Title
Hardware-assisted Trusted Execution Environments - Look Back, Look Ahead.
Abstract
Over the last two decades, hardware-based isolated execution environments, commonly known as "trusted execution environments" or TEEs, have become widely deployed [1,2,3,4]. However, concerns about vulnerabilities (like the Foreshadow attacks [5]), and potential for abuse have been persistent and have recently become increasingly pronounced. In this talk, I will discuss the history of (mobile) TEEs [6], what motivated their design and large-scale deployment, and how they have evolved during the last two decades. I will then discuss some of their shortcomings and potential approaches for overcoming them. I will also briefly touch on other types of hardware security primitives that are being rolled out by processor manufacturers and the opportunities they offer for securing computing
Year
DOI
Venue
2019
10.1145/3319535.3364969
CCS
Keywords
Field
DocType
Trusted execution environments, hardware-assisted security
Computer security,Computer science,Look-ahead
Conference
ISBN
Citations 
PageRank 
978-1-4503-6747-9
1
0.48
References 
Authors
0
1
Name
Order
Citations
PageRank
N. Asokan12889211.44