Lecture: Keystone

Guest lecture by David Kohlbrenner.

Read Keystone: An Open Framework for Architecting Trusted Execution Environments, EuroSys 2020

Question

You are building a small, embedded sensor platform for a city-scale government-run data collection. The results of this experiment may affect funding decisions made for infrastructure, policing, and more. Since these devices will be deployed on community wifi networks and in public, you’ve decided a TEE-based security approach (on RISC-V of course!) will help ensure the integrity of the experiment.

  • Describe two types of the potential adversaries you may need to deal with. Be concise.

  • What types of technical approaches might you use to counter these adversaries?

Question

Provide a list of questions you would like to discuss in class.