Remote Attestation Assurance Arguments for Trusted Execution Environments

AB Usman, N Cole, M Asplund, F Boeira… - Proceedings of the 2023 …, 2023 - dl.acm.org
Remote attestation (RA) is emerging as an important security mechanism for cyber-physical
systems with strict security requirements. Trusted computing at large and Trusted Execution …

Understanding the Capabilities of Privileged Attackers Against Trusted Execution Environments

I Puddu - 2023 - research-collection.ethz.ch
Our lives today rely on the secure operation of computers in a diverse set of sectors, from
energy to medicine. However, today's computers execute software bloated with complexity …

Towards attack-tolerant trusted execution environments: Secure remote attestation in the presence of side channels

M Crone - 2021 - aaltodoc.aalto.fi
In recent years, trusted execution environments (TEEs) have seen increasing deployment in
computing devices to protect security-critical software from run-time attacks and provide …

Building open trusted execution environments

D Kohlbrenner, S Shinde, D Lee… - IEEE Security & …, 2020 - ieeexplore.ieee.org
Trusted execution environments (TEEs) are a growing part of the security ecosystem.
Unfortunately, widely available TEEs are hampered by closed designs and a lack of …

Privilege-based remote attestation: Towards integrity assurance for lightweight clients

T Rauter, A Höller, N Kajtazovic, C Kreiner - … of the 1st ACM Workshop on …, 2015 - dl.acm.org
Remote attestation is used to assure the integrity of a trusted platform (prover) to a remote
party (challenger). Traditionally, plain binary attestation (ie, attesting the integrity of software …

Tailoring and Verification of the Trust Boundaries in a Heterogeneous TEE Landscape

A Galanou - 2023 53rd Annual IEEE/IFIP International …, 2023 - ieeexplore.ieee.org
Confidential computing services enable users to run or use applications in Trusted
Execution Environments (TEEs) leveraging secure hardware, like Intel SGX or AMD SEV …

{ScaRR}: Scalable Runtime Remote Attestation for Complex Systems

F Toffalini, E Losiouk, A Biondo, J Zhou… - … Symposium on Research …, 2019 - usenix.org
The introduction of remote attestation (RA) schemes has allowed academia and industry to
enhance the security of their systems. The commercial products currently available enable …

An exploratory study of attestation mechanisms for trusted execution environments

J Ménétrey, C Göttel, M Pasin, P Felber… - arXiv preprint arXiv …, 2022 - arxiv.org
Attestation is a fundamental building block to establish trust over software systems. When
used in conjunction with trusted execution environments, it guarantees that genuine code is …

Advancing remote attestation via computer-aided formal verification of designs and synthesis of executables: opinion

K Eldefrawy, G Tsudik - Proceedings of the 12th Conference on Security …, 2019 - dl.acm.org
Remote Attestation (RA) of embedded/smart/IoT devices is a very important issue on today's
security landscape. RA enables a verifier to measures the current internal memory state of …

Formal Specification and Verification of Architecturally-defined Attestation Mechanisms in Arm CCA and Intel TDX

MU Sardar, T Fossati, S Frost, S Xiong - IEEE Access, 2023 - ieeexplore.ieee.org
Attestation is one of the most critical mechanisms in confidential computing (CC). We
present a holistic verification approach enabling comprehensive and rigorous security …