{SHELTER}: Extending Arm {CCA} with Isolation in User Space

Y Zhang, Y Hu, Z Ning, F Zhang, X Luo… - 32nd USENIX Security …, 2023 - usenix.org
The increasing adoption of confidential computing is providing individual users with a more
seamless interaction with numerous mobile and server devices. TrustZone is a promising …

[HTML][HTML] An edge-computing based Industrial Gateway for Industry 4.0 using ARM TrustZone technology

S Gupta - Journal of Industrial Information Integration, 2023 - Elsevier
Secure and efficient communication to establish a seamless nexus between the five levels of
a typical automation pyramid is paramount to Industry 4.0. Specifically, vertical and …

Evaluating the Security Posture of Real-World FIDO2 Deployments

D Kuchhal, M Saad, A Oest, F Li - … of the 2023 ACM SIGSAC Conference …, 2023 - dl.acm.org
FIDO2 is a suite of protocols that combines the usability of local authentication (eg,
biometrics) with the security of public-key cryptography to deliver passwordless …

CVA6 RISC-V virtualization: Architecture, microarchitecture, and design space exploration

B Sá, L Valente, J Martins, D Rossi… - … Transactions on Very …, 2023 - ieeexplore.ieee.org
Virtualization is a key technology used in a wide range of applications, from cloud computing
to embedded systems. Over the last few years, mainstream computer architectures were …

ADSS: An Available-but-invisible Data Service Scheme for Fine-grained Usage Control

H Wang, J Wang, C Ge, Y Li, L Zhou… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
The demand for mobile terminals to participate in data services is increasingly vital. The
General Data Protection Regulation (GDPR) has established several principled …

Rethinking system audit architectures for high event coverage and synchronous log availability

V Gandhi, S Banerjee, A Agrawal, A Ahmad… - 32nd USENIX Security …, 2023 - usenix.org
Once an attacker compromises the operating system, the integrity and availability of
unprotected system audit logs still kept on the computer becomes uncertain. In this paper …

Building a lightweight trusted execution environment for arm gpus

C Wang, Y Deng, Z Ning, K Leach, J Li… - … on Dependable and …, 2023 - ieeexplore.ieee.org
A wide range of Arm endpoints leverage integrated and discrete GPUs to accelerate
computation. However, Arm GPU security has not been explored by the community. Existing …

The HitchHiker's Guide to High-Assurance System Observability Protection with Efficient Permission Switches

C Zhang, J Zeng, Y Zhang, A Ahmad, F Zhang… - Proceedings of the …, 2024 - dl.acm.org
Protecting system observability records (logs) from compromised OSs has gained significant
traction in recent times, with several note-worthy approaches proposed. Unfortunately, none …

Interstellar: Fully Partitioned and Efficient Security Monitoring Hardware Near a Processor Core for Protecting Systems against Attacks on Privileged Software

YH Song, B Woo, Y Han, BBH Kang - Proceedings of the 2024 on ACM …, 2024 - dl.acm.org
The existing approaches to instruction trace-based security monitoring hardware are
dependent on the privileged software, which presents a significant challenge in defending …

Aster: Fixing the android tee ecosystem with arm cca

M Kuhne, S Sridhara, A Bertschi, N Dutly… - arXiv preprint arXiv …, 2024 - arxiv.org
The Android ecosystem relies on either TrustZone (eg, OP-TEE, QTEE, Trusty) or trusted
hypervisors (pKVM, Gunyah) to isolate security-sensitive services from malicious apps and …