Autonomous and robotic systems are increasingly being trusted with sensitive activities with potentially serious consequences if that trust is broken. Runtime verification techniques present a natural source of inspiration for monitoring and enforcing the desirable properties of the communication protocols in place, providing a formal basis and ways to limit intrusiveness. A recently proposed approach, RV-TEE, shows how runtime verification can enhance the level of trust to the Rich Execution Environment (REE), consequently adding a further layer of protection around the Trusted Execution Environment (TEE). By reflecting on the implication of deploying RV in the context of trustworthy computing, we propose practical solutions to two threat models for the RV-TEE monitoring process: one where the adversary has gained access to the system without elevated privileges, and another where the adversary gains all privileges to the host system but fails to steal secrets from the TEE.

Runtime Verification for Trustworthy Computing / Abela, R.; Colombo, C.; Curmi, A.; Fenech, M.; Vella, M.; Ferrando, A.. - In: ELECTRONIC PROCEEDINGS IN THEORETICAL COMPUTER SCIENCE. - ISSN 2075-2180. - 391:(2023), pp. 49-62. ( 3rd Workshop on Agents and Robots for Reliable Engineered Autonomy, AREA 2023 pol 2023) [10.4204/EPTCS.391.7].

Runtime Verification for Trustworthy Computing

Ferrando A.
2023

Abstract

Autonomous and robotic systems are increasingly being trusted with sensitive activities with potentially serious consequences if that trust is broken. Runtime verification techniques present a natural source of inspiration for monitoring and enforcing the desirable properties of the communication protocols in place, providing a formal basis and ways to limit intrusiveness. A recently proposed approach, RV-TEE, shows how runtime verification can enhance the level of trust to the Rich Execution Environment (REE), consequently adding a further layer of protection around the Trusted Execution Environment (TEE). By reflecting on the implication of deploying RV in the context of trustworthy computing, we propose practical solutions to two threat models for the RV-TEE monitoring process: one where the adversary has gained access to the system without elevated privileges, and another where the adversary gains all privileges to the host system but fails to steal secrets from the TEE.
2023
3rd Workshop on Agents and Robots for Reliable Engineered Autonomy, AREA 2023
pol
2023
391
49
62
Abela, R.; Colombo, C.; Curmi, A.; Fenech, M.; Vella, M.; Ferrando, A.
Runtime Verification for Trustworthy Computing / Abela, R.; Colombo, C.; Curmi, A.; Fenech, M.; Vella, M.; Ferrando, A.. - In: ELECTRONIC PROCEEDINGS IN THEORETICAL COMPUTER SCIENCE. - ISSN 2075-2180. - 391:(2023), pp. 49-62. ( 3rd Workshop on Agents and Robots for Reliable Engineered Autonomy, AREA 2023 pol 2023) [10.4204/EPTCS.391.7].
File in questo prodotto:
File Dimensione Formato  
unpaywall-bitstream--1291929868.pdf

Open access

Tipologia: VOR - Versione pubblicata dall'editore
Licenza: [IR] creative-commons
Dimensione 534.96 kB
Formato Adobe PDF
534.96 kB Adobe PDF Visualizza/Apri
Pubblicazioni consigliate

Licenza Creative Commons
I metadati presenti in IRIS UNIMORE sono rilasciati con licenza Creative Commons CC0 1.0 Universal, mentre i file delle pubblicazioni sono rilasciati con licenza Attribuzione 4.0 Internazionale (CC BY 4.0), salvo diversa indicazione.
In caso di violazione di copyright, contattare Supporto Iris

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11380/1383132
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 1
  • ???jsp.display-item.citation.isi??? 1
social impact