Keystone: An open framework for architecting trusted execution environments

D Lee, D Kohlbrenner, S Shinde, K Asanović… - Proceedings of the …, 2020 - dl.acm.org
Trusted execution environments (TEEs) see rising use in devices from embedded sensors to
cloud servers and encompass a range of cost, power constraints, and security threat model …

{SHELTER}: Extending Arm {CCA} with Isolation in User Space

Y Zhang, Y Hu, Z Ning, F Zhang, X Luo… - 32nd USENIX Security …, 2023 - usenix.org
The increasing adoption of confidential computing is providing individual users with a more
seamless interaction with numerous mobile and server devices. TrustZone is a promising …

WaVe: a verifiably secure WebAssembly sandboxing runtime

E Johnson, E Laufer, Z Zhao, D Gohman… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
The promise of software sandboxing is flexible, fast and portable isolation; capturing the
benefits of hardwarebased memory protection without requiring operating system …

Smashex: Smashing sgx enclaves using exceptions

J Cui, JZ Yu, S Shinde, P Saxena, Z Cai - Proceedings of the 2021 ACM …, 2021 - dl.acm.org
Exceptions are a commodity hardware functionality which is central to multi-tasking OSes as
well as event-driven user applications. Normally, the OS assists the user application by …

Fuzzing sgx enclaves via host program mutations

A Khan, M Zou, K Kim, D Xu, A Bianchi… - 2023 IEEE 8th …, 2023 - ieeexplore.ieee.org
Intel Software Guard eXtension (SGX) is the cornerstone of Confidential Computing,
enabling runtime code and data integrity and confidentiality via enclaves. Unfortunately …

{HyperEnclave}: An open and cross-platform trusted execution environment

Y Jia, S Liu, W Wang, Y Chen, Z Zhai, S Yan… - 2022 USENIX Annual …, 2022 - usenix.org
A number of trusted execution environments (TEEs) have been proposed by both academia
and industry. However, most of them require specific hardware or firmware changes and are …

Formal verification of memory isolation for the trustzone-based tee

Y Ma, Q Zhang, S Zhao, G Wang, X Li… - 2020 27th Asia-Pacific …, 2020 - ieeexplore.ieee.org
The trusted execution environment (TEE) is the security basis of embedded systems, which
can provide a hardware-based isolated execution environment for security-sensitive …

A verified confidential computing as a service framework for privacy preservation

H Chen, HH Chen, M Sun, K Li, Z Chen… - 32nd USENIX Security …, 2023 - usenix.org
As service providers are moving to the cloud, users are forced to provision sensitive data to
the cloud. Confidential computing leverages hardware Trusted Execution Environment …

Dynamic binary translation for sgx enclaves

J Cui, S Shinde, S Sen, P Saxena, P Yuan - ACM Transactions on …, 2022 - dl.acm.org
Enclaves, such as those enabled by Intel SGX, offer a hardware primitive for shielding user-
level applications from the OS. While enclaves are a useful starting point, code running in …

Understanding TEE containers, easy to use? Hard to trust

W Liu, H Chen, XF Wang, Z Li, D Zhang… - arXiv preprint arXiv …, 2021 - arxiv.org
As an emerging technique for confidential computing, trusted execution environment (TEE)
receives a lot of attention. To better develop, deploy, and run secure applications on a TEE …