Section 2 provides
background on attestation under different threat models. Section 3
presents our verification methodology. Sections 4, 5 and 6 present
the details of the attestation protocols for the three different classes
of architectures. Section 7 discusses the evaluation of the verification,
while section 8 lists related work. We conclude in Section