SoK: A Systematic Review of TEE Usage for Developing Trusted Applications

A Paju, MO Javed, J Nurmi, J Savimäki… - Proceedings of the 18th …, 2023 - dl.acm.org
Trusted Execution Environments (TEEs) are a feature of modern central processing units
(CPUs) that aim to provide a high assurance, isolated environment in which to run …

TEE-based General-purpose Computational Backend for Secure Delegated Data Processing

M Sha, J Li, S Wang, F Li, KL Tan - … of the ACM on Management of Data, 2023 - dl.acm.org
The increasing prevalence of data breaches necessitates robust data protection measures
in computational tasks. Secure computation outsourcing (SCO) presents a viable solution by …

Understanding TEE containers, easy to use? Hard to trust

W Liu, H Chen, XF Wang, Z Li, D Zhang… - arXiv preprint arXiv …, 2021 - arxiv.org
As an emerging technique for confidential computing, trusted execution environment (TEE)
receives a lot of attention. To better develop, deploy, and run secure applications on a TEE …

ErrHunter: Detecting Error-Handling Bugs in the Linux Kernel Through Systematic Static Analysis

D Zhan, X Yu, H Zhang, L Ye - IEEE Transactions on Software …, 2022 - ieeexplore.ieee.org
Error handling is essential for operating systems, thus, there are many bugs in error-
handling code, which could result in serious consequences. In this paper, we revisit the …

[PDF][PDF] The Trust Model For Multi-tenant 5G Telecom Systems Running Virtualized Multi-component Services

M Turhan, G Scopelliti, C Baumann, E Truyen… - 2021 - lirias.kuleuven.be
In the 5GhOSTS project we analyze and improve the security of service-based
implementations of 5G networks, with a special focus on security and privacy aspects of the …