Demystifying arm trustzone: A comprehensive survey

S Pinto, N Santos - ACM computing surveys (CSUR), 2019 - dl.acm.org
The world is undergoing an unprecedented technological transformation, evolving into a
state where ubiquitous Internet-enabled “things” will be able to generate and share large …

Systematic literature review on the use of trusted execution environments to protect cloud/fog-based internet of things applications

DCG Valadares, NC Will, J Caminha… - IEEE …, 2021 - ieeexplore.ieee.org
Trusted Execution Environments have been applied to improve data security in many distinct
application scenarios since they enable data processing in a separate and protected region …

[PDF][PDF] BOOMERANG: Exploiting the Semantic Gap in Trusted Execution Environments.

A Machiry, E Gustafson, C Spensky, C Salls… - NDSS, 2017 - ndss-symposium.org
In the past decade, we have come to rely on computers for various safety and security-
critical tasks, such as securing our homes, operating our vehicles, and controlling our …

Sectee: A software-based approach to secure enclave architecture using tee

S Zhao, Q Zhang, Y Qin, W Feng, D Feng - Proceedings of the 2019 …, 2019 - dl.acm.org
Secure enclaves provide a practical solution to secure computation, and current approaches
to secure enclaves are implemented by extending hardware security mechanisms to the …

TrustOTP: Transforming smartphones into secure one-time password tokens

H Sun, K Sun, Y Wang, J **g - Proceedings of the 22nd ACM SIGSAC …, 2015 - dl.acm.org
Two-factor authentication has been widely used due to the vulnerabilities associated with
traditional text-based password. One-time password (OTP) plays an indispensable role on …

Trustice: Hardware-assisted isolated computing environments on mobile devices

H Sun, K Sun, Y Wang, J **g… - 2015 45th Annual IEEE …, 2015 - ieeexplore.ieee.org
Mobile devices have been widely used to process sensitive data and perform important
transactions. It is a challenge to protect secure code from a malicious mobile OS. ARM …

[PDF][PDF] MyTEE: Own the Trusted Execution Environment on Embedded Devices.

SK Han, J Jang - NDSS, 2023 - ndss-symposium.org
We propose a solution, MyTEE, that enables a trusted execution environment (TEE) to be
built even in worstcase environments wherein major hardware security primitives (eg, ARM …

HanGuard: SDN-driven protection of smart home WiFi devices from malicious mobile apps

S Demetriou, N Zhang, Y Lee, XF Wang… - Proceedings of the 10th …, 2017 - dl.acm.org
A new development of smart-home systems is to use mobile apps to control IoT devices
across a Home Area Network (HAN). As verified in our study, those systems tend to rely on …

Hardware-security technologies for industrial IoT: TrustZone and security controller

C Lesjak, D Hein, J Winter - IECON 2015-41st Annual …, 2015 - ieeexplore.ieee.org
The transition from product-centric to service-centric business models presents a major
challenge to industrial automation and manufacturing systems. This transition increases …

Privatezone: Providing a private execution environment using arm trustzone

J Jang, C Choi, J Lee, N Kwak, S Lee… - … on Dependable and …, 2016 - ieeexplore.ieee.org
ARM TrustZone is widely used to provide a Trusted Execution Environment (TEE) for mobile
devices. However, the use of TrustZone is limited because TrustZone resources are only …