Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 234,976,485 papers from all fields of science
Search
Sign In
Create Free Account
Trusted execution environment
Known as:
AMD PSP
, Tee (disambiguation)
The Trusted Execution Environment (TEE) is a secure area of the main processor of a smart phone (or any connected device including tablets, set-top…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
13 relations
ARM architecture
Common Criteria
FIDO Alliance
Mobile operating system
Expand
Broader (1)
Mobile security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Trusted Execution Environment Provisioning Protocol (teep-p)
David Wheeler
,
Mingliang Pei
,
H. Tschofenig
,
D. Thaler
2019
Corpus ID: 209085143
This document specifies a protocol that installs, updates, and deletes Trusted Applications (TAs) in a device with a Trusted…
Expand
2017
2017
Countermeasure against Side-Channel Attack in Shared Memory of TrustZone
N. Ahn
,
Dong Hoon Lee
arXiv.org
2017
Corpus ID: 5876200
In this paper we introduced countermeasures against side-channel attacks in the shared memory of TrustZone. We proposed zero…
Expand
Review
2017
Review
2017
Trusted Execution Environment and Linux A Survey
Prabhav S
,
M. Deshpande
,
Rakshak R Kamath
,
Rohan N
,
Latha Nr
2017
Corpus ID: 54765880
- Improving security and user integrity in Linux operating system has always been a challenging task. One method of improving…
Expand
2017
2017
Trusted execution environment
詹姆斯·赛贝尔
,
凯文·拉弗兰梅
,
弗雷德·科沙拉
,
赖因哈德·舒马克
,
杰里米·德巴特
2017
Corpus ID: 149952186
A trusted execution environment on a computing device within an enterprise, whether owned by the enterprise or the employee/user…
Expand
2016
2016
Ensuring the Authenticity and Fidelity of Captured Photos Using Trusted Execution and Mobile Application Licensing Capabilities
Kostantinos Papadamou
,
Riginos Samaras
,
Michael Sirivianos
ARES
2016
Corpus ID: 2398091
Mobile devices, which users habitually carry along, have become the main data gateway for the majority of the online services…
Expand
2015
2015
Inspecting data from the safety of your trusted execution environment
John Williams
2015
Corpus ID: 91180480
This paper presents a proof of concept that uses ARM TrustZone to perform introspection of a Linux kernel running in the normal…
Expand
2015
2015
Hardware Support for Cost-Effective System-Level Protection in Multi-core SoCs
Georgios Kornaros
,
I. Christoforakis
,
+4 authors
A. Papagrigoriou
Euromicro Conference on Digital System Design
2015
Corpus ID: 15066541
The increasing adoption of multi-core Systems-on-Chip (SoC) in critical systems has turned security into an important design…
Expand
2015
2015
TAPPS - Trusted Apps for Open Cyber-Physical Systems
C. Prehofer
,
Georgios Kornaros
,
Michele Paolino
International Conference on e-Democracy
2015
Corpus ID: 26493417
Cyber-physical systems (CPS) are devices with sensors and actuators which link the physical with the virtual world. For CPS there…
Expand
2013
2013
VETE: Virtualizing the Trusted Execution Environment
A. Vahidi
,
P. Ekdahl
2013
Corpus ID: 108023214
This document is the final report for the SICS project Virtualizing the Trusted Execution Environment (VETE). This project was…
Expand
2013
2013
Mobile devices as secure eid reader using trusted execution environments
Maximilian Stein
Open Identity Summit
2013
Corpus ID: 16810270
This work presents a prototype implementation of a smartphone as secure eID reader using NFC technology. The presented approach…
Expand