In recent years, trusted execution environments (TEEs) have seen increasing deployment in computing devices to protect security-critical software from run-time attacks and provide isolation from an untrustworthy operating system (OS). A trusted party verifies the software that runs in a TEE using remote attestation procedures. However, the publication of transient execution attacks such as Spectre and Meltdown revealed fundamental weaknesses in many TEE architectures, including Intel Software Guard Exentsions (SGX) and Arm TrustZone. These attacks can extract cryptographic secrets, thereby compromising the integrity of the remote attestation procedure. In this work, we design and develop a TEE architecture that provides remote attestation i...
Trusted execution environments (TEEs) are on the rise in devices all around us ranging from large-sc...
Security of embedded devices is a timely and important issue, due to their proliferation into numero...
Processor hardware support for security dates back to the 1970s, and such features were then primari...
In recent years, trusted execution environments (TEEs) have seen increasing deployment in computing ...
In recent years, trusted execution environments (TEEs) have seen increasing deployment in computing ...
Attestation is a fundamental building block to establish trust over software systems. When used in c...
Trusted Execution Environments (TEEs) offer hardware-based isolation, which protects the integrity a...
Intel Software Guard Extensions (SGX) are a Trusted Execution Environment (TEE) technology that allo...
Large distributed systems, like Industrial Control Systems, should be able to verify that devices th...
Embedded computing devices increasingly permeate many aspects of modern life: from medical to automo...
Hardware-assisted security solutions, and the isolation guarantees they provide, constitute the basi...
Trust is vital for arbitrary entities to interact and cooperate. These entities may have different s...
Security of embedded devices is a timely and important issue, due to the proliferation of these devi...
International audienceA variety of applications are executing on a large untrusted computing base, w...
Small integrated computers, so-called embedded systems, have become a ubiquitous and indispensable p...
Trusted execution environments (TEEs) are on the rise in devices all around us ranging from large-sc...
Security of embedded devices is a timely and important issue, due to their proliferation into numero...
Processor hardware support for security dates back to the 1970s, and such features were then primari...
In recent years, trusted execution environments (TEEs) have seen increasing deployment in computing ...
In recent years, trusted execution environments (TEEs) have seen increasing deployment in computing ...
Attestation is a fundamental building block to establish trust over software systems. When used in c...
Trusted Execution Environments (TEEs) offer hardware-based isolation, which protects the integrity a...
Intel Software Guard Extensions (SGX) are a Trusted Execution Environment (TEE) technology that allo...
Large distributed systems, like Industrial Control Systems, should be able to verify that devices th...
Embedded computing devices increasingly permeate many aspects of modern life: from medical to automo...
Hardware-assisted security solutions, and the isolation guarantees they provide, constitute the basi...
Trust is vital for arbitrary entities to interact and cooperate. These entities may have different s...
Security of embedded devices is a timely and important issue, due to the proliferation of these devi...
International audienceA variety of applications are executing on a large untrusted computing base, w...
Small integrated computers, so-called embedded systems, have become a ubiquitous and indispensable p...
Trusted execution environments (TEEs) are on the rise in devices all around us ranging from large-sc...
Security of embedded devices is a timely and important issue, due to their proliferation into numero...
Processor hardware support for security dates back to the 1970s, and such features were then primari...