ACKER, M Jean (2024) Trusted timeline using Trusted Execution Environment PRE - Research Project, ENSTA.
![]()
| PDF 4Mb |
Abstract
Theconcept of trusted time is essential for numerous computational and security tasks, includ ing the accurate ordering and comparison of events, determining the lifespan of cryptographic keys, validating certificates, and mitigating vulnerability to time-based attacks, among other applications. While relative time intervals can be accessed, maintaining an accurate and contin uous timeline poses significant challenges, particularly in untrusted and hostile environments like decentralized systems. In addition to the unavoidable risk of time drift that affects all clocks, malicious participants may target time-preserving nodes to alter their clock. Trusted Execution Environments (TEEs) provide an additional layer of security by preventing attackers from tampering with time data stored within. However, TEEs remain vulnerable to delay attacks that can disrupt the delivery of time information. This report investigates a solution designed to be resilient against such attacks.
Item Type: | Thesis (PRE - Research Project) |
---|---|
Uncontrolled Keywords: | TEE, SGX, Trusted Time, Decentralized Market, WEB3 |
Subjects: | Information and Communication Sciences and Technologies |
ID Code: | 10433 |
Deposited By: | Jean ACKER |
Deposited On: | 11 oct. 2024 19:46 |
Dernière modification: | 11 oct. 2024 19:46 |
Repository Staff Only: item control page