On the TOCTOU problem in remote attestation

I De Oliveira Nunes, S Jakkamsetti… - Proceedings of the …, 2021 - dl.acm.org
Much attention has been devoted to verifying software integrity of remote embedded (IoT)
devices. Many techniques, with different assumptions and security guarantees, have been …

T-lease: A trusted lease primitive for distributed systems

B Trach, R Faqeh, O Oleksenko, W Ozga… - Proceedings Of The …, 2020 - dl.acm.org
A lease is an important primitive for building distributed protocols, and it is ubiquitously
employed in distributed systems. However, the scope of the classic lease abstraction is …

Mitigating software integrity attacks with trusted computing in a time distribution network

DG Berbecaru, S Sisinni, A Lioy, B Rat… - IEEE …, 2023 - ieeexplore.ieee.org
Time Distribution Networks (TDNs) evolve as new technologies occur to ensure more
accurate, reliable, and secure timing information. These networks typically exploit several …

Caveat (IoT) Emptor: Towards Transparency of IoT Device Presence

S Jakkamsetti, Y Kim, G Tsudik - Proceedings of the 2023 ACM SIGSAC …, 2023 - dl.acm.org
As many types of IoT devices worm their way into numerous settings and many aspects of
our daily lives, awareness of their presence and functionality becomes a source of major …

Confidential Federated Computations

H Eichner, D Ramage, K Bonawitz, D Huba… - arXiv preprint arXiv …, 2024 - arxiv.org
Federated Learning and Analytics (FLA) have seen widespread adoption by technology
platforms for processing sensitive on-device data. However, basic FLA systems have privacy …

On the TOCTOU problem in remote attestation

IDO Nunes, S Jakkamsetti, N Rattanavipanon… - arXiv preprint arXiv …, 2020 - arxiv.org
We propose Remote Attestation with TOCTOU Avoidance (RATA): a provably secure
approach to address the RA TOCTOU problem. With RATA, even malware that erases itself …

Amanuensis: provenance, privacy, and permission in TEE-enabled blockchain data systems

T Hardin, D Kotz - 2022 IEEE 42nd International Conference on …, 2022 - ieeexplore.ieee.org
Blockchain technology is heralded for its ability to provide transparent and immutable audit
trails for data shared among semi-trusted parties. With the addition of smart contracts …

Aion: Secure Transaction Ordering Using TEEs

P Zarbafian, V Gramoli - European Symposium on Research in Computer …, 2023 - Springer
In state machine replication (SMR), preventing reordering attacks by ensuring a high degree
of fairness when ordering commands requires that clients broadcast their commands to all …

[PDF][PDF] Efficient and timely revocation of v2x credentials

G Scopelliti, C Baumann, F Alder, E Truyen… - Proceedings of the …, 2024 - falder.org
In Intelligent Transport Systems, secure communication between vehicles, infrastructure,
and other road users is critical to maintain road safety. This includes the revocation of …

T3E: A Practical Solution to Trusted Time in Secure Enclaves

GM Hamidy, P Philippaerts, W Joosen - International Conference On …, 2023 - Springer
Time is used in secure systems to validate security properties. Consequently, it is vital to
protect the integrity of time information. Intel SGX enables building secure applications …