Understanding the Capabilities of Privileged Attackers Against Trusted Execution Environments

I Puddu - 2023 - research-collection.ethz.ch
Our lives today rely on the secure operation of computers in a diverse set of sectors, from
energy to medicine. However, today's computers execute software bloated with complexity …

Remote Attestation Assurance Arguments for Trusted Execution Environments

AB Usman, N Cole, M Asplund, F Boeira… - Proceedings of the 2023 …, 2023 - dl.acm.org
Remote attestation (RA) is emerging as an important security mechanism for cyber-physical
systems with strict security requirements. Trusted computing at large and Trusted Execution …

Building open trusted execution environments

D Kohlbrenner, S Shinde, D Lee… - IEEE Security & …, 2020 - ieeexplore.ieee.org
Trusted execution environments (TEEs) are a growing part of the security ecosystem.
Unfortunately, widely available TEEs are hampered by closed designs and a lack of …

Position paper: Challenges towards securing hardware-assisted execution environments

Z Ning, F Zhang, W Shi, W Shi - Proceedings of the Hardware and …, 2017 - dl.acm.org
A Trusted Execution Environment (TEE) provides an isolated environment for sensitive
workloads. However, the code running in the TEE may contain vulnerabilities that could be …

[PDF][PDF] Trusted Execution Environments in Embedded and IoT Systems: A CactiLab Perspective

Z Zhao, M Armanuzzaman, X Tan, Z Ma - tomal-kuet.github.io
While the benefits of networked embedded and Internet of Things (IoT) systems are
unparalleled, they are susceptible to cyberattacks. In recent years, Trusted Execution …

[PDF][PDF] BOOMERANG: Exploiting the Semantic Gap in Trusted Execution Environments.

A Machiry, E Gustafson, C Spensky, C Salls… - NDSS, 2017 - ndss-symposium.org
In the past decade, we have come to rely on computers for various safety and security-
critical tasks, such as securing our homes, operating our vehicles, and controlling our …

Hardware-assisted trusted execution environments: Look back, look ahead

N Asokan - Proceedings of the 2019 ACM SIGSAC Conference on …, 2019 - dl.acm.org
Over the last two decades, hardware-based isolated execution environments, commonly
known as" trusted execution environments" or TEEs, have become widely deployed [1, 2, 3 …

[图书][B] Building Trusted Execution Environments

D Lee - 2022 - search.proquest.com
Abstract Trusted Execution Environments (TEEs) offer hardware-based isolation, which
protects the integrity and confidentiality of the in-use data of programs against various …

Keystone: An open framework for architecting trusted execution environments

D Lee, D Kohlbrenner, S Shinde, K Asanović… - Proceedings of the …, 2020 - dl.acm.org
Trusted execution environments (TEEs) see rising use in devices from embedded sensors to
cloud servers and encompass a range of cost, power constraints, and security threat model …

SecScale: A Scalable and Secure Trusted Execution Environment for Servers

A Sunny, N Shrivastava, SR Sarangi - arXiv preprint arXiv:2407.13572, 2024 - arxiv.org
Trusted execution environments (TEEs) are an integral part of modern secure processors.
They ensure that their application and code pages are confidential, tamper proof and …