint arXiv:2105.02466, 2021 - arxiv.org
With the rising number of IoT devices, the security of such devices becomes increasingly
important. Remote attestation (RA) is a distinct security service that allows a remote verifer to …

Trustworthy confidential virtual machines for the masses

A Galanou, K Bindlish, L Preibsch, YA Pignolet… - Proceedings of the 24th …, 2023 - dl.acm.org
Confidential computing alleviates the concerns of distrustful customers by removing the
cloud provider from their trusted computing base and resolves their disincentive to migrate …

{MAGE}: Mutual attestation for a group of enclaves without trusted third parties

G Chen, Y Zhang - 31st USENIX Security Symposium (USENIX Security …, 2022 - usenix.org
Remote attestation mechanism enables an enclave to attest its identity (which is usually
represented by the enclave's initial code and data) to another enclave. To verify that the …

A privacy-preserving data aggregation scheme for fog/cloud-enhanced iot applications using a trusted execution environment

NC Will - 2022 IEEE International Systems Conference (SysCon …, 2022 - ieeexplore.ieee.org
The use of IoT devices is increasingly present in our daily lives, as they offer many
possibilities for developers and the industry to develop applications, taking advantage of …

SvTPM: SGX-based virtual trusted platform modules for cloud computing

J Wang, J Wang, C Fan, F Yan, Y Cheng… - … on Cloud Computing, 2023 - ieeexplore.ieee.org
Virtual Trusted Platform Modules (vTPMs) are widely used in commercial cloud platforms
(eg, VMware Cloud, Google Cloud, and Microsoft Azure) to provide virtual root-of-trust and …

Silentproof: Anonymous authentication with blockchain-backed offloading

JH Mosakheil, K Yang - Proceedings of the 19th ACM Asia Conference …, 2024 - dl.acm.org
Anonymous credentials empower users with strong privacy controls by enabling them to
selectively disclose specific attributes from a credential without unveiling other personal …