Academic literature on the topic 'Trusted Execution Environment (TEE)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Trusted Execution Environment (TEE).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Trusted Execution Environment (TEE)"

1

Wen, Sheng, Liam Xu, Liwei Tian, Suping Liu, and Yong Ding. "TeeDFuzzer: Fuzzing Trusted Execution Environment." Electronics 14, no. 8 (2025): 1674. https://doi.org/10.3390/electronics14081674.

Full text
Abstract:
The Trusted Execution Environment (TEE) is crucial for safeguarding the ecosystem of embedded systems. It uses isolation to minimize the TCB (Trusted Computing Base) and protect sensitive software. It is vital because devices handle vast, potentially sensitive data. Leveraging ARM TrustZone, widely used in mobile and IoT for TEEs, it ensures hardware protection via security extensions, though needing firmware and software stack support. Despite the reputation of TEEs for high security, TrustZone-aided ones have vulnerabilities. Fuzzing, as a practical bug-finding technique, has seen limited re
APA, Harvard, Vancouver, ISO, and other styles
2

Liu, Yanling, and Yun Li. "The Current Situation and Trends of Trusted Execution Environment Applications." Proceedings of Business and Economic Studies 8, no. 2 (2025): 121–26. https://doi.org/10.26689/pbes.v8i2.10296.

Full text
Abstract:
With the rapid development of digital technologies such as big data, cloud computing, and the Internet of Things (IoT), data security and privacy protection have become the core challenges facing modern computing systems. Traditional security mechanisms are difficult to effectively deal with advanced adversarial attacks due to their reliance on a centralized trust model. In this context, the Trusted Execution Environment (TEE), as a hardware-enabled secure isolation technology, offers a potential solution to protect sensitive computations and data. This paper systematically discusses TEE’s tec
APA, Harvard, Vancouver, ISO, and other styles
3

Subramanyan, Bala. "Object Capability Model for Tee: A Cheri Based Compartmentalization Approach." International Journal of Security, Privacy and Trust Management 12, no. 3/4 (2023): 23–30. http://dx.doi.org/10.5121/ijsptm.2023.12402.

Full text
Abstract:
In this paper, we introduce a capability-driven approach to bolster security and granularity within Trusted Execution Environments (TEEs) [1]. By delivering precise privilege control and fine-grained compartmentalization, we aim to improve TEE security standards. To address vulnerabilities within Trusted Execution Environments (TEEs) and enable selective privilege management and secure object sharing between secure and normal worlds, we introduce a TEE compartmentalization framework based on the CHERI object-capability model. Leveraging DSbD technologies, our framework provides an efficient pr
APA, Harvard, Vancouver, ISO, and other styles
4

Abhilash, Kayyidavazhiyil, and Kaipacheri Sheena. "Trusted Execution Environments for Internet of Things Devices." International Journal of Innovative Technology and Exploring Engineering (IJITEE) 11, no. 6 (2022): 45–48. https://doi.org/10.35940/ijitee.F9885.0511622.

Full text
Abstract:
<strong>Abstract: </strong>A trusted execution Environment (TEE) could be a comfy place of a computer&rsquo;s essential processor that&#39;s designed to shield the most touchy information and operations. TEEs are utilized in an expansion of applications, which incorporates cell gadgets, price processing, and statistics safety. The usage of TEEs is becoming increasingly crucial because the amount of touchy records that are processed and stored electronically continues to develop. TEEs can help guard statistics from being accessed or changed with the resource of unauthorised customers, and can a
APA, Harvard, Vancouver, ISO, and other styles
5

Liao, Jia, Baihui Jiang, Peng Zhao, Lei Ning, and Liming Chen. "Unmanned Aerial Vehicle-Assisted Federated Learning Method Based on a Trusted Execution Environment." Electronics 12, no. 18 (2023): 3938. http://dx.doi.org/10.3390/electronics12183938.

Full text
Abstract:
In the face of increasing concerns around privacy and security in the use of unmanned aerial vehicles (UAVs) for mobile edge computing (MEC), this study proposes a novel approach to secure UAV-assisted federated learning. This research integrates a trusted execution environment (TEE) into UAV-assisted federated learning and proposes a robust aggregation algorithm based on cosine distance, denoted as CosAvg. This study further designs and evaluates a TEE-based federated learning model, comparing its resource overhead with other secure aggregation frameworks, like homomorphic encryption (HE) and
APA, Harvard, Vancouver, ISO, and other styles
6

Zhu, Hongyu, Yubo Song, Yang Li, et al. "Mitigating Randomness Leakage in SM2 White-Box Implementations via Trusted Execution Environments." Electronics 14, no. 2 (2025): 301. https://doi.org/10.3390/electronics14020301.

Full text
Abstract:
White-box cryptography plays a vital role in untrusted environments where attackers can fully access the execution process and potentially expose cryptographic keys. It secures keys by embedding them within complex and obfuscated transformations, such as lookup tables and algebraic manipulations. However, existing white-box protection schemes for SM2 signatures face vulnerabilities, notably random number leakage, which compromises key security and diminishes overall effectiveness. This paper proposes an improved white-box implementation of the SM2 signature computation leveraging a Trusted Exe
APA, Harvard, Vancouver, ISO, and other styles
7

Liu, Xiaoqing, Yingxu Lai, Jing Liu, and Shiyao Luo. "TZEAMM: An Efficient and Secure Active Measurement Method Based on TrustZone." Security and Communication Networks 2023 (January 31, 2023): 1–18. http://dx.doi.org/10.1155/2023/6921960.

Full text
Abstract:
With the rapid development of computer and communication technology, embedded systems are widely used in smart devices. The increasing connectivity of these systems and the difficulties in providing comprehensive security have made such devices vulnerable to malicious attacks. Passive defense technologies and traffic-based intrusion detection technologies are not fully effective against such attacks. Trusted execution environment (TEE) technology can ensure system security against unknown attacks to some extent. Most researchers use TrustZone to implement TEE. However, the problem is that the
APA, Harvard, Vancouver, ISO, and other styles
8

Kato, Fumiyuki, Yang Cao, and Masatoshi Yoshikawa. "Olive: Oblivious Federated Learning on Trusted Execution Environment against the Risk of Sparsification." Proceedings of the VLDB Endowment 16, no. 10 (2023): 2404–17. http://dx.doi.org/10.14778/3603581.3603583.

Full text
Abstract:
Combining Federated Learning (FL) with a Trusted Execution Environment (TEE) is a promising approach for realizing privacy-preserving FL, which has garnered significant academic attention in recent years. Implementing the TEE on the server side enables each round of FL to proceed without exposing the client's gradient information to untrusted servers. This addresses usability gaps in existing secure aggregation schemes as well as utility gaps in differentially private FL. However, to address the issue using a TEE, the vulnerabilities of server-side TEEs need to be considered---this has not bee
APA, Harvard, Vancouver, ISO, and other styles
9

Pereira, Sérgio, Tiago Gomes, Jorge Cabral, and Sandro Pinto. "TREE: Bridging the gap between reconfigurable computing and secure execution." IACR Transactions on Cryptographic Hardware and Embedded Systems 2025, no. 3 (2025): 115–38. https://doi.org/10.46586/tches.v2025.i3.115-138.

Full text
Abstract:
Trusted Execution Environments (TEEs) have become a pivotal technology for securing a wide spectrum of security-sensitive applications. With modern computing systems shifting to heterogeneous architectures, integrating TEE support into these systems is paramount. One promising line of research has proposed leveraging FPGA technology to provide promising TEE solutions. Despite their potential, current implementations of FPGA-based TEEs have a set of drawbacks. Some solutions (i.e., MeetGo and ShEF) prioritize the secure loading of reconfigurable modules but lack compatibility with established l
APA, Harvard, Vancouver, ISO, and other styles
10

Kieu-Do-Nguyen, Binh, Khai-Duy Nguyen, Tuan-Kiet Dang, et al. "A Trusted Execution Environment RISC-V System-on-Chip Compatible with Transport Layer Security 1.3." Electronics 13, no. 13 (2024): 2508. http://dx.doi.org/10.3390/electronics13132508.

Full text
Abstract:
The Trusted Execution Environment (TEE) is designed to establish a safe environment that prevents the execution of unauthenticated programs. The nature of TEE is a continuous verification process with hashing, signing, and verifying. Such a process is called the Chain-of-Trust, derived from the Root-of-Trust (RoT). Typically, the RoT is pre-programmed, hard-coded, or embedded in hardware, which is locally produced and checked before booting. The TEE employs various cryptographic processes throughout the boot process to verify the authenticity of the bootloader. It also validates other sensitiv
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Trusted Execution Environment (TEE)"

1

Da, Silva Mathieu. "Securing a trusted hardware environment (Trusted Execution Environment)." Thesis, Montpellier, 2018. http://www.theses.fr/2018MONTS053/document.

Full text
Abstract:
Ce travail de thèse a pour cadre le projet Trusted Environment Execution eVAluation (TEEVA) (projet français FUI n°20 de Janvier 2016 à Décembre 2018) qui vise à évaluer deux solutions alternatives de sécurisation des plateformes mobiles, l’une est purement logicielle, la Whitebox Crypto, alors que l’autre intègre des éléments logiciels et matériels, le Trusted Environment Execution (TEE). Le TEE s’appuie sur la technologie TrustZone d’ARM disponible sur de nombreux chipsets du marché tels que des smartphones et tablettes Android. Cette thèse se concentre sur l’architecture TEE, l’objectif éta
APA, Harvard, Vancouver, ISO, and other styles
2

Cole, Nigel. "Arguing Assurance in Trusted Execution Environments using Goal Structuring Notation." Thesis, Linköpings universitet, Programvara och system, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-177923.

Full text
Abstract:
A trusted execution environment (TEE) is an isolated environment used for trusted execution. TEE solutions are usually proprietary and specific for a certain hardware specification, thereby limiting developers that use those TEEs. A potential solution to this issue is the use of open-source alternatives such as the TEE framework Keystone and the Reduced Instruction Set Computer V (RISC-V) hardware. These alternatives are rather young and are not as well established as the variants developed by ARM and Intel. To this end, the assurance in Keystone and RISC-V are analysed by studying a remote at
APA, Harvard, Vancouver, ISO, and other styles
3

Sundblad, Anton, and Gustaf Brunberg. "Secure hypervisor versus trusted execution environment : Security analysis for mobile fingerprint identification applications." Thesis, Linköpings universitet, Databas och informationsteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-139227.

Full text
Abstract:
Fingerprint identification is becoming increasingly popular as a means of authentication for handheld devices of different kinds. In order to secure such an authentication solution it is common to use a TEE implementation. This thesis examines the possibility of replacing a TEE with a hypervisor-based solution instead, with the intention of keeping the same security features that a TEE can offer. To carry out the evaluation a suitable method is constructed. This method makes use of fault trees to be able to find possible vulnerabilities in both systems, and these vulnerabilities are then docum
APA, Harvard, Vancouver, ISO, and other styles
4

Dhar, Siddharth. "Optimizing TEE Protection by Automatically Augmenting Requirements Specifications." Thesis, Virginia Tech, 2020. http://hdl.handle.net/10919/98730.

Full text
Abstract:
An increasing number of software systems must safeguard their confidential data and code, referred to as critical program information (CPI). Such safeguarding is commonly accomplished by isolating CPI in a trusted execution environment (TEE), with the isolated CPI becoming a trusted computing base (TCB). TEE protection incurs heavy performance costs, as TEE-based functionality is expensive to both invoke and execute. Despite these costs, projects that use TEEs tend to have unnecessarily large TCBs. As based on our analysis, developers often put code and data into TEE for convenience rather tha
APA, Harvard, Vancouver, ISO, and other styles
5

Lim, Steven. "Recommending TEE-based Functions Using a Deep Learning Model." Thesis, Virginia Tech, 2021. http://hdl.handle.net/10919/104999.

Full text
Abstract:
Trusted execution environments (TEEs) are an emerging technology that provides a protected hardware environment for processing and storing sensitive information. By using TEEs, developers can bolster the security of software systems. However, incorporating TEE into existing software systems can be a costly and labor-intensive endeavor. Software maintenance—changing software after its initial release—is known to contribute the majority of the cost in the software development lifecycle. The first step of making use of a TEE requires that developers accurately identify which pieces of code would
APA, Harvard, Vancouver, ISO, and other styles
6

Moghimi, Ahmad. "Side-Channel Attacks on Intel SGX: How SGX Amplifies The Power of Cache Attack." Digital WPI, 2017. https://digitalcommons.wpi.edu/etd-theses/399.

Full text
Abstract:
In modern computing environments, hardware resources are commonly shared, and parallel computation is more widely used. Users run their services in parallel on the same hardware and process information with different confidentiality levels every day. Running parallel tasks can cause privacy and security problems if proper isolation is not enforced. Computers need to rely on a trusted root to protect the data from malicious entities. Intel proposed the Software Guard eXtension (SGX) to create a trusted execution environment (TEE) within the processor. SGX allows developers to benefit from the h
APA, Harvard, Vancouver, ISO, and other styles
7

Arfaoui, Ghada. "Conception de protocoles cryptographiques préservant la vie privée pour les services mobiles sans contact." Thesis, Orléans, 2015. http://www.theses.fr/2015ORLE2013/document.

Full text
Abstract:
Avec l'émergence de nouvelles technologies telles que le NFC (Communication à champ proche) et l'accroissement du nombre de plates-formes mobiles, les téléphones mobiles vont devenir de plus en plus indispensables dans notre vie quotidienne. Ce contexte introduit de nouveaux défis en termes de sécurité et de respect de la vie privée. Dans cette thèse, nous nous focalisons sur les problématiques liées au respect de la vie privée dans les services NFC ainsi qu’à la protection des données privées et secrets des applications mobiles dans les environnements d'exécution de confiance (TEE). Nous four
APA, Harvard, Vancouver, ISO, and other styles
8

Li, Jiatong. "TLS Library for Isolated Enclaves : Optimizing the performance of TLS libraries for SGX." Thesis, KTH, Kommunikationssystem, CoS, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-241245.

Full text
Abstract:
Nowadays cloud computing systems handle large amounts of data and process this data across different systems. It is essential to considering data security vulnerabilities and data protection. One means of decreasing security vulnerabilities is to partition the code into distinct modules and then isolate the execution of the code together with its data. Intel’s Software Guard Extension (SGX) provides security critical code isolation in an enclave. By isolating the code’s execution from an untrusted zone (an unprotected user platform), code integrity and confidentiality are ensured. Transport La
APA, Harvard, Vancouver, ISO, and other styles
9

Zhang, Ning. "Attack and Defense with Hardware-Aided Security." Diss., Virginia Tech, 2016. http://hdl.handle.net/10919/72855.

Full text
Abstract:
Riding on recent advances in computing and networking, our society is now experiencing the evolution into the age of information. While the development of these technologies brings great value to our daily life, the lucrative reward from cyber-crimes has also attracted criminals. As computing continues to play an increasing role in the society, security has become a pressing issue. Failures in computing systems could result in loss of infrastructure or human life, as demonstrated in both academic research and production environment. With the continuing widespread of malicious software and new
APA, Harvard, Vancouver, ISO, and other styles
10

Elbashir, Khalid. "Trusted Execution Environments for Open vSwitch : A security enabler for the 5G mobile network." Thesis, KTH, Radio Systems Laboratory (RS Lab), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-218070.

Full text
Abstract:
The advent of virtualization introduced the need for virtual switches to interconnect virtual machines deployed in a cloud infrastructure. With Software Defined Networking (SDN), a central controller can configure these virtual switches. Virtual switches execute on commodity operating systems. Open vSwitch is an open source project that is widely used in production cloud environments. If an adversary gains access with full privileges to the operating system hosting the virtual switch, then Open vSwitch becomes vulnerable to a variety of different attacks that could compromise the whole network
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Trusted Execution Environment (TEE)"

1

Groscurth, Chris R. Future-Ready Leadership. ABC-CLIO, LLC, 2018. http://dx.doi.org/10.5040/9798400655357.

Full text
Abstract:
Provides executive leadership teams with information, tools, and advice they need to lead their organizations into the "future of work," characterized by transformative, smart, and connected technologies already under way, including artificial intelligence, the Internet of things, and automation. The technological and economic forces of the fourth industrial revolution (4IR) are shifting organizations in radical new directions. Automation is taking place not only in factories but in retail environments, and it is not just powerful or precise: it is intelligent, and it learns. Leaders must lear
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Trusted Execution Environment (TEE)"

1

Yu, Geunyeol, Seunghyun Chae, Kyungmin Bae, and Sungkun Moon. "Formal Specification of Trusted Execution Environment APIs." In Fundamental Approaches to Software Engineering. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-57259-3_5.

Full text
Abstract:
AbstractTrusted execution environments (TEEs) have emerged as a key technology in the cybersecurity domain. A TEE provides an isolated environment in which sensitive computations can be executed securely. Trusted applications running in TEEs are developed using standardized APIs that many hardware platforms for TEE adhere to. However, formal models tailored to standard TEE APIs are not well developed. In this paper, we present a formal specification of TEE APIs using Maude. We focus on Trusted Storage API and Cryptographic Operations API, which are foundational to mobile and IoT applications.
APA, Harvard, Vancouver, ISO, and other styles
2

Nagy, Roland, Márton Bak, Dorottya Papp, and Levente Buttyán. "T-RAID: TEE-based Remote Attestation for IoT Devices." In Communications in Computer and Information Science. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-09357-9_7.

Full text
Abstract:
AbstractThe Internet of Things (IoT) consists of network-connected embedded devices that enable a multitude of new applications, but also create new risks. In particular, embedded IoT devices can be infected by malware. Operators of IoT systems not only need malware detection tools, but also scalable methods to reliably and remotely verify malware freedom of their IoT devices. In this paper, we address this problem by proposing T-RAID, a remote attestation scheme for IoT devices that takes advantage of the security guarantees provided by a Trusted Execution Environment running on each device.
APA, Harvard, Vancouver, ISO, and other styles
3

Vo, Viet. "Memory-Efficient Encrypted Search Using Trusted Execution Environment." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-91424-0_20.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Liu, Bingyu, Shangyu Xie, and Yuan Hong. "Efficient and Private Divisible Double Auction in Trusted Execution Environment." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-80851-8_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Keerup, Kalmer, Dan Bogdanov, Baldur Kubo, and Per Gunnar Auran. "Privacy-Preserving Analytics, Processing and Data Management." In Big Data in Bioeconomy. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-71069-9_12.

Full text
Abstract:
AbstractTypically, data cannot be shared among competing organizations due to confidentiality or regulatory restrictions. We present several technological alternatives to solve the problem: secure multi-party computation (MPC), trusted execution environments (TEE) and multi-key fully homomorphic encryption (MKFHE). We compare these privacy-enhancing technologies from deployment and performance point of view and explain how we selected technology and machine learning methods. We introduce a demonstrator built in the DataBio project for securely combining private and public data for planning of
APA, Harvard, Vancouver, ISO, and other styles
6

Yao, Jiewen, and Vincent Zimmer. "Trusted Execution Environment." In Building Secure Firmware. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6106-4_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sommerhalder, Maria. "Trusted Execution Environment." In Trends in Data Protection and Encryption Technologies. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-33386-6_18.

Full text
Abstract:
AbstractTrusted execution environments are secure areas of central processors or devices that execute code with higher security than the rest of the device. Security is provided by encrypted memory regions called enclaves. Because the environment is isolated from the rest of the device, it is not affected by infection or compromise of the device. Trusted execution environments have applications for different usages, such as mobile phones, cloud data processing, or cryptocurrencies. Furthermore, since Trusted execution environments are part of a standard chipset, this inexpensive technology can
APA, Harvard, Vancouver, ISO, and other styles
8

Thiem, Xaver, Holger Rudolph, Robert Krahn, Steffen Ihlenfeldt, Christof Fetzer, and Jens Müller. "Adaptive Thermal Model for Structure Model Based Correction." In Lecture Notes in Production Engineering. Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-34486-2_6.

Full text
Abstract:
AbstractThis paper discusses structure model based correction of thermal induced errors at machine tools. Using a machine model evaluated in thermal real-time, the thermal induced errors at the tool center point (TCP) are calculated based on information gotten from the machine control (e.g., axes velocities, positions, and motor currents) and ambient temperature. The machine model describes the physical relationships and considers the structure and structural variability resulting in traverse movements of the feed axes – the so-called structure model. To create this, finite elements are used a
APA, Harvard, Vancouver, ISO, and other styles
9

Umar, Assad, and Keith Mayes. "Trusted Execution Environment and Host Card Emulation." In Smart Cards, Tokens, Security and Applications. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-50500-8_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Goretti, Valerio, Davide Basile, Luca Barbaro, and Claudio Di Ciccio. "Trusted Execution Environment for Decentralized Process Mining." In Advanced Information Systems Engineering. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-61057-8_30.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Trusted Execution Environment (TEE)"

1

Kuang, Ruixue, Lianhai Wang, Shuhui Zhang, Shujiang Xu, Wei Shao, and Qizheng Wang. "Detection method of trusted blockchain link flood attack based on trusted execution environment." In 2023 11th International Conference on Information Technology: IoT and Smart City (ITIoTSC). IEEE, 2023. http://dx.doi.org/10.1109/itiotsc60379.2023.00034.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kieu-Do-Nguyen, Binh, Khai-Duy Nguyen, Tuan-Kiet Dang, Cong-Kha Pham, and Trong-Thuc Hoang. "A Trusted Execution Environment RISC-V System on Chip." In 2024 IEEE Hot Chips 36 Symposium (HCS). IEEE, 2024. http://dx.doi.org/10.1109/hcs61935.2024.10664993.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Goes, Cristiano, Janislley Sousa, João Bezerra Neto, and Ewerton Andrade. "Key-Encapsulation Mechanisms Embedded in Trusted Execution Environment: An Evaluation." In 2025 IEEE International Conference on Consumer Electronics (ICCE). IEEE, 2025. https://doi.org/10.1109/icce63647.2025.10929991.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

JAYET, Quentin, Christine HENNEBERT, Yann KIEFFER, and Vincent BEROULLE. "Embedded Elapsed Time Techniques in Trusted Execution Environment for Lightweight Blockchain." In 2024 IEEE International Conference on Blockchain (Blockchain). IEEE, 2024. http://dx.doi.org/10.1109/blockchain62396.2024.00020.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Pun, Tsz Ho, Yi Jun He, and Chung Dak Shum. "Strengthening Fault Tolerance of Private/Consortium Blockchain with Trusted Execution Environment." In 2024 International Conference on Sustainable Technology and Engineering (i-COSTE). IEEE, 2024. https://doi.org/10.1109/i-coste63786.2024.11024869.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Zhao, Ziming, Md Armanuzzaman, Xi Tan, and Zheyuan Ma. "Trusted Execution Environments in Embedded and IoT Systems: A CactiLab Perspective." In 2024 International Symposium on Secure and Private Execution Environment Design (SEED). IEEE, 2024. http://dx.doi.org/10.1109/seed61283.2024.00020.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Liu, Tong, Zhen Huang, Jiaao Li, Jianyu Niu, Guoxing Chen, and Yinqian Zhang. "SoK: Opportunities for Accelerating Multi - Party Computation via Trusted Hardware." In 2024 International Symposium on Secure and Private Execution Environment Design (SEED). IEEE, 2024. http://dx.doi.org/10.1109/seed61283.2024.00024.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Wang, Qian, Brian Lee, and Yuansong Qiao. "Support Remote Attestation for Decentralized Robot Operating System (ROS) using Trusted Execution Environment." In 2024 IEEE International Conference on Blockchain and Cryptocurrency (ICBC). IEEE, 2024. http://dx.doi.org/10.1109/icbc59979.2024.10634382.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kline, Jonathan. "HIGH PERFORMANCE TRUSTED EXECUTION ENVIRONMENT." In 2024 NDIA Michigan Chapter Ground Vehicle Systems Engineering and Technology Symposium. National Defense Industrial Association, 2024. http://dx.doi.org/10.4271/2024-01-3766.

Full text
Abstract:
&lt;title&gt;ABSTRACT&lt;/title&gt; &lt;p&gt;This paper explores the construction of a Trusted Execution Environment (TEE) which doesn’t rely on TrustZone or specific processing modes in order to achieve a high-performance operating environment with multiple layers of hardware enforced confidentiality and integrity. The composed TEE uses hardware intellectual property (IP) blocks, existing hardware-level protections, a hypervisor, Linux security module (LSM), and Linux kernel capabilities including a file system in order to provide the performance and multiple layers of confidentiality and int
APA, Harvard, Vancouver, ISO, and other styles
10

McGillion, Brian, Tanel Dettenborn, Thomas Nyman, and N. Asokan. "Open-TEE -- An Open Virtual Trusted Execution Environment." In 2015 IEEE Trustcom/BigDataSE/ISPA. IEEE, 2015. http://dx.doi.org/10.1109/trustcom.2015.400.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Trusted Execution Environment (TEE)"

1

Pei, M., H. Tschofenig, D. Thaler, and D. Wheeler. Trusted Execution Environment Provisioning (TEEP) Architecture. RFC Editor, 2023. http://dx.doi.org/10.17487/rfc9397.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ambiel, Suzanne. The Case for Confidential Computing: Delivering Business Value Through Protected, Confidential Data Processing. The Linux Foundation, 2024. https://doi.org/10.70828/iynl6589.

Full text
Abstract:
As the collection, storage, and analysis of data becomes increasingly important across industries, businesses are looking for solutions that keep data secure and processes compliant with regulations. Confidential computing is one of these solutions, involving the use of a trusted execution environment that runs on shared infrastructure but processes data away from unauthorized users. This use case report interviewed members of the confidential computing community on the ways they have implemented the technology and what they believe its future holds. The report looks at the use of confidential
APA, Harvard, Vancouver, ISO, and other styles
3

Alonso, Pablo, Basil Kavalsky, Jose Ignacio Sembler, et al. How is the IDB Serving Higher-Middle-Income Countries?: Borrowers' Perspective. Inter-American Development Bank, 2013. http://dx.doi.org/10.18235/0010547.

Full text
Abstract:
This evaluation assesses how well IDB's current mode of engagement meets the needs and expectations of countries that have relatively higher income levels and increasing access to diverse funding sources.For the purpose of this evaluation OVE selected 10 countries as case study countries using three objective indicators: (a) income level, (b) level of access to international financial markets, and (c) the weight of the country in IDB's lending portfolio. The countries, labeled higher middle income countries (HMICs) in this evaluation, are Argentina, Brazil, Chile, Colombia, Mexico, Panama, Per
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!