Trusted Execution Environment: What It is, and What It is Not

@article{Sabt2015TrustedEE,
  title={Trusted Execution Environment: What It is, and What It is Not},
  author={M. Sabt and Mohammed Achemlal and A. Bouabdallah},
  journal={2015 IEEE Trustcom/BigDataSE/ISPA},
  year={2015},
  volume={1},
  pages={57-64}
}
Nowadays, there is a trend to design complex, yet secure systems. In this context, the Trusted Execution Environment (TEE) was designed to enrich the previously defined trusted platforms. TEE is commonly known as an isolated processing environment in which applications can be securely executed irrespective of the rest of the system. However, TEE still lacks a precise definition as well as representative building blocks that systematize its design. Existing definitions of TEE are largely… Expand
33 Citations
Evaluation of Using Secure Enclaves in Virtualized Radio Environments
  • PDF
Towards trusted execution of multi-modal continuous authentication schemes
  • 16
  • PDF
SoftME: A Software-Based Memory Protection Approach for TEE System to Resist Physical Attacks
  • 6
  • PDF
Lightweight Security Architecture Based on Embedded Virtualization and Trust Mechanisms for IoT Edge Devices
  • 27
  • Highly Influenced
SGX-LKL: Securing the Host OS Interface for Trusted Execution
  • 27
  • PDF
Transforming Byzantine Faults using a Trusted Execution Environment
  • 1
  • PDF
The Impact of Attestation on Deniable Communications
Analyzing the Resilience of Modern Smartphones Against Fault Injection Attacks
  • 3
Confidentiality Support over Financial Grade Consortium Blockchain
  • 3
...
1
2
3
4
...

References

SHOWING 1-10 OF 73 REFERENCES
Using Trusted Execution Environments in Two-factor Authentication: comparing approaches
  • 37
  • PDF
Trusted Execution Environments: A Look under the Hood
  • 16
Authenticated Encryption Primitives for Size-Constrained Trusted Computing
  • 3
Using ARM trustzone to build a trusted language runtime for mobile applications
  • 173
  • PDF
On-board credentials with open provisioning
  • 109
  • Highly Influential
  • PDF
seL4: From General Purpose to a Proof of Information Flow Enforcement
  • 175
  • PDF
Memoir: Practical State Continuity for Protected Modules
  • 99
  • PDF
Design and verification of secure systems
  • 459
  • PDF
...
1
2
3
4
5
...