On Making Emerging Trusted Execution Environments Accessible to Developers

被引:3
|
作者
Nyman, Thomas [1 ]
McGillion, Brian [1 ]
Asokan, N. [2 ,3 ]
机构
[1] Aalto Univ, ICRI SC, Espoo, Finland
[2] Aalto Univ, Espoo, Finland
[3] Univ Helsinki, Helsinki, Finland
关键词
D O I
10.1007/978-3-319-22846-4_4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
New types of Trusted Execution Environment (TEE) architectures like TrustLite and Intel Software Guard Extensions (SGX) are emerging. They bring new features that can lead to innovative security and privacy solutions. But each new TEE environment comes with its own set of interfaces and programming paradigms, thus raising the barrier for entry for developers who want to make use of these TEEs. In this paper, we motivate the need for realizing standard TEE interfaces on such emerging TEE architectures and show that this exercise is not straightforward. We report on our on-going work in mapping GlobalPlatform standard interfaces to TrustLite and SGX.
引用
收藏
页码:58 / 67
页数:10
相关论文
共 50 条
  • [41] Preliminary Study of Trusted Execution Environments on Heterogeneous Edge Platforms
    Ning, Zhenyu
    Liao, Jinghui
    Zhang, Fengwei
    Shi, Weisong
    2018 THIRD IEEE/ACM SYMPOSIUM ON EDGE COMPUTING (SEC), 2018, : 421 - 426
  • [42] A Secure IIoT Gateway Architecture based on Trusted Execution Environments
    Antônio Augusto Fröhlich
    Leonardo Passig Horstmann
    José Luis Conradi Hoffmann
    Journal of Network and Systems Management, 2023, 31
  • [43] SoK: Understanding Designs Choices and Pitfalls of Trusted Execution Environments
    Li, Mengyuan
    Yang, Yuheng
    Chen, Guoxing
    Yan, Mengjia
    Zhang, Yinqian
    PROCEEDINGS OF THE 19TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, ACM ASIACCS 2024, 2024, : 1600 - 1616
  • [44] How Trusted Execution Environments Fuel Research on Microarchitectural Attacks
    Schwarz, Michael
    Gruss, Daniel
    IEEE SECURITY & PRIVACY, 2020, 18 (05) : 18 - 27
  • [45] Formal Verification of Virtualization-Based Trusted Execution Environments
    Witharana, Hasini
    Weerasena, Hansika
    Mishra, Prabhat
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2024, 43 (11) : 4262 - 4273
  • [46] Secret Sharing in Pub/Sub Using Trusted Execution Environments
    Munster, Javier
    Jacobsen, Hans-Arno
    DEBS'18: PROCEEDINGS OF THE 12TH ACM INTERNATIONAL CONFERENCE ON DISTRIBUTED AND EVENT-BASED SYSTEMS, 2018, : 28 - 39
  • [47] Mitigating Adversarial Attacks in Federated Learning with Trusted Execution Environments
    Queyrut, Simon
    Schiavoni, Valerio
    Felber, Pascal
    2023 IEEE 43RD INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, ICDCS, 2023, : 626 - 637
  • [48] Building Your Own Trusted Execution Environments Using FPGA
    Armanuzzaman, Md
    Sadeghi, Ahmad-Reza
    Zhao, Ziming
    PROCEEDINGS OF THE 19TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, ACM ASIACCS 2024, 2024, : 1584 - 1599
  • [49] SYSTEMATIZATION OF TRUSTED I/O SOLUTIONS FOR ISOLATED EXECUTION ENVIRONMENTS
    Stancu, Florin-Alexandru
    Mircea, Alexandru-Alin
    Rughinis, Razvan
    Chiroiu, Mihai
    UNIVERSITY POLITEHNICA OF BUCHAREST SCIENTIFIC BULLETIN SERIES C-ELECTRICAL ENGINEERING AND COMPUTER SCIENCE, 2022, 84 (02): : 3 - 14
  • [50] Revisiting the Design of Parallel Stream Joins on Trusted Execution Environments
    Meftah, Souhail
    Zhang, Shuhao
    Veeravalli, Bharadwaj
    Aung, Khin Mi Mi
    ALGORITHMS, 2022, 15 (06)