Trustworthy confidential virtual machines for the masses
A Galanou, K Bindlish, L Preibsch, YA Pignolet… - Proceedings of the 24th …, 2023 - dl.acm.org
Confidential computing alleviates the concerns of distrustful customers by removing the
cloud provider from their trusted computing base and resolves their disincentive to migrate …
cloud provider from their trusted computing base and resolves their disincentive to migrate …
[HTML][HTML] AutoCert: Automated TOCTOU-secure digital certification for IoT with combined authentication and assurance
A Khurshid, S Raza - Computers & Security, 2023 - Elsevier
Abstract The Internet of Things (IoT) network is comprised of heterogeneous devices which
are part of critical infrastructures throughout the world. To enable end-to-end security, the …
are part of critical infrastructures throughout the world. To enable end-to-end security, the …
Towards interoperable enclave attestation: Learnings from decades of academic work
A Niemi, S Sovio, JE Ekberg - 2022 31st Conference of Open …, 2022 - ieeexplore.ieee.org
Secure enclave technology has during the last decade emerged as an important hardware
security primitive in server computer cores, and increasingly also in chips intended for …
security primitive in server computer cores, and increasingly also in chips intended for …
SoK: Confidential quartet-Comparison of platforms for virtualization-based confidential computing
R Guanciale, N Paladi, A Vahidi - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
Confidential computing allows processing sensitive workloads in securely isolated spaces.
Following earlier adoption of process-based approaches to isolation, vendors are now …
Following earlier adoption of process-based approaches to isolation, vendors are now …
Design and formal verification of a copland-based attestation protocol
We present the design and formal analysis of a remote attestation protocol and
accompanying security architecture that generate evidence of trustworthy execution for …
accompanying security architecture that generate evidence of trustworthy execution for …
Universal Remote Attestation for Cloud and Edge Platforms
S Ott, M Kamhuber, J Pecholt, S Wessel - Proceedings of the 18th …, 2023 - dl.acm.org
With more computing workloads being shifted to the cloud, verifying the integrity of remote
software stacks through remote attestation becomes an increasingly important topic. During …
software stacks through remote attestation becomes an increasingly important topic. During …
Smart industrial information integration: a lightweight privacy protection model in an intelligent manufacturing architecture
M Yang, G Huang, Y Liao, L Wang… - Journal of …, 2024 - Taylor & Francis
In the industrial ecosystem, both the manufacturing and edge clouds collaborate via
virtualisation technology, playing a crucial role in the efficient aggregation and processing of …
virtualisation technology, playing a crucial role in the efficient aggregation and processing of …
[HTML][HTML] SDATA: Symmetrical Device Identifier Composition Engine Complied Aggregate Trust Attestation
F Yu, Y Huang - Symmetry, 2024 - mdpi.com
Efficient safeguarding of the security of interconnected devices, which are often resource-
constrained, can be achieved through collective remote attestation schemes. However, in …
constrained, can be achieved through collective remote attestation schemes. However, in …
[HTML][HTML] An Adaptive Simultaneous Multi-Protocol Extension of CRAFT
L Moreau, E Conchon, D Sauveron - Sensors, 2023 - mdpi.com
An exponential number of devices connect to Internet of Things (IoT) networks every year,
increasing the available targets for attackers. Protecting such networks and devices against …
increasing the available targets for attackers. Protecting such networks and devices against …
Evidence Tampering and Chain of Custody in Layered Attestations
In distributed systems, trust decisions are made on the basis of integrity evidence generated
via remote attestation. Examples of the kinds of evidence that might be collected are boot …
via remote attestation. Examples of the kinds of evidence that might be collected are boot …