SoK: A Systematic Review of TEE Usage for Developing Trusted Applications

A Paju, MO Javed, J Nurmi, J Savimäki… - Proceedings of the 18th …, 2023 - dl.acm.org
Trusted Execution Environments (TEEs) are a feature of modern central processing units
(CPUs) that aim to provide a high assurance, isolated environment in which to run …

Trusted execution environments for telecoms: Strengths, weaknesses, opportunities, and threats

M Lacoste, V Lefebvre - IEEE Security & Privacy, 2023 - ieeexplore.ieee.org
Building on our experience and other experiments, we perform a strengths, weaknesses,
opportunities, and threats analysis of x86 platform trusted execution environments (TEEs) in …

Hardware-hardened Sandbox Enclaves for Trusted Serverless Computing

J Park, S Kang, S Lee, T Kim, J Park, Y Kwon… - ACM Transactions on …, 2024 - dl.acm.org
In cloud-based serverless computing, an application consists of multiple functions provided
by mutually distrusting parties. For secure serverless computing, the hardware-based trusted …

LURK-T: Limited Use of Remote Keys with Added Trust in TLS 1.3

B Shobiri, S Pourali, D Migault… - … on Network Science …, 2024 - ieeexplore.ieee.org
In many web applications, such as Content Delivery Networks (CDNs), TLS credentials are
shared, eg, between the website's TLS origin server and the CDN's edge servers, which can …

HyperTEE: A Decoupled TEE Architecture with Secure Enclave Management

Y Bai, P Li, Y Huang, MC Huang, S Zhao… - 2024 57th IEEE/ACM …, 2024 - ieeexplore.ieee.org
Trusted Execution Environment (TEE) architectures have been deployed in various
commercial processors to provide secure environments for confidential programs and data …

Approximating ReLU on a Reduced Ring for Efficient MPC-based Private Inference

K Maeng, GE Suh - arXiv preprint arXiv:2309.04875, 2023 - arxiv.org
Secure multi-party computation (MPC) allows users to offload machine learning inference on
untrusted servers without having to share their privacy-sensitive data. Despite their strong …

One System Call Hook to Rule All TEE OSes in the Cloud

K Qin, D Gu - 2024 IEEE 17th International Conference on …, 2024 - ieeexplore.ieee.org
Confidential computing has revolutionized the way of in-use data protection in the Cloud,
using the concept of Trusted Execution Environments (TEEs). Emerging from this paradigm …

SGX-based LibOS 中系统调用转发机制研究

刘西蒙, 黄应康, 刘维杰, 范倍汐, 章恬, 张杰 - 通信学报, 2024 - infocomm-journal.com
SGX-based LibOS 允许现有的未经修改的应用程序在SGX Enclave 中运行. 然而, 不同的SGX-
based LibOS 在架构设计, 系统调用模拟以及系统调用转发机制上存在差异 …

[PDF][PDF] Offline Digital Euro: a Minimum Viable CBDC using Groth-Sahai proofs

L Kempen, J Pouwelse - arXiv preprint arXiv:2407.13776, 2024 - arxiv.org
Current digital payment solutions are fragile and offer less privacy than traditional cash.
Their critical dependency on an online service used to perform and validate transactions …

AuditTrust: Blockchain-Based Audit Trail for Sharing Data in a Distributed Environment

HL Sanchez, S Tysebaert, A Rath, E Rivière - European Dependable …, 2022 - Springer
There has been a significant recent interest in trust-building technologies for decentralized
environments, especially for sharing data between mutually distrusting entities. One of the …