2020
DOI: 10.1007/978-3-030-61078-4_8
|View full text |Cite
|
Sign up to set email alerts
|

A Symbolic Model for Systematically Analyzing TEE-Based Protocols

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
1
1
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 13 publications
0
2
0
Order By: Relevance
“…The model is also used to verify Intel's description of the TDX design. Examples of platform-independent frameworks to reason about implementations of RA are TAP [21] and the framework of Xu et al [35]. Both frameworks are meant specifically for enclave platforms and both their abstractions are more low-level than those in our model.…”
Section: Related Workmentioning
confidence: 99%
“…The model is also used to verify Intel's description of the TDX design. Examples of platform-independent frameworks to reason about implementations of RA are TAP [21] and the framework of Xu et al [35]. Both frameworks are meant specifically for enclave platforms and both their abstractions are more low-level than those in our model.…”
Section: Related Workmentioning
confidence: 99%
“…Guirant and Halpin [30] discussed the privacy issue involved with identifying a user in a different server when one authenticator is used in two web servers simultaneously. Xu [31] focused on the environment in which the UAF protocol is based, the Trusted Execution Environment (TEE), which is used, for example, in the TPM chip. Alaca and Oorschot [32] warned of possible threats in which authentication data is extracted from a disk or memory by malware on user devices.…”
Section: Related Workmentioning
confidence: 99%