all InfoSec news
Flexible remote attestation of pre-SNP SEV VMs using SGX enclaves. (arXiv:2305.09351v1 [cs.CR])
May 17, 2023, 1:10 a.m. | Pedro Antonino, Ante Derek, Wojciech Aleksander Wołoszyn
cs.CR updates on arXiv.org arxiv.org
We propose a protocol that explores a synergy between two TEE
implementations: it brings SGX-like remote attestation to SEV VMs. We use the
notion of a \emph{trusted guest owner}, implemented as an SGX enclave, to
deploy, attest, and provision a SEV VM. This machine can, in turn, rely on the
trusted owner to generate SGX-like attestation proofs on its behalf. Our
protocol combines the application portability of SEV with the flexible remote
attestation of SGX. We formalise our protocol and …
More from arxiv.org / cs.CR updates on arXiv.org
Jobs in InfoSec / Cybersecurity
Social Engineer For Reverse Engineering Exploit Study
@ Independent study | Remote
Security Engineer II- Full stack Java with React
@ JPMorgan Chase & Co. | Hyderabad, Telangana, India
Cybersecurity SecOps
@ GFT Technologies | Mexico City, MX, 11850
Senior Information Security Advisor
@ Sun Life | Sun Life Toronto One York
Contract Special Security Officer (CSSO) - Top Secret Clearance
@ SpaceX | Hawthorne, CA
Early Career Cyber Security Operations Center (SOC) Analyst
@ State Street | Quincy, Massachusetts