HyperTEE: A Decoupled TEE Architecture with Secure Enclave Management
Trusted Execution Environment (TEE) architectures have been deployed in various
commercial processors to provide secure environments for confidential programs and data …
commercial processors to provide secure environments for confidential programs and data …
ProveriT: A Parameterized, Composable, and Verified Model of TEE Protection Profile
J Hu, F Zeng, Y Zhao, Z Zhang, L Zhang… - … on Dependable and …, 2024 - ieeexplore.ieee.org
The Trusted Execution Environment (TEE) plays a crucial role in modern computer systems
and the compromise of TEE can result in enormous losses. Although numerous TEE …
and the compromise of TEE can result in enormous losses. Although numerous TEE …
AGATE: Augmented Global Attested Trusted Execution in the Universal Composability framework
L Martinico, M Kohlweiss - Cryptology ePrint Archive, 2024 - eprint.iacr.org
Abstract A Trusted Execution Environment (TEE) is a new type of security technology,
implemented by CPU manufacturers, which guarantees integrity and confidentiality on a …
implemented by CPU manufacturers, which guarantees integrity and confidentiality on a …
Dorami: Privilege Separating Security Monitor on RISC-V TEEs
TEE implementations on RISC-V offer an enclave abstraction by introducing a trusted
component called the security monitor (SM). The SM performs critical tasks such as isolating …
component called the security monitor (SM). The SM performs critical tasks such as isolating …
TEEMATE: Fast and Efficient Confidential Container using Shared Enclave
Confidential container is becoming increasingly popular as it meets both needs for efficient
resource management by cloud providers, and data protection by cloud users. Specifically …
resource management by cloud providers, and data protection by cloud users. Specifically …
Lark: Verified Cross-Domain Access Control for Trusted Execution Environments
F Zeng, Z Zhang, R Chang, C Yu… - 2023 IEEE 34th …, 2023 - ieeexplore.ieee.org
Trusted Execution Environments (TEEs) play a crucial role in embedded systems, IoT, and
cloud computing. However, their security issues are a major concern, particularly related to …
cloud computing. However, their security issues are a major concern, particularly related to …
[PDF][PDF] Compositional Proofs of Information Flow Properties for Hardware-Software Platforms
While agile hardware design flows have led to performant computation platforms, hardware
security vulnerabilities pose a threat to security-critical software running on these platforms …
security vulnerabilities pose a threat to security-critical software running on these platforms …
Lightweight, Secure and Stateful Serverless Computing with PSL
We present PSL, a lightweight, secure and stateful Function-as-a-Serivce (FaaS) framework
for Trusted Execution Environments (TEEs). The framework provides rich programming …
for Trusted Execution Environments (TEEs). The framework provides rich programming …
[图书][B] Formal Specification and Verification of Secure Information Flow for Hardware Platforms
K Cheang - 2023 - search.proquest.com
Hardware platforms, such as microprocessors and Trusted Execution Environments (TEEs),
aim to provide strong memory isolation properties. However, in recent years, this has been …
aim to provide strong memory isolation properties. However, in recent years, this has been …
[PDF][PDF] Trusted Execution for Private and Secure Computation: a Composable Approach
L Martinico - lorenzo.martinico.me
Abstract Trusted Execution Environments (TEEs) protect and isolate programs, sometimes
referred to as enclaves, from all other software executed on the same processor, through a …
referred to as enclaves, from all other software executed on the same processor, through a …