Tailoring and Verification of the Trust Boundaries in a Heterogeneous TEE Landscape

Publikation: Beitrag in Buch/Konferenzbericht/Sammelband/GutachtenBeitrag in KonferenzbandBeigetragenBegutachtung

Abstract

Confidential computing services enable users to run or use applications in Trusted Execution Environments (TEEs) leveraging secure hardware, like Intel SGX or AMD SEV, and verify them by performing remote attestation. Typically this process is very rigid and not always aligned with the trust assumptions of the users regarding the hardware identities, stakeholders and software that are considered trusted. In our work, we enable the users to tailor their trust boundaries according to their security concerns and remotely attest the different TEEs specifically based on those.

Details

OriginalspracheEnglisch
TitelProceedings - 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks - Supplemental Volume, DSN-S 2023
Seiten173-175
Seitenumfang3
ISBN (elektronisch)9798350325454
PublikationsstatusVeröffentlicht - 10 Aug. 2023
Peer-Review-StatusJa

Externe IDs

ORCID /0000-0002-4148-7631/work/147674871
Scopus 85169294022
Mendeley 7c21f713-932c-3c67-85e6-61712b9d8ef6

Schlagworte

Schlagwörter

  • Confidential Computing, Remote Attestation, Trusted Execution Environments