Sok: Understanding the prevailing security vulnerabilities in trustzone-assisted tee systems
Hundreds of millions of mobile devices worldwide rely on Trusted Execution Environments
(TEEs) built with Arm TrustZone for the protection of security-critical applications (eg, DRM) …
(TEEs) built with Arm TrustZone for the protection of security-critical applications (eg, DRM) …
Hardware-based solutions for trusted cloud computing
O Demigha, R Larguet - Computers & Security, 2021 - Elsevier
The increasing number of threats targeting cloud computing and the exploitation of
specifically privileged software vulnerabilities have pushed the security managers of cloud …
specifically privileged software vulnerabilities have pushed the security managers of cloud …
[HTML][HTML] A survey on the (in) security of trusted execution environments
As the number of security and privacy attacks continue to grow around the world, there is an
ever increasing need to protect our personal devices. As a matter of fact, more and more …
ever increasing need to protect our personal devices. As a matter of fact, more and more …
Twinvisor: Hardware-isolated confidential virtual machines for arm
Confidential VM, which offers an isolated execution environment for cloud tenants with
limited trust in the cloud provider, has recently been deployed in major clouds such as AWS …
limited trust in the cloud provider, has recently been deployed in major clouds such as AWS …
{ReZone}: Disarming {TrustZone} with {TEE} Privilege Reduction
In TrustZone-assisted TEEs, the trusted OS has unrestricted access to both secure and
normal world memory. Unfortunately, this architectural limitation has opened an aisle of …
normal world memory. Unfortunately, this architectural limitation has opened an aisle of …
[PDF][PDF] MyTEE: Own the Trusted Execution Environment on Embedded Devices.
We propose a solution, MyTEE, that enables a trusted execution environment (TEE) to be
built even in worstcase environments wherein major hardware security primitives (eg, ARM …
built even in worstcase environments wherein major hardware security primitives (eg, ARM …
Building trust for smart connected devices: The challenges and pitfalls of TrustZone
TrustZone-based Trusted Execution Environments (TEEs) have been utilized extensively for
the implementation of security-oriented solutions for several smart intra and inter-connected …
the implementation of security-oriented solutions for several smart intra and inter-connected …
CRONUS: Fault-isolated, secure and high-performance heterogeneous computing for trusted execution environment
With the trend of processing a large volume of sensitive data on PaaS services (eg, DNN
training), a TEE architecture that supports general heterogeneous accelerators, enables …
training), a TEE architecture that supports general heterogeneous accelerators, enables …
uTango: an open-source TEE for IoT devices
Security is one of the main challenges of the Internet of Things (IoT). IoT devices are mainly
powered by low-cost microcontrollers (MCUs) that typically lack basic hardware security …
powered by low-cost microcontrollers (MCUs) that typically lack basic hardware security …
Building a lightweight trusted execution environment for arm gpus
A wide range of Arm endpoints leverage integrated and discrete GPUs to accelerate
computation. However, Arm GPU security has not been explored by the community. Existing …
computation. However, Arm GPU security has not been explored by the community. Existing …