Trusted Execution Environments: Properties, Applications, and Challenges

IEEE Security & Privacy(2020)

引用 33|浏览90
暂无评分
摘要
Software attacks on modern computer systems have been a persisting challenge for several decades, leading to a continuous arms race between attacks and defenses. As a first line of defense, operating system kernels enforce process isolation to limit potential attacks to only the code containing the vulnerabilities. However, vulnerabilities in the kernel itself (for example, various vulnerabilities found by Google Project Zero), side-channel attacks,1 or even physical attacks2 can be used to undermine process isolation.
更多
查看译文
关键词
Hardware,Computer hacking,Computer architecture,Encryption,Mobile handsets,Operating systems
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要