Tailoring and Verification of the Trust Boundaries in a Heterogeneous TEE Landscape

Research output: Contribution to book/conference proceedings/anthology/reportConference contributionContributedpeer-review

Contributors

Abstract

Confidential computing services enable users to run or use applications in Trusted Execution Environments (TEEs) leveraging secure hardware, like Intel SGX or AMD SEV, and verify them by performing remote attestation. Typically this process is very rigid and not always aligned with the trust assumptions of the users regarding the hardware identities, stakeholders and software that are considered trusted. In our work, we enable the users to tailor their trust boundaries according to their security concerns and remotely attest the different TEEs specifically based on those.

Details

Original languageEnglish
Title of host publicationProceedings - 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks - Supplemental Volume, DSN-S 2023
Pages173-175
Number of pages3
ISBN (electronic)9798350325454
Publication statusPublished - 10 Aug 2023
Peer-reviewedYes

External IDs

ORCID /0000-0002-4148-7631/work/147674871
Scopus 85169294022
Mendeley 7c21f713-932c-3c67-85e6-61712b9d8ef6

Keywords

Keywords

  • Confidential Computing, Remote Attestation, Trusted Execution Environments