Tailoring and Verification of the Trust Boundaries in a Heterogeneous TEE Landscape
Research output: Contribution to book/Conference proceedings/Anthology/Report › Conference contribution › Contributed › peer-review
Contributors
Abstract
Confidential computing services enable users to run or use applications in Trusted Execution Environments (TEEs) leveraging secure hardware, like Intel SGX or AMD SEV, and verify them by performing remote attestation. Typically this process is very rigid and not always aligned with the trust assumptions of the users regarding the hardware identities, stakeholders and software that are considered trusted. In our work, we enable the users to tailor their trust boundaries according to their security concerns and remotely attest the different TEEs specifically based on those.
Details
Original language | English |
---|---|
Title of host publication | Proceedings - 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks - Supplemental Volume, DSN-S 2023 |
Pages | 173-175 |
Number of pages | 3 |
ISBN (electronic) | 9798350325454 |
Publication status | Published - 10 Aug 2023 |
Peer-reviewed | Yes |
External IDs
ORCID | /0000-0002-4148-7631/work/147674871 |
---|---|
Scopus | 85169294022 |
Mendeley | 7c21f713-932c-3c67-85e6-61712b9d8ef6 |
Keywords
ASJC Scopus subject areas
Keywords
- Confidential Computing, Remote Attestation, Trusted Execution Environments