共 50 条
- [31] BOOMERANG: Exploiting the Semantic Gap in Trusted Execution Environments 24TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2017), 2017,
- [32] Making Malory Behave Maliciously: Targeted Fuzzing of Android Execution Environments 2017 IEEE/ACM 39TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE), 2017, : 300 - 311
- [33] SafeKeeper: Protecting Web Passwords using Trusted Execution Environments WEB CONFERENCE 2018: PROCEEDINGS OF THE WORLD WIDE WEB CONFERENCE (WWW2018), 2018, : 349 - 358
- [34] SYSTEMATIZATION OF TRUSTED I/O SOLUTIONS FOR ISOLATED EXECUTION ENVIRONMENTS UPB Scientific Bulletin, Series C: Electrical Engineering and Computer Science, 2022, 84 (02): : 3 - 14
- [35] How trusted execution environments fuel research on microarchitectural attacks IEEE Security and Privacy, 2020, 18 (05): : 18 - 27
- [36] Profiling with trust: system monitoring from trusted execution environments Design Automation for Embedded Systems, 2024, 28 : 23 - 44
- [37] Universal Trusted Execution Environments for Securing SDN/NFV Operations 13TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2018), 2019,