List of Papers


 1. Dynamic Root of Trust Measurement

    1.1. Flicker:An Execution Infrastructure for TCB Minimization - paper

    1.2  Efficient TCB Reduction and Attestation - paper
          
 2. Protocol verification

    2.1  Direct Anonymous Attestation (DAA): Ensuring Privacy with Corrupt Administrators - paper

    2.2  Unified Security Analysis of Two-phase Key Exchange Protocols in TPM 2.0 - paper

    2.3  Property-based Attestation for Computing Platforms:Caring about properties, not mechanisms - paper
         
3. Trusted Platform Module(TPM)

    3.1. vTPM: Virtualizing the Trusted Platform Module - paper
 
    3.2. fTPM: A Software-only Implementation of a TPM Chip - paper
 
    3.3. cTPM: A Cloud TPM for Cross-Device Trusted Applications - paper
 
4. Trusted Execution Environment

    4.1. Open-TEE - An Open Virtual Trusted Execution Environment - paper

    4.2. SeCReT: Secure Channel between Rich Execution Environment and Trusted Execution Environment - paper
 
5. Trusted Computing in Mobile

    5.1. Beyond Kernel-level Integrity Measurement:Enabling Remote Attestation for the Android Platform - paper

    5.2. Hypervision Across Worlds: Real-time Kernel Protection from the ARM TrustZone Secure World - paper
 
6. Trusted Execution Environment exploitation

    6.1  BOOMERANG: Exploiting the Semantic Gap in Trusted Execution Environments - paper
     
7. Hardware Isolation

    7.1 Sanctum: Minimal Hardware Extensions for Strong Software Isolation - paper
     
    7.2 AEGIS: Architecture for Tamper-evident and Tamper-resistant Processing - paper
     
8. Intel SGX

    8.1 Controlled-Channel Attacks: Deterministic Side Channels for Untrusted Operating Systems - paper

    8.2 Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing - paper

Privacy Policy | Legal Notice
If you encounter technical problems, please contact the administrators.