Trusted Execution Environments (TEEs) offer hardware-based isolation, which protects the integrity and confidentiality of the in-use data of programs against various threats. Many hardware vendors have produced various TEE-enabled chips. However, there has been only a little public research on building TEEs. Building a TEE with different threat models and functionalities relies on design-space exploration. For example, a TEE must quickly adapt to various evolving threat models. In addition, a TEE can have different functionality requirements, which should not impact security guarantees. This thesis discusses research challenges in exploring the TEE design space. First, this thesis motivates why a TEE should not have a fixed threat model by ...
Compartmentalization techniques like Trusted Execution Environments (TEEs) are a well-established s...
The problem of secure remote computation has become a serious concern of hardware manufacturers and ...
Hardware-based Trusted Execution Environments (TEEs) are widely deployed in mobile devices. Yet thei...
The growing complexity of modern computing platforms and the need for strong isolation protections a...
International audienceNowadays, there is a trend to design complex, yet secure systems. In this cont...
Trust is vital for arbitrary entities to interact and cooperate. These entities may have different s...
New types of Trusted Execution Environment (TEE) architectures like TrustLite and Intel Software Gua...
In recent years, trusted execution environments (TEEs) have seen increasing deployment in computing ...
In recent years, trusted execution environments (TEEs) have seen increasing deployment in computing ...
Cycle-level architectural simulation of Trusted Execution Environ- ments (TEEs) can enable extensive...
A trusted execution environment (TEE) is an isolated environment used for trusted execution. TEE sol...
Abstract: A trusted execution Environment (TEE) could be a comfy place of a computer’s essential pro...
Building applications that ensure confidentiality of sensitive data is a non-trivial task. Such appl...
Trusted Execution Environments (TEEs) drastically reduce the trusted computing base (TCB) of the sys...
This paper presents TEESEC, a framework for discovering microarchitectural vulnerabilities in the co...
Compartmentalization techniques like Trusted Execution Environments (TEEs) are a well-established s...
The problem of secure remote computation has become a serious concern of hardware manufacturers and ...
Hardware-based Trusted Execution Environments (TEEs) are widely deployed in mobile devices. Yet thei...
The growing complexity of modern computing platforms and the need for strong isolation protections a...
International audienceNowadays, there is a trend to design complex, yet secure systems. In this cont...
Trust is vital for arbitrary entities to interact and cooperate. These entities may have different s...
New types of Trusted Execution Environment (TEE) architectures like TrustLite and Intel Software Gua...
In recent years, trusted execution environments (TEEs) have seen increasing deployment in computing ...
In recent years, trusted execution environments (TEEs) have seen increasing deployment in computing ...
Cycle-level architectural simulation of Trusted Execution Environ- ments (TEEs) can enable extensive...
A trusted execution environment (TEE) is an isolated environment used for trusted execution. TEE sol...
Abstract: A trusted execution Environment (TEE) could be a comfy place of a computer’s essential pro...
Building applications that ensure confidentiality of sensitive data is a non-trivial task. Such appl...
Trusted Execution Environments (TEEs) drastically reduce the trusted computing base (TCB) of the sys...
This paper presents TEESEC, a framework for discovering microarchitectural vulnerabilities in the co...
Compartmentalization techniques like Trusted Execution Environments (TEEs) are a well-established s...
The problem of secure remote computation has become a serious concern of hardware manufacturers and ...
Hardware-based Trusted Execution Environments (TEEs) are widely deployed in mobile devices. Yet thei...