Proceedings of the ACM Asia Conference on Computer and Communications Security 2023
DOI: 10.1145/3579856.3582833
|View full text |Cite
|
Sign up to set email alerts
|

ZEKRA: Zero-Knowledge Control-Flow Attestation

Abstract: To detect runtime attacks against programs running on a remote computing platform, Control-Flow Attestation (CFA) lets a (trusted) verifier determine the legality of the program's execution path, as recorded and reported by the remote platform (prover). However, besides complicating scalability due to verifier complexity, this assumption regarding the verifier's trustworthiness renders existing CFA schemes prone to privacy breaches and implementation disclosure attacks under "honest-but-curious" adversaries. T… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2025
2025
2025
2025

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 41 publications
0
1
0
Order By: Relevance
“…In general, while CFA provides strong security guarantees and verifiable evidence on the correctness of a device's configuration and execution, enforcing control-flow integrity in a practical way is challenging due to the inefficiency of existing tracing solutions. Despite sustained interest in CFA, current approaches try to overcome these limitations by either targeting (custom) optimized generation of CFGs (LO-FAT [5], LiteHAX [6], SCAPI [7] and BLINDTRUST [8]) or leveraging hardware features ( [9], CFIMon [10], µCFI [11], PITTYPAT [12], PT-CFI [13] and C-ITS [14]). That is, current mechanisms require the physical devices to be equipped with specialised hardware components to enable tracing.…”
Section: Introductionmentioning
confidence: 99%
“…In general, while CFA provides strong security guarantees and verifiable evidence on the correctness of a device's configuration and execution, enforcing control-flow integrity in a practical way is challenging due to the inefficiency of existing tracing solutions. Despite sustained interest in CFA, current approaches try to overcome these limitations by either targeting (custom) optimized generation of CFGs (LO-FAT [5], LiteHAX [6], SCAPI [7] and BLINDTRUST [8]) or leveraging hardware features ( [9], CFIMon [10], µCFI [11], PITTYPAT [12], PT-CFI [13] and C-ITS [14]). That is, current mechanisms require the physical devices to be equipped with specialised hardware components to enable tracing.…”
Section: Introductionmentioning
confidence: 99%