A Survey of Hardware Improvements to Secure Program Execution

L Zhao, H Shuang, S Xu, W Huang, R Cui… - ACM Computing …, 2024 - dl.acm.org
Hardware has been constantly augmented for security considerations since the advent of
computers. There is also a common perception among computer users that hardware does a …

Mr-TEE: Practical Trusted Execution of Mixed-Criticality Code

T Van Eyck, H Trimech, S Michiels, D Hughes… - Proceedings of the 24th …, 2023 - dl.acm.org
Industry 4.0 is increasingly using commodity hardware and software in place of dedicated
control systems to lower costs and increase flexibility. However, this means that critical …

SoftME: A Software‐Based Memory Protection Approach for TEE System to Resist Physical Attacks

M Zhang, Q Zhang, S Zhao, Z Shi… - Security and …, 2019 - Wiley Online Library
The development of the Internet of Things has made embedded devices widely used.
Embedded devices are often used to process sensitive data, making them the target of …

[PDF][PDF] D2. 5 Trusted Execution of TMB on IoT/Edge Devices

TVE KUL, SM KUL, DH KUL, R Dautov - Nature, 2023 - eratosthenes-project.eu
This deliverable contains an overview of the design and development work done for Task
2.4: Trusted Execution on IoT/Edge Devices until M25. The goal of this task is to analyze and …

Lessons Learned in Hardware-Assisted Operating System Security

W Huang - 2023 - search.proquest.com
Hardware security extensions are engineered to enhance software security for various
purposes such as memory protection, program execution environment isolation, among …

Secure I/O on trusted platforms with lightweight kernels.

N Gordon - 2025 - d-scholarship.pitt.edu
Trusted computing has become widespread and the complexity of trusted applications has
increased substantially, such as in real-time patient vitals data processing or employee-free …

[PDF][PDF] A Survey of Hardware Improvements to Secure Program Execution

HE SHUANG, S XU, WEI HUANG, R CUI… - security.csl.toronto.edu
A Survey of Hardware Improvements to Secure Program Execution Page 1 A Survey of
Hardware Improvements to Secure Program Execution LIANYING ZHAO, Carleton …