Please use this identifier to cite or link to this item:
|RV-TEE : secure cryptographic protocol execution based on runtime verification
|Vella, Mark Joseph
|Computer systems -- Verification
Malware (Computer software)
|Vella, M., Colombo, C., Abela, R., & Špaček, P. (2021). RV-TEE : secure cryptographic protocol execution based on runtime verification. Journal of Computer Virology and Hacking Techniques, 17, 229-248.
|Analytical security of cryptographic protocols does not immediately translate to operational security due to incorrect implementation and attacks targeting the execution environment. Code verification and hardware-based trusted execution solutions exist, however these leave it up to the implementer to assemble the complete solution, imposing a complete re-think of the hardware platforms and software development process.We rather aim for a comprehensive solution for secure cryptographic protocol execution, which takes the form of a trusted execution environment based on runtime verification and stock hardware security modules. RV-TEE can be deployed on existing platforms and protocol implementations. Runtime verification lends itself well at several conceptual levels of the execution environment, ranging from high level protocol properties, to lower level checks such as taint inference. The proposed architectural setup involving two runtime verification modules is instantiated through a case study using a popular web browser. We successfully monitor high and low level properties with promising results with respect to practicality.
|Appears in Collections:
|Scholarly Works - FacICTCS
Files in This Item:
|View/Open Request a copy
Items in OAR@UM are protected by copyright, with all rights reserved, unless otherwise indicated.