Attestation Mechanisms for Trusted Execution Environments Demystified

06/08/2022
by   Jämes Ménétrey, et al.
0

Attestation is a fundamental building block to establish trust over software systems. When used in conjunction with trusted execution environments, it guarantees the genuineness of the code executed against powerful attackers and threats, paving the way for adoption in several sensitive application domains. This paper reviews remote attestation principles and explains how the modern and industrially well-established trusted execution environments Intel SGX, Arm TrustZone and AMD SEV, as well as emerging RISC-V solutions, leverage these mechanisms.

READ FULL TEXT
research
04/14/2022

An Exploratory Study of Attestation Mechanisms for Trusted Execution Environments

Attestation is a fundamental building block to establish trust over soft...
research
12/15/2022

On (the Lack of) Code Confidentiality in Trusted Execution Environments

Trusted Execution Environments (TEEs) have been proposed as a solution t...
research
06/17/2019

Using Trusted Execution Environments for Secure Stream Processing of Medical Data

Processing sensitive data, such as those produced by body sensors, on th...
research
06/08/2018

Slalom: Fast, Verifiable and Private Execution of Neural Networks in Trusted Hardware

As Machine Learning (ML) gets applied to security-critical or sensitive ...
research
07/24/2023

HasTEE: Programming Trusted Execution Environments with Haskell

Trusted Execution Environments (TEEs) are hardware-enforced memory isola...
research
05/25/2022

SoK: Hardware-supported Trusted Execution Environments

The growing complexity of modern computing platforms and the need for st...
research
08/21/2020

MAGE: Mutual Attestation for a Group of Enclaves without Trusted Third Parties

Intel Software Guard Extensions (SGX) local and remote attestation mecha...

Please sign up or login with your details

Forgot password? Click here to reset