Results 281 to 290 of about 115,293 (296)
Some of the next articles are maybe not open access.
Trusted Execution Environments: Properties, Applications, and Challenges
IEEE Security & Privacy, 2020Software attacks on modern computer systems have been a persisting challenge for several decades, leading to a continuous arms race between attacks and defenses. As a first line of defense, operating system kernels enforce process isolation to limit potential attacks to only the code containing the vulnerabilities.
Patrick Jauernig+2 more
openaire +2 more sources
Securing a communication channel for the trusted execution environment
Computers & Security, 2019Abstract As a security extension to processor, ARM TrustZone has been widely adopted for various mobile and IoT devices. The protection is conducted by separating the system into two domains: the rich execution environment (REE) and the trusted execution environment (TEE). Although the TEE effectively isolates the critical resources based on hardware
Jinsoo Jang, Brent Byunghoon Kang
openaire +2 more sources
Trusted Execution Environments: A Look under the Hood
2014 2nd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering, 2014Smartphones are now handling personal and extremely important data and applications. This increases mobile environment threats and makes smartphones one of attackers' preferred targets. To mitigate threats, many proposals and counter-measures have been proposed.
Ghada Arfaoui+2 more
openaire +2 more sources
Key Attestation from Trusted Execution Environments
2010Credential platforms implemented on top of Trusted Execution Environments (TrEEs) allow users to store and use their credentials, e.g., cryptographic keys or user passwords, securely. One important requirement for a TrEE-based credential platform is the ability to attest that a credential has been created and is kept within the TrEE.
Alexandra Dmitrienko+4 more
openaire +2 more sources
Credential Disabling from Trusted Execution Environments
2012A generic credential platform realized using a hardware- based trusted execution environment (TrEE) provides a usable and inexpensive way to secure various applications and services. An important requirement for any credential platform is the ability to disable and restore credentials.
Kari Kostiainen+2 more
openaire +2 more sources
A Quantum Computer Trusted Execution Environment
2024 IEEE International Symposium on High-Performance Computer Architecture (HPCA), 2023Theodoros Trochatos+5 more
openaire +1 more source
Trusted Execution Environments im Fahrzeug [PDF]
Jens Köhler, Henry Förster
openaire +1 more source
Trusted Execution Environment for Data Protection in Cloud
2016Cloud Computing has become a major part of all organizations throughout the world because of the services offered such as Iaas, Saas, Paas and wide availability of these services. In spite of the benefits of cloud services they must consider how the security and privacy aspects are ensured, as users are often store some sensitive information with cloud
Podili V. S. Srinivas+2 more
openaire +2 more sources
Trusted Execution Environment and Host Card Emulation
2017Over the years, mobile devices have become increasingly sophisticated in terms of their features and the use cases they operate. This rise in sophistication poses a major security threat because it increases the attack surface of mobile devices. Consequently, the challenge from a security point of view is to offer security assurances for applications ...
Keith Mayes, Assad Umar
openaire +2 more sources
Trusted Execution Environments in Vehicles
ATZelektronik worldwide, 2016Jens Köhler, Henry Förster
openaire +2 more sources