Demystifying arm trustzone: A comprehensive survey

S Pinto, N Santos - ACM computing surveys (CSUR), 2019 - dl.acm.org
The world is undergoing an unprecedented technological transformation, evolving into a
state where ubiquitous Internet-enabled “things” will be able to generate and share large …

Virtualizing mixed-criticality systems: A survey on industrial trends and issues

M Cinque, D Cotroneo, L De Simone… - Future Generation …, 2022 - Elsevier
Virtualization is gaining attraction in the industry as it promises a flexible way to integrate,
manage, and re-use heterogeneous software components with mixed-criticality levels, on a …

Rt-tee: Real-time system availability for cyber-physical systems using arm trustzone

J Wang, A Li, H Li, C Lu, N Zhang - 2022 IEEE Symposium on …, 2022 - ieeexplore.ieee.org
Embedded devices are becoming increasingly pervasive in safety-critical systems of the
emerging cyber-physical world. While trusted execution environments (TEEs), such as ARM …

Bao: A lightweight static partitioning hypervisor for modern multi-core embedded systems

J Martins, A Tavares, M Solieri… - Workshop on next …, 2020 - drops.dagstuhl.de
Given the increasingly complex and mixed-criticality nature of modern embedded systems,
virtualization emerges as a natural solution to achieve strong spatial and temporal isolation …

Shedding light on static partitioning hypervisors for Arm-based mixed-criticality systems

J Martins, S Pinto - 2023 IEEE 29th Real-Time and Embedded …, 2023 - ieeexplore.ieee.org
In this paper, we aim to understand the properties and guarantees of static partitioning
hypervisors (SPH) for Arm-based mixed-criticality systems (MCS). To this end, we performed …

{ReZone}: Disarming {TrustZone} with {TEE} Privilege Reduction

D Cerdeira, J Martins, N Santos, S Pinto - 31st USENIX Security …, 2022 - usenix.org
In TrustZone-assisted TEEs, the trusted OS has unrestricted access to both secure and
normal world memory. Unfortunately, this architectural limitation has opened an aisle of …

Hardware-based solutions for trusted cloud computing

O Demigha, R Larguet - Computers & Security, 2021 - Elsevier
The increasing number of threats targeting cloud computing and the exploitation of
specifically privileged software vulnerabilities have pushed the security managers of cloud …

Systematic literature review on the use of trusted execution environments to protect cloud/fog-based internet of things applications

DCG Valadares, NC Will, J Caminha… - IEEE …, 2021 - ieeexplore.ieee.org
Trusted Execution Environments have been applied to improve data security in many distinct
application scenarios since they enable data processing in a separate and protected region …

Virtualization on TrustZone-enabled microcontrollers? Voilà!

S Pinto, H Araujo, D Oliveira, J Martins… - 2019 IEEE Real-Time …, 2019 - ieeexplore.ieee.org
With predictions pointing to more than 20 billion Internet-enabled'things' by 2020 and much
more to come, smart sensor nodes are expected to be predominant in the Internet of Things …

SoK: Security in real-time systems

M Hasan, A Kashinath, CY Chen, S Mohan - ACM Computing Surveys, 2024 - dl.acm.org
Security is an increasing concern for real-time systems (RTS). Over the last decade or so,
researchers have demonstrated attacks and defenses aimed at such systems. In this article …