{SHELTER}: Extending Arm {CCA} with Isolation in User Space

Y Zhang, Y Hu, Z Ning, F Zhang, X Luo… - 32nd USENIX Security …, 2023 - usenix.org
The increasing adoption of confidential computing is providing individual users with a more
seamless interaction with numerous mobile and server devices. TrustZone is a promising …

Machine learning with confidential computing: A systematization of knowledge

F Mo, Z Tarkhani, H Haddadi - ACM computing surveys, 2024 - dl.acm.org
Privacy and security challenges in Machine Learning (ML) have become increasingly
severe, along with ML's pervasive development and the recent demonstration of large attack …

SoK: Understanding Design Choices and Pitfalls of Trusted Execution Environments

M Li, Y Yang, G Chen, M Yan, Y Zhang - Proceedings of the 19th ACM …, 2024 - dl.acm.org
Trusted execution environment (TEE) is a revolutionary technology that enables secure
remote execution (SRE) of cloud workloads on untrusted server-side computing platforms …

Rethinking system audit architectures for high event coverage and synchronous log availability

V Gandhi, S Banerjee, A Agrawal, A Ahmad… - 32nd USENIX Security …, 2023 - usenix.org
Once an attacker compromises the operating system, the integrity and availability of
unprotected system audit logs still kept on the computer becomes uncertain. In this paper …

TEESlice: Protecting Sensitive Neural Network Models in Trusted Execution Environments When Attackers have Pre-Trained Models

D Li, Z Zhang, M Yao, Y Cai, Y Guo… - ACM Transactions on …, 2024 - dl.acm.org
Trusted Execution Environments (TEE) are used to safeguard on-device models. However,
directly employing TEEs to secure the entire DNN model is challenging due to the limited …

HardWhale: A Hardware-Isolated Network Security Enforcement System for Cloud Environments

M You, J Nam, H Seo, M Seo, J Kim… - 2024 IEEE 44th …, 2024 - ieeexplore.ieee.org
With the increasing popularity of containers for deploying microservices, ensuring the
security of container networks has become a vital concern. However, current security …

Securing a Multiprocessor KVM Hypervisor with Rust

YH Chiang, WL Chang, SW Li, JT Tu - … of the 2024 ACM Symposium on …, 2024 - dl.acm.org
As computations have increasingly shifted to virtual machines (VMs) running on a
hypervisor, the security of the hypervisor is of critical concern. Rust has gained significant …

HyperTEE: A Decoupled TEE Architecture with Secure Enclave Management

Y Bai, P Li, Y Huang, MC Huang, S Zhao… - 2024 57th IEEE/ACM …, 2024 - ieeexplore.ieee.org
Trusted Execution Environment (TEE) architectures have been deployed in various
commercial processors to provide secure environments for confidential programs and data …

[HTML][HTML] Analysis and Evaluation of Intel Software Guard Extension-Based Trusted Execution Environment Usage in Edge Intelligence and Internet of Things …

Z Wang, Y Zhou - Future Internet, 2025 - mdpi.com
With the extensive deployment and application of the Internet of Things (IoT), 5G and 6G
technologies and edge intelligence, the volume of data generated by IoT and the number of …

virtCCA: Virtualized Arm Confidential Compute Architecture with TrustZone

X Xu, W Wang, Y Wu, C Wang, H Zhu, H Ma… - arXiv preprint arXiv …, 2023 - arxiv.org
ARM recently introduced the Confidential Compute Architecture (CCA) as part of the
upcoming ARMv9-A architecture. CCA enables the support of confidential virtual machines …