Teamwork Makes TEE Work: Open and Resilient Remote Attestation on Decentralized Trust
X Zhang, K Qin, S Qu, T Wang, C Zhang… - arXiv preprint arXiv …, 2024 - arxiv.org
Remote Attestation (RA) enables the integrity and authenticity of applications in Trusted
Execution Environment (TEE) to be verified. Existing TEE RA designs employ a centralized …
Execution Environment (TEE) to be verified. Existing TEE RA designs employ a centralized …
SRAS: Self-governed Remote Attestation Scheme for Multi-party Collaboration
L Tian, Y Shen, Z Li - arXiv preprint arXiv:2407.03745, 2024 - arxiv.org
Trusted Execution Environments (TEEs), such as Intel Software Guard Extensions (SGX),
ensure the confidentiality and integrity of user applications when using cloud computing …
ensure the confidentiality and integrity of user applications when using cloud computing …
Secure distributed applications the decent way
Remote attestation (RA) authenticates code running in trusted execution environments
(TEEs), allowing trusted code to be deployed even on untrusted hosts. However, trust …
(TEEs), allowing trusted code to be deployed even on untrusted hosts. However, trust …
Towards systematic design of collective remote attestation protocols
Networks of and embedded (IoT) devices are becoming increasingly popular, particularly, in
settings such as smart homes, factories and vehicles. These networks can include numerous …
settings such as smart homes, factories and vehicles. These networks can include numerous …
Privilege-based remote attestation: Towards integrity assurance for lightweight clients
Remote attestation is used to assure the integrity of a trusted platform (prover) to a remote
party (challenger). Traditionally, plain binary attestation (ie, attesting the integrity of software …
party (challenger). Traditionally, plain binary attestation (ie, attesting the integrity of software …
{SCRAPS}: Scalable collective remote attestation for {Pub-Sub}{IoT} networks with untrusted proxy verifier
L Petzi, AEB Yahya, A Dmitrienko, G Tsudik… - 31st USENIX Security …, 2022 - usenix.org
Remote Attestation (RA) is a basic security mechanism that detects malicious presence on
various types of computing components, eg, IoT devices. In a typical IoT setting, RA involves …
various types of computing components, eg, IoT devices. In a typical IoT setting, RA involves …
Remote Attestation Assurance Arguments for Trusted Execution Environments
Remote attestation (RA) is emerging as an important security mechanism for cyber-physical
systems with strict security requirements. Trusted computing at large and Trusted Execution …
systems with strict security requirements. Trusted computing at large and Trusted Execution …
A flexible trust manager for remote attestation in heterogeneous critical infrastructures
Nowadays, critical infrastructures are managed through paradigms such as cloud/fog/edge
computing and Network Function Virtualization (NFV), providing advantages as flexibility …
computing and Network Function Virtualization (NFV), providing advantages as flexibility …
[PDF][PDF] Fides: Unleashing the Full Potential of Remote Attestation.
B Prünster, G Palfinger, C Kollmann - ICETE (2), 2019 - scitepress.org
In connected mobile app settings, back-ends have no means to reliably verify the integrity of
clients. For this reason, services aimed at mobile users employ (unreliable) heuristics to …
clients. For this reason, services aimed at mobile users employ (unreliable) heuristics to …
{ScaRR}: Scalable Runtime Remote Attestation for Complex Systems
The introduction of remote attestation (RA) schemes has allowed academia and industry to
enhance the security of their systems. The commercial products currently available enable …
enhance the security of their systems. The commercial products currently available enable …