Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,975,568 papers from all fields of science
Search
Sign In
Create Free Account
Trusted execution environment
Known as:
AMD PSP
, Tee (disambiguation)
The Trusted Execution Environment (TEE) is a secure area of the main processor of a smart phone (or any connected device including tablets, set-top…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
13 relations
ARM architecture
Common Criteria
FIDO Alliance
Mobile operating system
Expand
Broader (1)
Mobile security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Exploiting New CPU Extensions for Secure Exchange of eHealth Data at the EU Level
L. Coppolino
,
S. D'Antonio
,
Giovanni Mazzeo
,
L. Romano
,
Luigi Sgaglione
European Dependable Computing Conference
2018
Corpus ID: 53279759
Cross-border healthcare requires that secure mechanisms for patient data exchange among distinct eHealth infrastructures be…
Expand
Review
2017
Review
2017
Trusted Execution Environment and Linux A Survey
Prabhav S
,
Madhav V Deshpande
,
Rakshak R Kamath
,
Rohan N
,
Latha Nr
2017
Corpus ID: 54765880
- Improving security and user integrity in Linux operating system has always been a challenging task. One method of improving…
Expand
2017
2017
Trusted execution environment
詹姆斯·赛贝尔
,
凯文·拉弗兰梅
,
弗雷德·科沙拉
,
赖因哈德·舒马克
,
杰里米·德巴特
2017
Corpus ID: 149952186
A trusted execution environment on a computing device within an enterprise, whether owned by the enterprise or the employee/user…
Expand
2017
2017
Countermeasure against Side-Channel Attack in Shared Memory of TrustZone
N. Ahn
,
Dong Hoon Lee
arXiv.org
2017
Corpus ID: 5876200
In this paper we introduced countermeasures against side-channel attacks in the shared memory of TrustZone. We proposed zero…
Expand
2016
2016
ODIN
Moreno Ambrosin
,
P. Braca
,
M. Conti
,
R. Lazzeretti
ACM Trans. Internet Techn.
2016
Corpus ID: 1546833
The large spread of sensors and smart devices in urban infrastructures are motivating research in the area of the Internet of…
Expand
2015
2015
Inspecting data from the safety of your trusted execution environment
John Williams
2015
Corpus ID: 91180480
This paper presents a proof of concept that uses ARM TrustZone to perform introspection of a Linux kernel running in the normal…
Expand
2015
2015
Hardware Support for Cost-Effective System-Level Protection in Multi-core SoCs
Georgios Kornaros
,
I. Christoforakis
,
+4 authors
A. Papagrigoriou
Euromicro Conference on Digital System Design
2015
Corpus ID: 15066541
The increasing adoption of multi-core Systems-on-Chip (SoC) in critical systems has turned security into an important design…
Expand
2014
2014
Secure video player for mobile devices integrating a watermarking-based tracing mechanism
Pablo Antón del Pino
,
A. Monsifrot
,
Charles Salmon-Legagneur
,
G. Doërr
International Conference on Security and…
2014
Corpus ID: 17657954
Content protection relies on several security mechanisms: (i) encryption to prevent access to the content during transport, (ii…
Expand
2013
2013
VETE: Virtualizing the Trusted Execution Environment
A. Vahidi
,
P. Ekdahl
2013
Corpus ID: 108023214
This document is the final report for the SICS project Virtualizing the Trusted Execution Environment (VETE). This project was…
Expand
2013
2013
Virtualizing on-chip distributed ScratchPad memories for low power and trusted application execution
L. A. Bathen
,
Dongyoun Shin
,
Sung-Soo Lim
,
N. Dutt
Design automation for embedded systems
2013
Corpus ID: 43422672
Emerging multicore platforms are increasingly deploying distributed scratchpad memories to achieve lower energy and area together…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE