共 50 条
- [32] DELEGATEE: Brokered Delegation Using Trusted Execution Environments PROCEEDINGS OF THE 27TH USENIX SECURITY SYMPOSIUM, 2018, : 1387 - 1403
- [33] A framework for application partitioning using trusted execution environments CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (23):
- [34] Fortress: Securing IoT Peripherals with Trusted Execution Environments 39TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, SAC 2024, 2024, : 243 - 250
- [35] BOOMERANG: Exploiting the Semantic Gap in Trusted Execution Environments 24TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2017), 2017,
- [36] Open-TEE is No Longer Virtual: Towards Software-only Trusted Execution Environments Using White-box Cryptography 2019 FIRST IEEE INTERNATIONAL CONFERENCE ON TRUST, PRIVACY AND SECURITY IN INTELLIGENT SYSTEMS AND APPLICATIONS (TPS-ISA 2019), 2019, : 177 - 183
- [37] SafeKeeper: Protecting Web Passwords using Trusted Execution Environments WEB CONFERENCE 2018: PROCEEDINGS OF THE WORLD WIDE WEB CONFERENCE (WWW2018), 2018, : 349 - 358
- [38] Profiling with trust: system monitoring from trusted execution environments Design Automation for Embedded Systems, 2024, 28 : 23 - 44
- [39] Universal Trusted Execution Environments for Securing SDN/NFV Operations 13TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2018), 2019,
- [40] How trusted execution environments fuel research on microarchitectural attacks IEEE Security and Privacy, 2020, 18 (05): : 18 - 27