Learn More
We present a new general technique for protecting clients in distributed systems against <i>Remote Man-at-the-end</i> (R-MATE) attacks. Such attacks occur in settings where an adversary has physical access to an untrusted client device and can obtain an advantage from tampering with the hardware itself or the software it contains. In our system, the(More)
  • 1