Merely checking the certificate of a compromised TAM requires reliance on certificate revocation to detect a TAM compromise. This does not deal with APT attacks on TAMs, which are high value targets given the authority they have over TEEs. Additional checks are needed.
Merely checking the certificate of a compromised TAM requires reliance on certificate revocation to detect a TAM compromise. This does not deal with APT attacks on TAMs, which are high value targets given the authority they have over TEEs. Additional checks are needed.