Demystifying arm trustzone: A comprehensive survey
The world is undergoing an unprecedented technological transformation, evolving into a
state where ubiquitous Internet-enabled “things” will be able to generate and share large …
state where ubiquitous Internet-enabled “things” will be able to generate and share large …
Hardware security for Internet of Things identity assurance
With the proliferation of Internet of Things (IoT) devices, there is an increasing need to
prioritize their security, especially in the context of identity and authentication mechanisms …
prioritize their security, especially in the context of identity and authentication mechanisms …
Sok: Understanding the prevailing security vulnerabilities in trustzone-assisted tee systems
Hundreds of millions of mobile devices worldwide rely on Trusted Execution Environments
(TEEs) built with Arm TrustZone for the protection of security-critical applications (eg, DRM) …
(TEEs) built with Arm TrustZone for the protection of security-critical applications (eg, DRM) …
Truspy: Cache side-channel information leakage from the secure world on arm devices
As smart, embedded devices are increasingly integrated into our daily life, the security of
these devices has become a major concern. The ARM processor family, which powers more …
these devices has become a major concern. The ARM processor family, which powers more …
Sectee: A software-based approach to secure enclave architecture using tee
Secure enclaves provide a practical solution to secure computation, and current approaches
to secure enclaves are implemented by extending hardware security mechanisms to the …
to secure enclaves are implemented by extending hardware security mechanisms to the …
Privacyguard: Enforcing private data usage control with blockchain and attested off-chain contract execution
The abundance and rich varieties of data are enabling many transformative applications of
big data analytics that have profound societal impacts. However, there are also increasing …
big data analytics that have profound societal impacts. However, there are also increasing …
RusTEE: developing memory-safe ARM TrustZone applications
In the past decade, Trusted Execution Environment (TEE) provided by ARM TrustZone is
becoming one of the primary techniques for enhancing the security of mobile devices. The …
becoming one of the primary techniques for enhancing the security of mobile devices. The …
HECTOR-V: A heterogeneous CPU architecture for a secure RISC-V execution environment
To ensure secure and trustworthy execution of applications in potentially insecure
environments, vendors frequently embed trusted execution environments (TEE) into their …
environments, vendors frequently embed trusted execution environments (TEE) into their …
Systematic literature review on the use of trusted execution environments to protect cloud/fog-based internet of things applications
Trusted Execution Environments have been applied to improve data security in many distinct
application scenarios since they enable data processing in a separate and protected region …
application scenarios since they enable data processing in a separate and protected region …
[PDF][PDF] Ginseng: Keeping Secrets in Registers When You Distrust the Operating System.
Ginseng: Keeping Secrets in Registers When You Distrust the Operating System Page 1
Ginseng: Keeping Secrets in Registers When You Distrust the Operating System Min Hong Yun …
Ginseng: Keeping Secrets in Registers When You Distrust the Operating System Min Hong Yun …