Aster: Fixing the android tee ecosystem with arm cca

M Kuhne, S Sridhara, A Bertschi, N Dutly… - arXiv preprint arXiv …, 2024 - arxiv.org
The Android ecosystem relies on either TrustZone (eg, OP-TEE, QTEE, Trusty) or trusted
hypervisors (pKVM, Gunyah) to isolate security-sensitive services from malicious apps and …

[PDF][PDF] CAGE: Complementing Arm CCA with GPU Extensions

C Wang, F Zhang, Y Deng, K Leach… - Network and …, 2024 - ningzhenyu.github.io
Confidential computing is an emerging technique that provides users and third-party
developers with an isolated and transparent execution environment. To support this …

SoK: A Comparison Study of Arm TrustZone and CCA

H Huang, F Zhang, S Yan, T Wei… - … Symposium on Secure …, 2024 - ieeexplore.ieee.org
Arm TrustZone is the most popular hardware-assisted Trusted Execution Environment (TEE)
solution on mobile and Internet of Things (IoT) devices. However, this well-established TEE …

[PDF][PDF] PORTAL: Fast and Secure Device Access with Arm CCA for Modern Arm Mobile System-on-Chips (SoCs)

F Sang, J Lee, X Zhang, T Kim - Proceedings of the 2025 IEEE Symposium …, 2025 - gts3.org
The increasing integration of diverse co-processors and peripherals within mobile Arm
System-on-Chips (SoCs) presents significant challenges for secure and efficient device I/O …

Ascend-CC: Confidential Computing on Heterogeneous NPU for Emerging Generative AI Workloads

A Dhar, C Thorens, LM Lazier, L Cavigelli - arXiv preprint arXiv …, 2024 - arxiv.org
Cloud workloads have dominated generative AI based on large language models (LLM).
Specialized hardware accelerators, such as GPUs, NPUs, and TPUs, play a key role in AI …

Goldilocks Isolation: High Performance VMs with Edera

M Moore, A Zenla - arXiv preprint arXiv:2501.04580, 2025 - arxiv.org
Organizations run applications on cloud infrastructure shared between multiple users and
organizations. Popular tooling for this shared infrastructure, including Docker and …

Towards trustworthy TrustZone-assisted TEEs

DM Cerdeira - 2024 - repositorium.sdum.uminho.pt
As personal computers and mobile devices have become mainstream, ensuring the security
of sensitive data has become crucial. However, as systems grow more complex …

[PDF][PDF] Hardening and Adapting Trusted Execution Environments for Emerging Platforms

F Sang - 2024 - gts3.org
HARDENING AND ADAPTING TRUSTED EXECUTION ENVIRONMENTS FOR EMERGING
PLATFORMS A Dissertation Presented to The Academic Faculty By Page 1 HARDENING AND …