Demystifying arm trustzone: A comprehensive survey

S Pinto, N Santos - ACM computing surveys (CSUR), 2019 - dl.acm.org
The world is undergoing an unprecedented technological transformation, evolving into a
state where ubiquitous Internet-enabled “things” will be able to generate and share large …

Blockchain-empowered space-air-ground integrated networks: Opportunities, challenges, and solutions

Y Wang, Z Su, J Ni, N Zhang… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
The terrestrial networks face the challenges of severe cost inefficiency and low feasibility to
provide seamless services anytime and anywhere, especially in the extreme or hotspot …

Sok: Understanding the prevailing security vulnerabilities in trustzone-assisted tee systems

D Cerdeira, N Santos, P Fonseca… - 2020 IEEE Symposium …, 2020 - ieeexplore.ieee.org
Hundreds of millions of mobile devices worldwide rely on Trusted Execution Environments
(TEEs) built with Arm TrustZone for the protection of security-critical applications (eg, DRM) …

Sok: Sgx. fail: How stuff gets exposed

S Van Schaik, A Seto, T Yurek, A Batori… - … IEEE Symposium on …, 2024 - ieeexplore.ieee.org
Intel's Software Guard Extensions (SGX) promises an isolated execution environment,
protected from all software running on the machine. As such, numerous works have sought …

{HybCache}: Hybrid {Side-Channel-Resilient} caches for trusted execution environments

G Dessouky, T Frassetto, AR Sadeghi - 29th USENIX Security …, 2020 - usenix.org
Modern multi-core processors share cache resources for maximum cache utilization and
performance gains. However, this leaves the cache vulnerable to side-channel attacks …

WaTZ: A trusted WebAssembly runtime environment with remote attestation for TrustZone

J Ménétrey, M Pasin, P Felber… - 2022 IEEE 42nd …, 2022 - ieeexplore.ieee.org
WebAssembly (Wasm) is a novel low-level bytecode format that swiftly gained popularity for
its efficiency, versatility and security, with near-native performance. Besides, trusted …

[HTML][HTML] A survey on the (in) security of trusted execution environments

A Muñoz, R Rios, R Román, J López - Computers & Security, 2023 - Elsevier
As the number of security and privacy attacks continue to grow around the world, there is an
ever increasing need to protect our personal devices. As a matter of fact, more and more …

Hardware-backed heist: Extracting ECDSA keys from qualcomm's trustzone

K Ryan - Proceedings of the 2019 ACM SIGSAC Conference on …, 2019 - dl.acm.org
Trusted Execution Environments (TEEs) such as ARM TrustZone are in widespread use in
both mobile and embedded devices, and they are used to protect sensitive secrets while …

Sectee: A software-based approach to secure enclave architecture using tee

S Zhao, Q Zhang, Y Qin, W Feng, D Feng - Proceedings of the 2019 …, 2019 - dl.acm.org
Secure enclaves provide a practical solution to secure computation, and current approaches
to secure enclaves are implemented by extending hardware security mechanisms to the …

Randomized last-level caches are still vulnerable to cache side-channel attacks! but we can fix it

W Song, B Li, Z Xue, Z Li, W Wang… - 2021 IEEE Symposium …, 2021 - ieeexplore.ieee.org
Cache randomization has recently been revived as a promising defense against conflict-
based cache side-channel attacks. As two of the latest implementations, CEASER-S and …