Results 281 to 290 of about 115,293 (296)
Some of the next articles are maybe not open access.

Trusted Execution Environments: Properties, Applications, and Challenges

IEEE Security & Privacy, 2020
Software attacks on modern computer systems have been a persisting challenge for several decades, leading to a continuous arms race between attacks and defenses. As a first line of defense, operating system kernels enforce process isolation to limit potential attacks to only the code containing the vulnerabilities.
Patrick Jauernig   +2 more
openaire   +2 more sources

Securing a communication channel for the trusted execution environment

Computers & Security, 2019
Abstract As a security extension to processor, ARM TrustZone has been widely adopted for various mobile and IoT devices. The protection is conducted by separating the system into two domains: the rich execution environment (REE) and the trusted execution environment (TEE). Although the TEE effectively isolates the critical resources based on hardware
Jinsoo Jang, Brent Byunghoon Kang
openaire   +2 more sources

Trusted Execution Environments: A Look under the Hood

2014 2nd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering, 2014
Smartphones are now handling personal and extremely important data and applications. This increases mobile environment threats and makes smartphones one of attackers' preferred targets. To mitigate threats, many proposals and counter-measures have been proposed.
Ghada Arfaoui   +2 more
openaire   +2 more sources

Key Attestation from Trusted Execution Environments

2010
Credential platforms implemented on top of Trusted Execution Environments (TrEEs) allow users to store and use their credentials, e.g., cryptographic keys or user passwords, securely. One important requirement for a TrEE-based credential platform is the ability to attest that a credential has been created and is kept within the TrEE.
Alexandra Dmitrienko   +4 more
openaire   +2 more sources

Credential Disabling from Trusted Execution Environments

2012
A generic credential platform realized using a hardware- based trusted execution environment (TrEE) provides a usable and inexpensive way to secure various applications and services. An important requirement for any credential platform is the ability to disable and restore credentials.
Kari Kostiainen   +2 more
openaire   +2 more sources

A Quantum Computer Trusted Execution Environment

2024 IEEE International Symposium on High-Performance Computer Architecture (HPCA), 2023
Theodoros Trochatos   +5 more
openaire   +1 more source

Trusted Execution Environments im Fahrzeug [PDF]

open access: possibleATZelektronik, 2016
Jens Köhler, Henry Förster
openaire   +1 more source

Trusted Execution Environment for Data Protection in Cloud

2016
Cloud Computing has become a major part of all organizations throughout the world because of the services offered such as Iaas, Saas, Paas and wide availability of these services. In spite of the benefits of cloud services they must consider how the security and privacy aspects are ensured, as users are often store some sensitive information with cloud
Podili V. S. Srinivas   +2 more
openaire   +2 more sources

Trusted Execution Environment and Host Card Emulation

2017
Over the years, mobile devices have become increasingly sophisticated in terms of their features and the use cases they operate. This rise in sophistication poses a major security threat because it increases the attack surface of mobile devices. Consequently, the challenge from a security point of view is to offer security assurances for applications ...
Keith Mayes, Assad Umar
openaire   +2 more sources

Trusted Execution Environments in Vehicles

ATZelektronik worldwide, 2016
Jens Köhler, Henry Förster
openaire   +2 more sources

Home - About - Disclaimer - Privacy