Trusted execution environments: Applications and organizational challenges

T Geppert, S Deml, D Sturzenegger… - Frontiers in Computer …, 2022‏ - frontiersin.org
A lack of trust in the providers is still a major barrier to cloud computing adoption–especially
when sensitive data is involved. While current privacy-enhancing technologies, such as …

Sok: Preventing transaction reordering manipulations in decentralized finance

L Heimbach, R Wattenhofer - Proceedings of the 4th ACM Conference …, 2022‏ - dl.acm.org
User transactions on Ethereum's peer-to-peer network are at risk of being attacked. The
smart contracts building decentralized finance (DeFi) have introduced a new transaction …

A Survey on Thwarting Memory Corruption in RISC-V

M Brohet, F Regazzoni - ACM Computing Surveys, 2023‏ - dl.acm.org
With embedded devices becoming more pervasive and entrenched in society, it is
paramount to keep these systems secure. A threat plaguing these systems consists of …

No need to hide: Protecting safe regions on commodity hardware

K Koning, X Chen, H Bos, C Giuffrida… - Proceedings of the …, 2017‏ - dl.acm.org
As modern 64-bit x86 processors no longer support the segmentation capabilities of their 32-
bit predecessors, most research projects assume that strong in-process memory isolation is …

A comparison study of intel SGX and AMD memory encryption technology

S Mofrad, F Zhang, S Lu, W Shi - … of the 7th International Workshop on …, 2018‏ - dl.acm.org
Hardware-assisted trusted execution environments are secure isolation technologies that
have been engineered to serve as efficient defense mechanisms to provide a security …

RusTEE: develo** memory-safe ARM TrustZone applications

S Wan, M Sun, K Sun, N Zhang, X He - Proceedings of the 36th Annual …, 2020‏ - dl.acm.org
In the past decade, Trusted Execution Environment (TEE) provided by ARM TrustZone is
becoming one of the primary techniques for enhancing the security of mobile devices. The …

Obscuro: A bitcoin mixer using trusted execution environments

M Tran, L Luu, MS Kang, I Bentov… - Proceedings of the 34th …, 2018‏ - dl.acm.org
Bitcoin provides only pseudo-anonymous transactions, which can be exploited to link payers
and payees--defeating the goal of anonymous payments. To thwart such attacks, several …

A comprehensive survey of hardware-assisted security: From the edge to the cloud

L Coppolino, S D'Antonio, G Mazzeo, L Romano - Internet of Things, 2019‏ - Elsevier
Sensitive data processing occurs more and more on machines or devices out of users
control. In the Internet of Things world, for example, the security of data could be posed at …

Hardware-based solutions for trusted cloud computing

O Demigha, R Larguet - Computers & Security, 2021‏ - Elsevier
The increasing number of threats targeting cloud computing and the exploitation of
specifically privileged software vulnerabilities have pushed the security managers of cloud …

A Survey of Hardware Improvements to Secure Program Execution

L Zhao, H Shuang, S Xu, W Huang, R Cui… - ACM Computing …, 2024‏ - dl.acm.org
Hardware has been constantly augmented for security considerations since the advent of
computers. There is also a common perception among computer users that hardware does a …