This paper introduces the Trusted Execution Module (TEM); a high-level specification for a commodity chip that can execute usersupplied procedures in a trusted environment. The TEM...
Victor Costan, Luis F. G. Sarmenta, Marten van Dij...
Abstract. We present a trust model extension that attempts to relax the assumptions that are currently taken by the majority of existing trust models: (i) proven identity of agents...
Abstract. Increasing adoption of smartphones in recent times has begun to attract more and more malware writers towards these devices. Among the most prominent and widely adopted o...
Mohammad Nauman, Sohail Khan, Xinwen Zhang, Jean-P...
Abstract. Credential platforms implemented on top of Trusted Execution Environments3 (TrEEs) allow users to store and use their credentials, e.g., cryptographic keys or user passwo...
Kari Kostiainen, Alexandra Dmitrienko, Jan-Erik Ek...
The entities participating in a context-aware service platform need to establish and manage trust relationships in order to assert different trust aspects including identity provis...
Ricardo Neisse, Maarten Wegdam, Marten van Sindere...