The third paper in this session was Caulfield et al.'s "TRACES: TEE-based Runtime Auditing for Commodity Embedded Systems" ensuring Verifiers receive runtime reports, even from compromised devices. (https://www.acsac.org/2024/program/final/s83.html) 4/5
#ControlFlowAttestation #TrustedExecution
The final talk in the session was Shen et al.'s "T-Edge: Trusted Heterogeneous Edge Computing," detailing a secure ARM/FPGA design using TrustZone for cloud resources. (https://www.acsac.org/2024/program/final/s282.html) 6/6
#TrustedExecution #CloudComputing #ARM #FPGA