Attestation in wireless sensor networks: A survey

RV Steiner, E Lupu - ACM Computing Surveys (CSUR), 2016 - dl.acm.org
Attestation is a mechanism used by a trusted entity to validate the software integrity of an
untrusted platform. Over the past few years, several attestation techniques have been …

TrustVisor: Efficient TCB reduction and attestation

JM McCune, Y Li, N Qu, Z Zhou, A Datta… - … IEEE Symposium on …, 2010 - ieeexplore.ieee.org
An important security challenge is to protect the execution of security-sensitive code on
legacy systems from malware that may infect the OS, applications, or system devices. Prior …

Ironclad apps:{End-to-End} security via automated {Full-System} verification

C Hawblitzel, J Howell, JR Lorch, A Narayan… - … USENIX Symposium on …, 2014 - usenix.org
An Ironclad App lets a user securely transmit her data to a remote machine with the
guarantee that every instruction executed on that machine adheres to a formal abstract …

Unveiling the mystery of internet packet forwarding: A survey of network path validation

K Bu, A Laird, Y Yang, L Cheng, J Luo, Y Li… - ACM Computing Surveys …, 2020 - dl.acm.org
Validating the network paths taken by packets is critical in constructing a secure Internet
architecture. Any feasible solution must both enforce packet forwarding along end-host …

A formal foundation for secure remote execution of enclaves

P Subramanyan, R Sinha, I Lebedev… - Proceedings of the …, 2017 - dl.acm.org
Recent proposals for trusted hardware platforms, such as Intel SGX and the MIT Sanctum
processor, offer compelling security features but lack formal guarantees. We introduce a …

A minimalist approach to remote attestation

A Francillon, Q Nguyen… - … Design, Automation & …, 2014 - ieeexplore.ieee.org
Embedded computing devices increasingly permeate many aspects of modern life: from
medical to automotive, from building and factory automation to weapons, from critical …

Design, implementation and verification of an extensible and modular hypervisor framework

A Vasudevan, S Chaki, L Jia, J McCune… - … IEEE Symposium on …, 2013 - ieeexplore.ieee.org
We present the design, implementation, and verification of XMHF-an eXtensible and
Modular Hypervisor Framework. XMHF is designed to achieve three goals--modular …

Bootstrap** trust in commodity computers

B Parno, JM McCune, A Perrig - 2010 IEEE Symposium on …, 2010 - ieeexplore.ieee.org
Trusting a computer for a security-sensitive task (such as checking email or banking online)
requires the user to know something about the computer's state. We examine research on …

A survey of practical formal methods for security

T Kulik, B Dongol, PG Larsen, HD Macedo… - Formal aspects of …, 2022 - dl.acm.org
In today's world, critical infrastructure is often controlled by computing systems. This
introduces new risks for cyber attacks, which can compromise the security and disrupt the …

A security framework for the analysis and design of software attestation

F Armknecht, AR Sadeghi, S Schulz… - Proceedings of the 2013 …, 2013 - dl.acm.org
Software attestation has become a popular and challenging research topic at many
established security conferences with an expected strong impact in practice. It aims at …