Attestation in wireless sensor networks: A survey
RV Steiner, E Lupu - ACM Computing Surveys (CSUR), 2016 - dl.acm.org
Attestation is a mechanism used by a trusted entity to validate the software integrity of an
untrusted platform. Over the past few years, several attestation techniques have been …
untrusted platform. Over the past few years, several attestation techniques have been …
TrustVisor: Efficient TCB reduction and attestation
An important security challenge is to protect the execution of security-sensitive code on
legacy systems from malware that may infect the OS, applications, or system devices. Prior …
legacy systems from malware that may infect the OS, applications, or system devices. Prior …
Ironclad apps:{End-to-End} security via automated {Full-System} verification
An Ironclad App lets a user securely transmit her data to a remote machine with the
guarantee that every instruction executed on that machine adheres to a formal abstract …
guarantee that every instruction executed on that machine adheres to a formal abstract …
Unveiling the mystery of internet packet forwarding: A survey of network path validation
Validating the network paths taken by packets is critical in constructing a secure Internet
architecture. Any feasible solution must both enforce packet forwarding along end-host …
architecture. Any feasible solution must both enforce packet forwarding along end-host …
A formal foundation for secure remote execution of enclaves
Recent proposals for trusted hardware platforms, such as Intel SGX and the MIT Sanctum
processor, offer compelling security features but lack formal guarantees. We introduce a …
processor, offer compelling security features but lack formal guarantees. We introduce a …
A minimalist approach to remote attestation
Embedded computing devices increasingly permeate many aspects of modern life: from
medical to automotive, from building and factory automation to weapons, from critical …
medical to automotive, from building and factory automation to weapons, from critical …
Design, implementation and verification of an extensible and modular hypervisor framework
We present the design, implementation, and verification of XMHF-an eXtensible and
Modular Hypervisor Framework. XMHF is designed to achieve three goals--modular …
Modular Hypervisor Framework. XMHF is designed to achieve three goals--modular …
Bootstrap** trust in commodity computers
Trusting a computer for a security-sensitive task (such as checking email or banking online)
requires the user to know something about the computer's state. We examine research on …
requires the user to know something about the computer's state. We examine research on …
A survey of practical formal methods for security
In today's world, critical infrastructure is often controlled by computing systems. This
introduces new risks for cyber attacks, which can compromise the security and disrupt the …
introduces new risks for cyber attacks, which can compromise the security and disrupt the …
A security framework for the analysis and design of software attestation
F Armknecht, AR Sadeghi, S Schulz… - Proceedings of the 2013 …, 2013 - dl.acm.org
Software attestation has become a popular and challenging research topic at many
established security conferences with an expected strong impact in practice. It aims at …
established security conferences with an expected strong impact in practice. It aims at …