Trustworthy confidential virtual machines for the masses

A Galanou, K Bindlish, L Preibsch, YA Pignolet… - Proceedings of the 24th …, 2023 - dl.acm.org
Confidential computing alleviates the concerns of distrustful customers by removing the
cloud provider from their trusted computing base and resolves their disincentive to migrate …

[HTML][HTML] AutoCert: Automated TOCTOU-secure digital certification for IoT with combined authentication and assurance

A Khurshid, S Raza - Computers & Security, 2023 - Elsevier
Abstract The Internet of Things (IoT) network is comprised of heterogeneous devices which
are part of critical infrastructures throughout the world. To enable end-to-end security, the …

Towards interoperable enclave attestation: Learnings from decades of academic work

A Niemi, S Sovio, JE Ekberg - 2022 31st Conference of Open …, 2022 - ieeexplore.ieee.org
Secure enclave technology has during the last decade emerged as an important hardware
security primitive in server computer cores, and increasingly also in chips intended for …

SoK: Confidential quartet-Comparison of platforms for virtualization-based confidential computing

R Guanciale, N Paladi, A Vahidi - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
Confidential computing allows processing sensitive workloads in securely isolated spaces.
Following earlier adoption of process-based approaches to isolation, vendors are now …

Design and formal verification of a copland-based attestation protocol

A Petz, G Jurgensen, P Alexander - Proceedings of the 19th ACM-IEEE …, 2021 - dl.acm.org
We present the design and formal analysis of a remote attestation protocol and
accompanying security architecture that generate evidence of trustworthy execution for …

Universal Remote Attestation for Cloud and Edge Platforms

S Ott, M Kamhuber, J Pecholt, S Wessel - Proceedings of the 18th …, 2023 - dl.acm.org
With more computing workloads being shifted to the cloud, verifying the integrity of remote
software stacks through remote attestation becomes an increasingly important topic. During …

Smart industrial information integration: a lightweight privacy protection model in an intelligent manufacturing architecture

M Yang, G Huang, Y Liao, L Wang… - Journal of …, 2024 - Taylor & Francis
In the industrial ecosystem, both the manufacturing and edge clouds collaborate via
virtualisation technology, playing a crucial role in the efficient aggregation and processing of …

[HTML][HTML] SDATA: Symmetrical Device Identifier Composition Engine Complied Aggregate Trust Attestation

F Yu, Y Huang - Symmetry, 2024 - mdpi.com
Efficient safeguarding of the security of interconnected devices, which are often resource-
constrained, can be achieved through collective remote attestation schemes. However, in …

[HTML][HTML] An Adaptive Simultaneous Multi-Protocol Extension of CRAFT

L Moreau, E Conchon, D Sauveron - Sensors, 2023 - mdpi.com
An exponential number of devices connect to Internet of Things (IoT) networks every year,
increasing the available targets for attackers. Protecting such networks and devices against …

Evidence Tampering and Chain of Custody in Layered Attestations

I Kretz, P Rowe, C Parran, J Ramsdell - Proceedings of the 26th …, 2024 - dl.acm.org
In distributed systems, trust decisions are made on the basis of integrity evidence generated
via remote attestation. Examples of the kinds of evidence that might be collected are boot …