-
Notifications
You must be signed in to change notification settings - Fork 0
AttestedTLS
Muhammad Usama Sardar edited this page Apr 3, 2026
·
14 revisions
- Formally specify and verify the protocols combining TLS 1.3 and remote attestation for Confidential Computing use cases
- Most recent paper and artifacts
- Team Lead/contact: Muhammad Usama Sardar
- Internet Engineering Task Force (IETF)
- Internet Research Task Force (IRTF)
- Confidential Computing Consortium (CCC)
- Open Compute Project (OCP)
- GlobalPlatform
- Global Alliance for Genomics and Health (GA4GH)
- ELIXIR Europe
- GENXT, Cocos AI, Pacific Analytics, JetBrains, Nebius
- Industrial partners at Arm, Linaro, Huawei, Siemens, Intuit, Intel, Nokia, ...
- Researchers at TU Dresden, Universität der Bundeswehr München, Aalto University, University of Turku, ...
The main challenge is the extraction of the attested TLS protocol to be formalized, as all the vendors (including Intel, Arm, AMD and IBM) describe the protocols informally. The main issue is that the protocols are either unspecified (leading to security through obscurity), or if specified, they fall in at least one of the following:
Confidential Computing (CC) workload may refer to, for example, a container in Virtual Machine (VM)-based Trusted Execution Environments (TEEs).
- What is the "long-term identity" of the CC workload? How is "long-term identity" assigned to the CC workload? Which entity supplies this "long-term identity"? How is that Identity Supplier trusted?
- How is CA-certified Long-Term Key (LTK) injected in the Confidential Computing workload in the first place? Which entity generates the LTK and how is that entity trusted?
- Can CSP really be out of TCB?
- How to augment authentication with attestation rather than replacing authentication with attestation?
- What does "freshness" mean for highly dynamic and long-lived workloads?
- How to verify the Verifier?
- How to bootstrap trust in the system?
Further questions in this proposal
- Symbolic security analysis
- Architecturally-defined attestation
- TLS 1.3
- Confidential Computing
-
Latest Pre-prints
-
Papers
-
Code
-
Internet-Drafts
-
TLS-attest
- Informal description of discovered impersonation/diversion attacks
- Formal analysis that discovered vulnerabilities in this proposal
- Expoited in BadRAM, wiretap.fail and TEE.fail
- Using exported authenticators (Latest editor's version)
- Intra- vs. post-handshake attestation (Latest editor's version)
- Security considerations of RATS
-
TLS-attest
-
Recent tutorial at IETF 122
- Disclosure to mailing lists
- Some recent talks
- initial disclosure to vendor: 07 Oct, 2025
- acknowledgement by vendor: 14 Dec, 2025
- public announcement by vendor: 27 Feb, 2026
- security advisory issued: 23 March, 2026 [Severity = HIGH (7.8/10)]
- CVE published CVE-2026-33697 (NIST database): 26 March, 2026 [Severity = HIGH (7.5/10)]