The growing complexity of modern computing platforms and the need for strong isolation protections among their software components has led to the increased adoption of Trusted Execution Environments (TEEs). While several commercial and academic TEE architectures have emerged in recent times, they remain hard to compare and contrast. More generally, existing TEEs have not been subject to a holistic systematization to understand the available design alternatives for various aspects of TEE design and their corresponding pros-and-cons. Therefore, in this work, we analyze the design of existing TEEs and systematize the mechanisms that TEEs implement to achieve their security goals, namely, verifiable launch, run-time isolation, trusted IO, and...
Modern computer systems have critical security problems because of two wrong assumptions security sy...
Hardware-assisted security solutions, and the isolation guarantees they provide, constitute the basi...
peer-reviewedTrusted Computing is a relatively new approach to computer security in which a system s...
Trusted Execution Environments (TEEs) offer hardware-based isolation, which protects the integrity a...
Trusted Execution Environments (TEEs) are a feature of modern central processing units (CPUs) that a...
International audienceA variety of applications are executing on a large untrusted computing base, w...
Trust is vital for arbitrary entities to interact and cooperate. These entities may have different s...
International audienceNowadays, there is a trend to design complex, yet secure systems. In this cont...
Abstract: A trusted execution Environment (TEE) could be a comfy place of a computer’s essential pro...
The problem of secure remote computation has become a serious concern of hardware manufacturers and ...
Trusted Execution Environments (TEEs) drastically reduce the trusted computing base (TCB) of the sys...
New types of Trusted Execution Environment (TEE) architectures like TrustLite and Intel Software Gua...
The advent of Trusted Execution Environments (TEEs) for IoT aligns with the reinforcement of IoT sec...
Recently, there is a growing interest in the research community to employ tamper-resistant processor...
A lack of trust in the providers is still a major barrier to cloud computing adoption – especially w...
Modern computer systems have critical security problems because of two wrong assumptions security sy...
Hardware-assisted security solutions, and the isolation guarantees they provide, constitute the basi...
peer-reviewedTrusted Computing is a relatively new approach to computer security in which a system s...
Trusted Execution Environments (TEEs) offer hardware-based isolation, which protects the integrity a...
Trusted Execution Environments (TEEs) are a feature of modern central processing units (CPUs) that a...
International audienceA variety of applications are executing on a large untrusted computing base, w...
Trust is vital for arbitrary entities to interact and cooperate. These entities may have different s...
International audienceNowadays, there is a trend to design complex, yet secure systems. In this cont...
Abstract: A trusted execution Environment (TEE) could be a comfy place of a computer’s essential pro...
The problem of secure remote computation has become a serious concern of hardware manufacturers and ...
Trusted Execution Environments (TEEs) drastically reduce the trusted computing base (TCB) of the sys...
New types of Trusted Execution Environment (TEE) architectures like TrustLite and Intel Software Gua...
The advent of Trusted Execution Environments (TEEs) for IoT aligns with the reinforcement of IoT sec...
Recently, there is a growing interest in the research community to employ tamper-resistant processor...
A lack of trust in the providers is still a major barrier to cloud computing adoption – especially w...
Modern computer systems have critical security problems because of two wrong assumptions security sy...
Hardware-assisted security solutions, and the isolation guarantees they provide, constitute the basi...
peer-reviewedTrusted Computing is a relatively new approach to computer security in which a system s...