Topics and papers list

1. Trusted Platform Module (TPM) Design

  1. Flicker: An Execution Infrastructure for TCB Minimization - paper
  2. simTPM: User-centric TPM for Mobile Devices - paper
  3. fTPM: A Software-only Implementation of a TPM Chip - paper
  4. vTPM: Virtualizing the Trusted Platform Module - paper

2. Trusted Platform Module (TPM) Vulnerabilities and issues

  1. Bootstrapping Trust in a “Trusted” Platform - paper
  2. TCG Inside? - A Note on TPM Specification Compliance - paper
  3. A hijacker’s guide to communication interfaces of the trusted platform module - paper
  4. Cloaking Malware with the Trusted Platform Module - paper
  5. TPM-FAIL: TPM meets Timing and Lattice Attacks - paper

3. Trust-zone & Trusted Execution Environment (TEE) - Design

  1. BOOMERANG: Exploiting the Semantic Gap in Trusted Execution Environments - paper
  2. SeCReT: Secure Channel between Rich Execution Environment and Trusted Execution Environment - paper
  3. Horizontal Privilege Escalation in Trusted Applications - paper

4. Trust-zone & Trusted Execution Environment (TEE) - Attack

  1. CLKSCREW: Exposing the Perils of Security-Oblivious Energy Management - paper
  2. VoltJockey: Breaching TrustZone by Software-Controlled Voltage Manipulation over Multi-core Frequencies - paper
  3. PARTEMU: Enabling Dynamic Analysis of Real-World TrustZone Software Using Emulation - paper

5. Intel-SGX Design & Usecase

  1. Heterogeneous Isolated Execution for Commodity GPUs - paper
  2. Telekine: Secure Computing with Cloud GPUs - paper
  3. S-FaaS: Trustworthy and Accountable Function-as-a-Service using Intel SGX - paper
  4. SafeKeeper: Protecting Web Passwords using Trusted Execution Environments - paper

6. Intel-SGX Side Channel Attacks

  1. RIDL: Rogue In-Flight Data Load - paper
  2. ZombieLoad: Cross-Privilege-Boundary Data Sampling - paper
  3. FORESHADOW: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution - paper
  4. CacheQuote: Efficiently Recovering Long-term Secrets of SGX EPID via Cache Attacks - paper

7. Intel-SGX Software Vulnerabilities

  1. Hacking in Darkness: Return-oriented Programming against Secure Enclaves - paper
  2. Practical Enclave Malware with Intel SGX - paper
  3. TEEREX: Discovery and Exploitation of Memory Corruption Vulnerabilities in SGX Enclaves - paper

8. AMD-SEV Design & Issues

  1. SEVurity: No Security Without Integrity Breaking Integrity-Free Memory Encryption with Minimal Assumptions - paper
  2. SEVered: Subverting AMD’s Virtual Machine Encryption - paper
  3. Exploiting Unprotected I/O Operations in AMD’s Secure Encrypted Virtualization - paper
  4. Insecure Until Proven Updated: Analyzing AMD SEV’s Remote Attestation - paper

9. RISC-V Keystone Design

  1. Keystone: An Open Framework for Architecting Trusted Execution Environments - paper
  2. CURE: A Security Architecture with CUstomizable and Resilient Enclaves - paper
  3. MI6: Secure Enclaves in a Speculative Out-of-Order Processor - paper

10. Trusted I/O with TEE

  1. Fidelius: Protecting User Secrets from Compromised Browsers - paper
  2. BASTION-SGX: Bluetooth and Architectural Support for Trusted I/O on SGX - paper
  3. SeCloak: ARM Trustzone-based Mobile Peripheral Control - paper
  4. SGXIO: Generic Trusted I/O Path for Intel SGX - paper
Privacy Policy | Legal Notice
If you encounter technical problems, please contact the administrators.