“…Common to all of them is that the device to be attested, called prover, sends a status report of its current software configuration to another device, called verifier, to demonstrate that it is in a known and, thus trustworthy, state. Since malicious software on the prover's platform could forge this report, its authenticity is typically assured by secure hardware [49,67,48,14,29,56,26] and/or trusted software [3,24,60,59,58,57,16,32,29,68]. Attestation based on secure hardware is most suitable for advanced computing platforms, such as smartphones, tablets, laptops, personal computers, and servers.…”