共 50 条
- [21] Obscuro: A Bitcoin Mixer using Trusted Execution Environments 34TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2018), 2018, : 692 - 701
- [22] Keystone: An Open Framework for Architecting Trusted Execution Environments PROCEEDINGS OF THE FIFTEENTH EUROPEAN CONFERENCE ON COMPUTER SYSTEMS (EUROSYS'20), 2020,
- [23] SeRoT: A Secure Runtime System on Trusted Execution Environments 2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 30 - 37
- [24] Remote Attestation Assurance Arguments for Trusted Execution Environments PROCEEDINGS OF THE 2023 ACM WORKSHOP ON SECURE AND TRUSTWORTHY CYBER-PHYSICAL SYSTEMS, SAT-CPS 2023, 2023, : 33 - 42
- [26] DELEGATEE: Brokered Delegation Using Trusted Execution Environments PROCEEDINGS OF THE 27TH USENIX SECURITY SYMPOSIUM, 2018, : 1387 - 1403
- [27] A framework for application partitioning using trusted execution environments CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (23):
- [28] Fortress: Securing IoT Peripherals with Trusted Execution Environments 39TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, SAC 2024, 2024, : 243 - 250
- [29] BOOMERANG: Exploiting the Semantic Gap in Trusted Execution Environments 24TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2017), 2017,
- [30] SafeKeeper: Protecting Web Passwords using Trusted Execution Environments WEB CONFERENCE 2018: PROCEEDINGS OF THE WORLD WIDE WEB CONFERENCE (WWW2018), 2018, : 349 - 358