Tailoring and Verification of the Trust Boundaries in a Heterogeneous TEE Landscape

Anna Galanou
DOI: https://doi.org/10.1109/DSN-S58398.2023.00046
2023-06-01
Abstract:Confidential computing services enable users to run or use applications in Trusted Execution Environments (TEEs) leveraging secure hardware, like Intel SGX or AMD SEV, and verify them by performing remote attestation. Typically this process is very rigid and not always aligned with the trust assumptions of the users regarding the hardware identities, stakeholders and software that are considered trusted. In our work, we enable the users to tailor their trust boundaries according to their security concerns and remotely attest the different TEEs specifically based on those.
Computer Science,Engineering
What problem does this paper attempt to address?