Security and privacy in device-to-device (D2D) communication: A review

M Haus, M Waqas, AY Ding, Y Li… - … Surveys & Tutorials, 2017 - ieeexplore.ieee.org
Device-to-device (D2D) communication presents a new paradigm in mobile networking to
facilitate data exchange between physically proximate devices. The development of D2D is …

Trusted execution environment: What it is, and what it is not

M Sabt, M Achemlal… - 2015 IEEE Trustcom …, 2015 - ieeexplore.ieee.org
Nowadays, there is a trend to design complex, yet secure systems. In this context, the
Trusted Execution Environment (TEE) was designed to enrich the previously defined trusted …

[HTML][HTML] A survey on the (in) security of trusted execution environments

A Muñoz, R Rios, R Román, J López - Computers & Security, 2023 - Elsevier
As the number of security and privacy attacks continue to grow around the world, there is an
ever increasing need to protect our personal devices. As a matter of fact, more and more …

{fTPM}: A {Software-Only} Implementation of a {TPM} Chip

H Raj, S Saroiu, A Wolman, R Aigner, J Cox… - 25th USENIX Security …, 2016 - usenix.org
Commodity CPU architectures, such as ARM and Intel CPUs, have started to offer trusted
computing features in their CPUs aimed at displacing dedicated trusted hardware …

Trusted mobile computing: An overview of existing solutions

MA Bouazzouni, E Conchon, F Peyrard - Future Generation Computer …, 2018 - Elsevier
Nowadays, smartphones are able to process large amounts of data enabling the use of
applications for personal or professional use. In these contexts, the smartphone needs to …

Building trust for smart connected devices: The challenges and pitfalls of TrustZone

N Koutroumpouchos, C Ntantogian, C Xenakis - Sensors, 2021 - mdpi.com
TrustZone-based Trusted Execution Environments (TEEs) have been utilized extensively for
the implementation of security-oriented solutions for several smart intra and inter-connected …

Regulating arm trustzone devices in restricted spaces

F Brasser, D Kim, C Liebchen, V Ganapathy… - Proceedings of the 14th …, 2016 - dl.acm.org
Smart personal devices equipped with a wide range of sensors and peripherals can
potentially be misused in various environments. They can be used to exfiltrate sensitive …

Security and privacy attacks during data communication in software defined mobile clouds

V Moorthy, R Venkataraman, TR Rao - Computer Communications, 2020 - Elsevier
There has been an enormous growth in networking and data communication between the
wireless devices. Cloud computation has taken a giant leap into the mobile domain to cater …

Trust-zone-based end-to-end security

A Liu, B Venkataram, P Peng, B Kasman… - US Patent …, 2019 - Google Patents
Methods, electronic devices, and systems for exchanging encrypted information. A method
for exchanging encrypted information by an electronic device includes generating one or …

Open cars

L Determann, B Perens - Berkeley Technology Law Journal, 2017 - JSTOR
The car of the future will be autonomous, connected and full of innovative information
technology features. We may drive it or let it drive us. We know it will be a computer network …