Demystifying arm trustzone: A comprehensive survey
The world is undergoing an unprecedented technological transformation, evolving into a
state where ubiquitous Internet-enabled “things” will be able to generate and share large …
state where ubiquitous Internet-enabled “things” will be able to generate and share large …
Detecting compromised IoT devices: Existing techniques, challenges, and a way forward
IoT devices, whether connected to the Internet or operating in a private network, are
vulnerable to cyber attacks from external or internal attackers or insiders who may succeed …
vulnerable to cyber attacks from external or internal attackers or insiders who may succeed …
{vTZ}: Virtualizing {ARM}{TrustZone}
ARM TrustZone, a security extension that provides a secure world, a trusted execution
environment (TEE), to run security-sensitive code, has been widely adopted in mobile …
environment (TEE), to run security-sensitive code, has been widely adopted in mobile …
Truspy: Cache side-channel information leakage from the secure world on arm devices
As smart, embedded devices are increasingly integrated into our daily life, the security of
these devices has become a major concern. The ARM processor family, which powers more …
these devices has become a major concern. The ARM processor family, which powers more …
Sectee: A software-based approach to secure enclave architecture using tee
Secure enclaves provide a practical solution to secure computation, and current approaches
to secure enclaves are implemented by extending hardware security mechanisms to the …
to secure enclaves are implemented by extending hardware security mechanisms to the …
TrustOTP: Transforming smartphones into secure one-time password tokens
H Sun, K Sun, Y Wang, J Jing - Proceedings of the 22nd ACM SIGSAC …, 2015 - dl.acm.org
Two-factor authentication has been widely used due to the vulnerabilities associated with
traditional text-based password. One-time password (OTP) plays an indispensable role on …
traditional text-based password. One-time password (OTP) plays an indispensable role on …
Sok: Hardware-supported trusted execution environments
The growing complexity of modern computing platforms and the need for strong isolation
protections among their software components has led to the increased adoption of Trusted …
protections among their software components has led to the increased adoption of Trusted …
Case: Cache-assisted secure execution on arm processors
Recognizing the pressing demands to secure embedded applications, ARM TrustZone has
been adopted in both academic research and commercial products to protect sensitive code …
been adopted in both academic research and commercial products to protect sensitive code …
Physical fault injection and side-channel attacks on mobile devices: A comprehensive analysis
C Shepherd, K Markantonakis, N Van Heijningen… - Computers & …, 2021 - Elsevier
Today's mobile devices contain densely packaged system-on-chips (SoCs) with multi-core,
high-frequency CPUs and complex pipelines. In parallel, sophisticated SoC-assisted …
high-frequency CPUs and complex pipelines. In parallel, sophisticated SoC-assisted …
[PDF][PDF] MyTEE: Own the Trusted Execution Environment on Embedded Devices.
We propose a solution, MyTEE, that enables a trusted execution environment (TEE) to be
built even in worstcase environments wherein major hardware security primitives (eg, ARM …
built even in worstcase environments wherein major hardware security primitives (eg, ARM …