Teamwork Makes TEE Work: Open and Resilient Remote Attestation on Decentralized Trust

X Zhang, K Qin, S Qu, T Wang, C Zhang… - arXiv preprint arXiv …, 2024 - arxiv.org
Remote Attestation (RA) enables the integrity and authenticity of applications in Trusted
Execution Environment (TEE) to be verified. Existing TEE RA designs employ a centralized …

SRAS: Self-governed Remote Attestation Scheme for Multi-party Collaboration

L Tian, Y Shen, Z Li - arXiv preprint arXiv:2407.03745, 2024 - arxiv.org
Trusted Execution Environments (TEEs), such as Intel Software Guard Extensions (SGX),
ensure the confidentiality and integrity of user applications when using cloud computing …

Secure distributed applications the decent way

H Zheng, O Arden - Proceedings of the 2021 International Symposium …, 2021 - dl.acm.org
Remote attestation (RA) authenticates code running in trusted execution environments
(TEEs), allowing trusted code to be deployed even on untrusted hosts. However, trust …

Towards systematic design of collective remote attestation protocols

IDO Nunes, G Dessouky, A Ibrahim… - 2019 IEEE 39th …, 2019 - ieeexplore.ieee.org
Networks of and embedded (IoT) devices are becoming increasingly popular, particularly, in
settings such as smart homes, factories and vehicles. These networks can include numerous …

Privilege-based remote attestation: Towards integrity assurance for lightweight clients

T Rauter, A Höller, N Kajtazovic, C Kreiner - … of the 1st ACM Workshop on …, 2015 - dl.acm.org
Remote attestation is used to assure the integrity of a trusted platform (prover) to a remote
party (challenger). Traditionally, plain binary attestation (ie, attesting the integrity of software …

{SCRAPS}: Scalable collective remote attestation for {Pub-Sub}{IoT} networks with untrusted proxy verifier

L Petzi, AEB Yahya, A Dmitrienko, G Tsudik… - 31st USENIX Security …, 2022 - usenix.org
Remote Attestation (RA) is a basic security mechanism that detects malicious presence on
various types of computing components, eg, IoT devices. In a typical IoT setting, RA involves …

Remote Attestation Assurance Arguments for Trusted Execution Environments

AB Usman, N Cole, M Asplund, F Boeira… - Proceedings of the 2023 …, 2023 - dl.acm.org
Remote attestation (RA) is emerging as an important security mechanism for cyber-physical
systems with strict security requirements. Trusted computing at large and Trusted Execution …

A flexible trust manager for remote attestation in heterogeneous critical infrastructures

E Bravi, DG Berbecaru, A Lioy - 2023 IEEE International …, 2023 - ieeexplore.ieee.org
Nowadays, critical infrastructures are managed through paradigms such as cloud/fog/edge
computing and Network Function Virtualization (NFV), providing advantages as flexibility …

[PDF][PDF] Fides: Unleashing the Full Potential of Remote Attestation.

B Prünster, G Palfinger, C Kollmann - ICETE (2), 2019 - scitepress.org
In connected mobile app settings, back-ends have no means to reliably verify the integrity of
clients. For this reason, services aimed at mobile users employ (unreliable) heuristics to …

{ScaRR}: Scalable Runtime Remote Attestation for Complex Systems

F Toffalini, E Losiouk, A Biondo, J Zhou… - … Symposium on Research …, 2019 - usenix.org
The introduction of remote attestation (RA) schemes has allowed academia and industry to
enhance the security of their systems. The commercial products currently available enable …