Guest lecture by David Kohlbrenner.
Read Keystone: An Open Framework for Architecting Trusted Execution Environments, EuroSys 2020
You are building a small, embedded sensor platform for a city-scale government-run data collection. The results of this experiment may affect funding decisions made for infrastructure, policing, and more. Since these devices will be deployed on community wifi networks and in public, you’ve decided a TEE-based security approach (on RISC-V of course!) will help ensure the integrity of the experiment.
Describe two types of the potential adversaries you may need to deal with. Be concise.
What types of technical approaches might you use to counter these adversaries?
Provide a list of questions you would like to discuss in class.