International audienceExciting new capabilities of modern trusted hardware technologies allow for the execution of arbitrary code within environments completely isolated from the rest of the system and provide cryptographic mechanisms for securely reporting on these executions to remote parties. Rigorously proving security of protocols that rely on this type of hardware faces two obstacles. The first is to develop models appropriate for the induced trust assumptions (e.g., what is the correct notion of a party when the peer one wishes to communicate with is a specific instance of an an outsourced program). The second is to develop scalable analysis methods, as the inherent stateful nature of the platforms precludes the application of existi...
As distributed computing becomes increasingly prevalent, driving a demand for security and privacy i...
Over the past years, the computing industry has started var-ious initiatives announced to increase c...
Recent proposals for trusted hardware platforms, such as Intel SGX and the MIT Sanctum processor, of...
International audienceIsolated Execution Environments (IEE) offered by novel commodity hardware such...
Highly concurrent environments, like the Internet, present new challenges towards design ofsecure cr...
As the complexity of current software systems increases, we see a correlative increase in the number...
The wide usage of hardware Intellectual Property (IP) cores from untrusted third-party vendors has r...
A key component in building trusted computing services is a highly secure anchor that serves as a Ro...
The wide usage of hardware Intellectual Property (IP) cores and software programs from untrusted ven...
In this paper we investigate whether and how hardware-based roots of trust, namely Trusted Platform ...
Software attestation has become a popular and challenging research topic at many established securit...
Trusted computing attestation mechanism relies on hash measurements to realize remote party attestat...
Tamper-proof hardware has found its way into our everyday life in various forms, be it SIM cards, cr...
Secure processors with hardware-enforced isolation are crucial for secure cloud computation. However...
Abstract. A programmable secure coprocessor platform can help solve many security problems in distri...
As distributed computing becomes increasingly prevalent, driving a demand for security and privacy i...
Over the past years, the computing industry has started var-ious initiatives announced to increase c...
Recent proposals for trusted hardware platforms, such as Intel SGX and the MIT Sanctum processor, of...
International audienceIsolated Execution Environments (IEE) offered by novel commodity hardware such...
Highly concurrent environments, like the Internet, present new challenges towards design ofsecure cr...
As the complexity of current software systems increases, we see a correlative increase in the number...
The wide usage of hardware Intellectual Property (IP) cores from untrusted third-party vendors has r...
A key component in building trusted computing services is a highly secure anchor that serves as a Ro...
The wide usage of hardware Intellectual Property (IP) cores and software programs from untrusted ven...
In this paper we investigate whether and how hardware-based roots of trust, namely Trusted Platform ...
Software attestation has become a popular and challenging research topic at many established securit...
Trusted computing attestation mechanism relies on hash measurements to realize remote party attestat...
Tamper-proof hardware has found its way into our everyday life in various forms, be it SIM cards, cr...
Secure processors with hardware-enforced isolation are crucial for secure cloud computation. However...
Abstract. A programmable secure coprocessor platform can help solve many security problems in distri...
As distributed computing becomes increasingly prevalent, driving a demand for security and privacy i...
Over the past years, the computing industry has started var-ious initiatives announced to increase c...
Recent proposals for trusted hardware platforms, such as Intel SGX and the MIT Sanctum processor, of...