ACKER, M Jean (2024) Trusted timeline using Trusted Execution Environment PRE - Research Project, ENSTA.

[img]
Preview
PDF
4Mb

Abstract

Theconcept of trusted time is essential for numerous computational and security tasks, includ ing the accurate ordering and comparison of events, determining the lifespan of cryptographic keys, validating certificates, and mitigating vulnerability to time-based attacks, among other applications. While relative time intervals can be accessed, maintaining an accurate and contin uous timeline poses significant challenges, particularly in untrusted and hostile environments like decentralized systems. In addition to the unavoidable risk of time drift that affects all clocks, malicious participants may target time-preserving nodes to alter their clock. Trusted Execution Environments (TEEs) provide an additional layer of security by preventing attackers from tampering with time data stored within. However, TEEs remain vulnerable to delay attacks that can disrupt the delivery of time information. This report investigates a solution designed to be resilient against such attacks.

Item Type:Thesis (PRE - Research Project)
Uncontrolled Keywords:TEE, SGX, Trusted Time, Decentralized Market, WEB3
Subjects:Information and Communication Sciences and Technologies
ID Code:10433
Deposited By:Jean ACKER
Deposited On:11 oct. 2024 19:46
Dernière modification:11 oct. 2024 19:46

Repository Staff Only: item control page