Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Trusted execution environment

Known as: AMD PSP, Tee (disambiguation) 
The Trusted Execution Environment (TEE) is a secure area of the main processor of a smart phone (or any connected device including tablets, set-top… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Due to the centralization of authority in the management of data generated by IoT devices, there is a lack of transparency in how… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table I
Is this relevant?
2017
2017
With the advent of the Internet of Things (IoT), security has emerged as a major design goal for smart connected devices. This… Expand
  • figure 1
  • figure 2
Is this relevant?
2017
2017
Novel hardware-aided trusted execution environments, as provided by Intel's Software Guard Extensions (SGX), enable to execute… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 6
Is this relevant?
Highly Cited
2017
Highly Cited
2017
With Tor being a popular anonymity network, many attacks have been proposed to break its anonymity or leak information of a… Expand
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • table 2
Is this relevant?
2017
2017
As Mc Gillion, Dettenborn, & Nyman described, hardware-based Trusted Execution Environments (TEEs) are widely deployed in mobile… Expand
Is this relevant?
2015
2015
Hardware-based Trusted Execution Environments (TEEs) are widely deployed in mobile devices. Yet their use has been limited… Expand
  • figure 1
  • figure 2
  • figure 3
  • table II
  • table V
Is this relevant?
Highly Cited
2015
Highly Cited
2015
We propose SeCReT to ameliorate this problem. SeCReT is a framework that builds a secure channel between the REE and TEE by… Expand
  • table I
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2015
2015
This paper presents a proof of concept that uses ARM TrustZone to perform introspection of a Linux kernel running in the normal… Expand
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
2013
2013
This document is the final report for the SICS project Virtualizing the Trusted Execution Environment (VETE). This project was… Expand
  • table 1
Is this relevant?
2010
2010
A generic credential platform realized using a hardware- based trusted execution environment (TrEE) provides a usable and… Expand
Is this relevant?