A survey of Intel SGX and its applications

W Zheng, Y Wu, X Wu, C Feng, Y Sui, X Luo… - Frontiers of Computer …, 2021 - Springer
This paper presents a comprehensive survey on the development of Intel SGX (software
guard extensions) processors and its applications. With the advent of SGX in 2013 and its …

Sok: Understanding the prevailing security vulnerabilities in trustzone-assisted tee systems

D Cerdeira, N Santos, P Fonseca… - 2020 IEEE Symposium …, 2020 - ieeexplore.ieee.org
Hundreds of millions of mobile devices worldwide rely on Trusted Execution Environments
(TEEs) built with Arm TrustZone for the protection of security-critical applications (eg, DRM) …

A comprehensive survey of attacks without physical access targeting hardware vulnerabilities in iot/iiot devices, and their detection mechanisms

NF Polychronou, PH Thevenon, M Puys… - ACM Transactions on …, 2021 - dl.acm.org
With the advances in the field of the Internet of Things (IoT) and Industrial IoT (IIoT), these
devices are increasingly used in daily life or industry. To reduce costs related to the time …

Voltjockey: Breaching trustzone by software-controlled voltage manipulation over multi-core frequencies

P Qiu, D Wang, Y Lyu, G Qu - Proceedings of the 2019 ACM SIGSAC …, 2019 - dl.acm.org
ARM TrustZone builds a trusted execution environment based on the concept of hardware
separation. It has been quite successful in defending against various software attacks and …

Hardware-backed heist: Extracting ECDSA keys from qualcomm's trustzone

K Ryan - Proceedings of the 2019 ACM SIGSAC Conference on …, 2019 - dl.acm.org
Trusted Execution Environments (TEEs) such as ARM TrustZone are in widespread use in
both mobile and embedded devices, and they are used to protect sensitive secrets while …

[HTML][HTML] A survey on the (in) security of trusted execution environments

A Muñoz, R Rios, R Román, J López - Computers & Security, 2023 - Elsevier
As the number of security and privacy attacks continue to grow around the world, there is an
ever increasing need to protect our personal devices. As a matter of fact, more and more …

Osprey: Recovery of variable and data structure via probabilistic analysis for stripped binary

Z Zhang, Y Ye, W You, G Tao, W Lee… - … IEEE Symposium on …, 2021 - ieeexplore.ieee.org
Recovering variables and data structure information from stripped binary is a prominent
challenge in binary program analysis. While various state-of-the-art techniques are effective …

[PDF][PDF] Untrustzone: Systematic accelerated aging to expose on-chip secrets

J Mahmod, M Hicks - 2024 IEEE Symposium on Security and …, 2024 - forte-research.com
As technology scaling brings society closer to the vision of smart dust, system designers
must address the threat of physical attacks. To address the threat of physical access to …

On the Performance of ARM TrustZone: (Practical Experience Report)

J Amacher, V Schiavoni - … and Interoperable Systems: 19th IFIP WG 6.1 …, 2019 - Springer
The TrustZone technology, available in the vast majority of recent Arm processors, allows
the execution of code inside a so-called secure world. It effectively provides hardware …

Architectures for Security: A comparative analysis of hardware security features in Intel SGX and ARM TrustZone

MA Mukhtar, MK Bhatti… - 2019 2nd International …, 2019 - ieeexplore.ieee.org
A variety of applications are executing on a large untrusted computing base, which includes
the operating system, hypervisor, firmware, and hardware. This large computing base is …