Attestation is a fundamental building block to establish trust over software systems. When used in conjunction with trusted execution environments, it guarantees the genuineness of the code executed against powerful attackers and threats, paving the way for adoption in several sensitive application domains. This paper reviews remote attestation principles and explains how the modern and industrially well-established trusted execution environments Intel SGX, Arm TrustZone and AMD SEV, as well as emerging RISC-V solutions, leverage these mechanisms.Comment: This publication incorporates results from the VEDLIoT project, which received funding from the European Union's Horizon 2020 research and innovation programme under grant agreement No...
This report examines the state of play in TCG attestation. It asks the question: how practical is th...
Remote attestation is a promising mechanism for assurance of distributed systems. It allows users to...
Abstract. Over the past years, many different approaches and con-cepts in order to increase computer...
In recent years, trusted execution environments (TEEs) have seen increasing deployment in computing ...
In recent years, trusted execution environments (TEEs) have seen increasing deployment in computing ...
As the complexity of current software systems increases, we see a correlative increase in the number...
Large distributed systems, like Industrial Control Systems, should be able to verify that devices th...
Embedded computing devices (such as actuators, controllers and sensors of various sizes) increasingl...
Intel Software Guard Extensions (SGX) are a Trusted Execution Environment (TEE) technology that allo...
The problem of secure remote computation has become a serious concern of hardware manufacturers and ...
Small integrated computers, so-called embedded systems, have become a ubiquitous and indispensable p...
Software attestation has become a popular and challenging research topic at many established securit...
Embedded systems that make up the Internet of Things (IoT), Supervisory Control and Data Acquisition...
In August 2020, Intel asked the research community for feedback on the newly offered architecture ex...
Remote attestation is a promising mechanism for assurance of distributed systems. It allows users to...
This report examines the state of play in TCG attestation. It asks the question: how practical is th...
Remote attestation is a promising mechanism for assurance of distributed systems. It allows users to...
Abstract. Over the past years, many different approaches and con-cepts in order to increase computer...
In recent years, trusted execution environments (TEEs) have seen increasing deployment in computing ...
In recent years, trusted execution environments (TEEs) have seen increasing deployment in computing ...
As the complexity of current software systems increases, we see a correlative increase in the number...
Large distributed systems, like Industrial Control Systems, should be able to verify that devices th...
Embedded computing devices (such as actuators, controllers and sensors of various sizes) increasingl...
Intel Software Guard Extensions (SGX) are a Trusted Execution Environment (TEE) technology that allo...
The problem of secure remote computation has become a serious concern of hardware manufacturers and ...
Small integrated computers, so-called embedded systems, have become a ubiquitous and indispensable p...
Software attestation has become a popular and challenging research topic at many established securit...
Embedded systems that make up the Internet of Things (IoT), Supervisory Control and Data Acquisition...
In August 2020, Intel asked the research community for feedback on the newly offered architecture ex...
Remote attestation is a promising mechanism for assurance of distributed systems. It allows users to...
This report examines the state of play in TCG attestation. It asks the question: how practical is th...
Remote attestation is a promising mechanism for assurance of distributed systems. It allows users to...
Abstract. Over the past years, many different approaches and con-cepts in order to increase computer...