Trusted Execution Environments: Properties, Applications, and Challenges
暂无分享,去创建一个
Emmanuel Stapf | Patrick Jauernig | Ahmad-Reza Sadeghi | A. Sadeghi | Patrick Jauernig | Emmanuel Stapf
[1] Weidong Shi,et al. A comparison study of intel SGX and AMD memory encryption technology , 2018, HASP@ISCA.
[2] Srinivas Devadas,et al. Sanctum: Minimal Hardware Extensions for Strong Software Isolation , 2016, USENIX Security Symposium.
[3] Ahmad-Reza Sadeghi,et al. SANCTUARY: ARMing TrustZone with User-space Enclaves , 2019, NDSS.
[4] Frank Piessens,et al. A Systematic Evaluation of Transient Execution Attacks and Defenses , 2018, USENIX Security Symposium.
[5] Jeyavijayan Rajendran,et al. HardFails: Insights into Software-Exploitable Hardware Bugs , 2019, USENIX Security Symposium.
[6] Srdjan Capkun,et al. Software Grand Exposure: SGX Cache Attacks Are Practical , 2017, WOOT.