Demystifying arm trustzone: A comprehensive survey

S Pinto, N Santos - ACM computing surveys (CSUR), 2019 - dl.acm.org
The world is undergoing an unprecedented technological transformation, evolving into a
state where ubiquitous Internet-enabled “things” will be able to generate and share large …

Hardware-assisted machine learning in resource-constrained IoT environments for security: review and future prospective

G Kornaros - IEEE Access, 2022 - ieeexplore.ieee.org
As the Internet of Things (IoT) technology advances, billions of multidisciplinary smart
devices act in concert, rarely requiring human intervention, posing significant challenges in …

Foreshadow: Extracting the keys to the intel {SGX} kingdom with transient {Out-of-Order} execution

J Van Bulck, M Minkin, O Weisse, D Genkin… - 27th USENIX Security …, 2018 - usenix.org
Trusted execution environments, and particularly the Software Guard eXtensions (SGX)
included in recent Intel x86 processors, gained significant traction in recent years. A long …

A survey on blockchain-based trust management for Internet of Things

Y Liu, J Wang, Z Yan, Z Wan… - IEEE internet of Things …, 2023 - ieeexplore.ieee.org
Internet of Things (IoT) aims to create a vast network with billions of things that can
seamlessly create and exchange data, establishing intelligent interactions between people …

Telling your secrets without page faults: Stealthy page {Table-Based} attacks on enclaved execution

J Van Bulck, N Weichbrodt, R Kapitza… - 26th USENIX Security …, 2017 - usenix.org
Protected module architectures, such as Intel SGX, enable strong trusted computing
guarantees for hardware-enforced enclaves on top a potentially malicious operating system …

SGX-Step: A practical attack framework for precise enclave execution control

J Van Bulck, F Piessens, R Strackx - … of the 2nd Workshop on System …, 2017 - dl.acm.org
Protected module architectures such as Intel SGX hold the promise of protecting sensitive
computations from a potentially compromised operating system. Recent research …

A tale of two worlds: Assessing the vulnerability of enclave shielding runtimes

J Van Bulck, D Oswald, E Marin, A Aldoseri… - Proceedings of the …, 2019 - dl.acm.org
This paper analyzes the vulnerability space arising in Trusted Execution Environments
(TEEs) when interfacing a trusted enclave application with untrusted, potentially malicious …

Nemesis: Studying microarchitectural timing leaks in rudimentary CPU interrupt logic

J Van Bulck, F Piessens, R Strackx - Proceedings of the 2018 ACM …, 2018 - dl.acm.org
Recent research on transient execution vulnerabilities shows that current processors exceed
our levels of understanding. The prominent Meltdown and Spectre attacks abruptly revealed …

Sancus 2.0: A low-cost security architecture for iot devices

J Noorman, JV Bulck, JT Mühlberg, F Piessens… - ACM Transactions on …, 2017 - dl.acm.org
The Sancus security architecture for networked embedded devices was proposed in 2013 at
the USENIX Security conference. It supports remote (even third-party) software installation …

[PDF][PDF] Timber-v: Tag-isolated memory bringing fine-grained enclaves to risc-v

S Weiser, M Werner, F Brasser… - … 2019-Network and …, 2019 - graz.elsevierpure.com
Embedded computing devices are used on a large scale in the emerging internet of things
(IoT). However, their wide deployment raises the incentive for attackers to target these …