Topics and papers list
1. Trusted Platform Module (TPM) Design
- Flicker: An Execution Infrastructure for TCB Minimization - paper
- simTPM: User-centric TPM for Mobile Devices - paper
- fTPM: A Software-only Implementation of a TPM Chip - paper
- vTPM: Virtualizing the Trusted Platform Module - paper
2. Trusted Platform Module (TPM) Vulnerabilities and issues
- Bootstrapping Trust in a “Trusted” Platform - paper
- TCG Inside? - A Note on TPM Specification Compliance - paper
- A hijacker’s guide to communication interfaces of the trusted platform module - paper
- Cloaking Malware with the Trusted Platform Module - paper
- TPM-FAIL: TPM meets Timing and Lattice Attacks - paper
3. Trust-zone & Trusted Execution Environment (TEE) - Design
- BOOMERANG: Exploiting the Semantic Gap in Trusted Execution Environments - paper
- SeCReT: Secure Channel between Rich Execution Environment and Trusted Execution Environment - paper
- Horizontal Privilege Escalation in Trusted Applications - paper
4. Trust-zone & Trusted Execution Environment (TEE) - Attack
- CLKSCREW: Exposing the Perils of Security-Oblivious Energy Management - paper
-
VoltJockey: Breaching TrustZone by Software-Controlled Voltage Manipulation over Multi-core Frequencies - paper
-
PARTEMU: Enabling Dynamic Analysis of Real-World TrustZone Software Using Emulation - paper
5. Intel-SGX Design & Usecase
- Heterogeneous Isolated Execution for Commodity GPUs - paper
- Telekine: Secure Computing with Cloud GPUs - paper
- S-FaaS: Trustworthy and Accountable Function-as-a-Service using Intel SGX - paper
- SafeKeeper: Protecting Web Passwords using Trusted Execution Environments - paper
6. Intel-SGX Side Channel Attacks
- RIDL: Rogue In-Flight Data Load - paper
- ZombieLoad: Cross-Privilege-Boundary Data Sampling - paper
- FORESHADOW: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution - paper
-
CacheQuote: Efficiently Recovering Long-term Secrets of SGX EPID via Cache Attacks - paper
7. Intel-SGX Software Vulnerabilities
- Hacking in Darkness: Return-oriented Programming against Secure Enclaves - paper
- Practical Enclave Malware with Intel SGX - paper
- TEEREX: Discovery and Exploitation of Memory Corruption Vulnerabilities in SGX Enclaves - paper
8. AMD-SEV Design & Issues
- SEVurity: No Security Without Integrity Breaking Integrity-Free Memory Encryption with Minimal Assumptions - paper
- SEVered: Subverting AMD’s Virtual Machine Encryption - paper
- Exploiting Unprotected I/O Operations in AMD’s Secure Encrypted Virtualization - paper
- Insecure Until Proven Updated: Analyzing AMD SEV’s Remote Attestation - paper
9. RISC-V Keystone Design
- Keystone: An Open Framework for Architecting Trusted Execution Environments - paper
- CURE: A Security Architecture with CUstomizable and Resilient Enclaves - paper
- MI6: Secure Enclaves in a Speculative Out-of-Order Processor - paper
10. Trusted I/O with TEE