Tailoring and Verification of the Trust Boundaries in a Heterogeneous TEE Landscape
Author
Abstract

Confidential computing services enable users to run or use applications in Trusted Execution Environments (TEEs) leveraging secure hardware, like Intel SGX or AMD SEV, and verify them by performing remote attestation. Typically this process is very rigid and not always aligned with the trust assumptions of the users regarding the hardware identities, stakeholders and software that are considered trusted. In our work, we enable the users to tailor their trust boundaries according to their security concerns and remotely attest the different TEEs specifically based on those.

Year of Publication
2023
Date Published
jun
Publisher
IEEE
Conference Location
Porto, Portugal
ISBN Number
9798350325454
URL
https://ieeexplore.ieee.org/document/10206713/
DOI
10.1109/DSN-S58398.2023.00046
Google Scholar | BibTeX | DOI