Sok: Understanding the prevailing security vulnerabilities in trustzone-assisted tee systems

D Cerdeira, N Santos, P Fonseca… - 2020 IEEE Symposium …, 2020 - ieeexplore.ieee.org
Hundreds of millions of mobile devices worldwide rely on Trusted Execution Environments
(TEEs) built with Arm TrustZone for the protection of security-critical applications (eg, DRM) …

Hardware-based solutions for trusted cloud computing

O Demigha, R Larguet - Computers & Security, 2021 - Elsevier
The increasing number of threats targeting cloud computing and the exploitation of
specifically privileged software vulnerabilities have pushed the security managers of cloud …

[HTML][HTML] A survey on the (in) security of trusted execution environments

A Muñoz, R Rios, R Román, J López - Computers & Security, 2023 - Elsevier
As the number of security and privacy attacks continue to grow around the world, there is an
ever increasing need to protect our personal devices. As a matter of fact, more and more …

Twinvisor: Hardware-isolated confidential virtual machines for arm

D Li, Z Mi, Y **a, B Zang, H Chen, H Guan - Proceedings of the ACM …, 2021 - dl.acm.org
Confidential VM, which offers an isolated execution environment for cloud tenants with
limited trust in the cloud provider, has recently been deployed in major clouds such as AWS …

{ReZone}: Disarming {TrustZone} with {TEE} Privilege Reduction

D Cerdeira, J Martins, N Santos, S Pinto - 31st USENIX Security …, 2022 - usenix.org
In TrustZone-assisted TEEs, the trusted OS has unrestricted access to both secure and
normal world memory. Unfortunately, this architectural limitation has opened an aisle of …

[PDF][PDF] MyTEE: Own the Trusted Execution Environment on Embedded Devices.

SK Han, J Jang - NDSS, 2023 - ndss-symposium.org
We propose a solution, MyTEE, that enables a trusted execution environment (TEE) to be
built even in worstcase environments wherein major hardware security primitives (eg, ARM …

Building trust for smart connected devices: The challenges and pitfalls of TrustZone

N Koutroumpouchos, C Ntantogian, C Xenakis - Sensors, 2021 - mdpi.com
TrustZone-based Trusted Execution Environments (TEEs) have been utilized extensively for
the implementation of security-oriented solutions for several smart intra and inter-connected …

CRONUS: Fault-isolated, secure and high-performance heterogeneous computing for trusted execution environment

J Jiang, J Qi, T Shen, X Chen, S Zhao… - 2022 55th IEEE/ACM …, 2022 - ieeexplore.ieee.org
With the trend of processing a large volume of sensitive data on PaaS services (eg, DNN
training), a TEE architecture that supports general heterogeneous accelerators, enables …

uTango: an open-source TEE for IoT devices

D Oliveira, T Gomes, S Pinto - IEEE Access, 2022 - ieeexplore.ieee.org
Security is one of the main challenges of the Internet of Things (IoT). IoT devices are mainly
powered by low-cost microcontrollers (MCUs) that typically lack basic hardware security …

Building a lightweight trusted execution environment for arm gpus

C Wang, Y Deng, Z Ning, K Leach, J Li… - … on Dependable and …, 2023 - ieeexplore.ieee.org
A wide range of Arm endpoints leverage integrated and discrete GPUs to accelerate
computation. However, Arm GPU security has not been explored by the community. Existing …