Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,517,498 papers from all fields of science
Search
Sign In
Create Free Account
Trusted execution environment
Known as:
AMD PSP
, Tee (disambiguation)
The Trusted Execution Environment (TEE) is a secure area of the main processor of a smart phone (or any connected device including tablets, set-top…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
13 relations
ARM architecture
Common Criteria
FIDO Alliance
Mobile operating system
Expand
Broader (1)
Mobile security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2017
Review
2017
Trusted Execution Environment and Linux A Survey
Prabhav S
,
Madhav V Deshpande
,
Rakshak R Kamath
,
Rohan N
,
Latha Nr
2017
Corpus ID: 54765880
- Improving security and user integrity in Linux operating system has always been a challenging task. One method of improving…
Expand
2017
2017
Trusted execution environment
詹姆斯·赛贝尔
,
凯文·拉弗兰梅
,
弗雷德·科沙拉
,
赖因哈德·舒马克
,
杰里米·德巴特
2017
Corpus ID: 149952186
A trusted execution environment on a computing device within an enterprise, whether owned by the enterprise or the employee/user…
Expand
2016
2016
ODIN
Moreno Ambrosin
,
P. Braca
,
M. Conti
,
R. Lazzeretti
ACM Trans. Internet Techn.
2016
Corpus ID: 1546833
The large spread of sensors and smart devices in urban infrastructures are motivating research in the area of the Internet of…
Expand
2015
2015
Inspecting data from the safety of your trusted execution environment
John Williams
2015
Corpus ID: 91180480
This paper presents a proof of concept that uses ARM TrustZone to perform introspection of a Linux kernel running in the normal…
Expand
2015
2015
Hardware Support for Cost-Effective System-Level Protection in Multi-core SoCs
Georgios Kornaros
,
I. Christoforakis
,
+4 authors
A. Papagrigoriou
Euromicro Conference on Digital System Design
2015
Corpus ID: 15066541
The increasing adoption of multi-core Systems-on-Chip (SoC) in critical systems has turned security into an important design…
Expand
2014
2014
Towards a lightweight embedded virtualization architecture exploiting ARM TrustZone
Sandro Pinto
,
Daniel Oliveira
,
+4 authors
A. Tavares
IEEE International Conference on Emerging…
2014
Corpus ID: 7773777
Virtualization has been used as the de facto technology to allow multiple operating systems (virtual machines) to run on top of…
Expand
2014
2014
Secure video player for mobile devices integrating a watermarking-based tracing mechanism
Pablo Antón del Pino
,
A. Monsifrot
,
Charles Salmon-Legagneur
,
G. Doërr
International Conference on Security and…
2014
Corpus ID: 17657954
Content protection relies on several security mechanisms: (i) encryption to prevent access to the content during transport, (ii…
Expand
2013
2013
VETE: Virtualizing the Trusted Execution Environment
A. Vahidi
,
P. Ekdahl
2013
Corpus ID: 108023214
This document is the final report for the SICS project Virtualizing the Trusted Execution Environment (VETE). This project was…
Expand
2013
2013
Virtualizing on-chip distributed ScratchPad memories for low power and trusted application execution
L. A. Bathen
,
Dongyoun Shin
,
Sung-Soo Lim
,
N. Dutt
Design automation for embedded systems
2013
Corpus ID: 43422672
Emerging multicore platforms are increasingly deploying distributed scratchpad memories to achieve lower energy and area together…
Expand
2013
2013
Mobile devices as secure eid reader using trusted execution environments
Maximilian Stein
Open Identity Summit
2013
Corpus ID: 16810270
This work presents a prototype implementation of a smartphone as secure eID reader using NFC technology. The presented approach…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE