To see the other types of publications on this topic, follow the link: Trusted Execution Environment (TEE).

Journal articles on the topic 'Trusted Execution Environment (TEE)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Trusted Execution Environment (TEE).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Wen, Sheng, Liam Xu, Liwei Tian, Suping Liu, and Yong Ding. "TeeDFuzzer: Fuzzing Trusted Execution Environment." Electronics 14, no. 8 (2025): 1674. https://doi.org/10.3390/electronics14081674.

Full text
Abstract:
The Trusted Execution Environment (TEE) is crucial for safeguarding the ecosystem of embedded systems. It uses isolation to minimize the TCB (Trusted Computing Base) and protect sensitive software. It is vital because devices handle vast, potentially sensitive data. Leveraging ARM TrustZone, widely used in mobile and IoT for TEEs, it ensures hardware protection via security extensions, though needing firmware and software stack support. Despite the reputation of TEEs for high security, TrustZone-aided ones have vulnerabilities. Fuzzing, as a practical bug-finding technique, has seen limited re
APA, Harvard, Vancouver, ISO, and other styles
2

Liu, Yanling, and Yun Li. "The Current Situation and Trends of Trusted Execution Environment Applications." Proceedings of Business and Economic Studies 8, no. 2 (2025): 121–26. https://doi.org/10.26689/pbes.v8i2.10296.

Full text
Abstract:
With the rapid development of digital technologies such as big data, cloud computing, and the Internet of Things (IoT), data security and privacy protection have become the core challenges facing modern computing systems. Traditional security mechanisms are difficult to effectively deal with advanced adversarial attacks due to their reliance on a centralized trust model. In this context, the Trusted Execution Environment (TEE), as a hardware-enabled secure isolation technology, offers a potential solution to protect sensitive computations and data. This paper systematically discusses TEE’s tec
APA, Harvard, Vancouver, ISO, and other styles
3

Subramanyan, Bala. "Object Capability Model for Tee: A Cheri Based Compartmentalization Approach." International Journal of Security, Privacy and Trust Management 12, no. 3/4 (2023): 23–30. http://dx.doi.org/10.5121/ijsptm.2023.12402.

Full text
Abstract:
In this paper, we introduce a capability-driven approach to bolster security and granularity within Trusted Execution Environments (TEEs) [1]. By delivering precise privilege control and fine-grained compartmentalization, we aim to improve TEE security standards. To address vulnerabilities within Trusted Execution Environments (TEEs) and enable selective privilege management and secure object sharing between secure and normal worlds, we introduce a TEE compartmentalization framework based on the CHERI object-capability model. Leveraging DSbD technologies, our framework provides an efficient pr
APA, Harvard, Vancouver, ISO, and other styles
4

Abhilash, Kayyidavazhiyil, and Kaipacheri Sheena. "Trusted Execution Environments for Internet of Things Devices." International Journal of Innovative Technology and Exploring Engineering (IJITEE) 11, no. 6 (2022): 45–48. https://doi.org/10.35940/ijitee.F9885.0511622.

Full text
Abstract:
<strong>Abstract: </strong>A trusted execution Environment (TEE) could be a comfy place of a computer&rsquo;s essential processor that&#39;s designed to shield the most touchy information and operations. TEEs are utilized in an expansion of applications, which incorporates cell gadgets, price processing, and statistics safety. The usage of TEEs is becoming increasingly crucial because the amount of touchy records that are processed and stored electronically continues to develop. TEEs can help guard statistics from being accessed or changed with the resource of unauthorised customers, and can a
APA, Harvard, Vancouver, ISO, and other styles
5

Liao, Jia, Baihui Jiang, Peng Zhao, Lei Ning, and Liming Chen. "Unmanned Aerial Vehicle-Assisted Federated Learning Method Based on a Trusted Execution Environment." Electronics 12, no. 18 (2023): 3938. http://dx.doi.org/10.3390/electronics12183938.

Full text
Abstract:
In the face of increasing concerns around privacy and security in the use of unmanned aerial vehicles (UAVs) for mobile edge computing (MEC), this study proposes a novel approach to secure UAV-assisted federated learning. This research integrates a trusted execution environment (TEE) into UAV-assisted federated learning and proposes a robust aggregation algorithm based on cosine distance, denoted as CosAvg. This study further designs and evaluates a TEE-based federated learning model, comparing its resource overhead with other secure aggregation frameworks, like homomorphic encryption (HE) and
APA, Harvard, Vancouver, ISO, and other styles
6

Zhu, Hongyu, Yubo Song, Yang Li, et al. "Mitigating Randomness Leakage in SM2 White-Box Implementations via Trusted Execution Environments." Electronics 14, no. 2 (2025): 301. https://doi.org/10.3390/electronics14020301.

Full text
Abstract:
White-box cryptography plays a vital role in untrusted environments where attackers can fully access the execution process and potentially expose cryptographic keys. It secures keys by embedding them within complex and obfuscated transformations, such as lookup tables and algebraic manipulations. However, existing white-box protection schemes for SM2 signatures face vulnerabilities, notably random number leakage, which compromises key security and diminishes overall effectiveness. This paper proposes an improved white-box implementation of the SM2 signature computation leveraging a Trusted Exe
APA, Harvard, Vancouver, ISO, and other styles
7

Liu, Xiaoqing, Yingxu Lai, Jing Liu, and Shiyao Luo. "TZEAMM: An Efficient and Secure Active Measurement Method Based on TrustZone." Security and Communication Networks 2023 (January 31, 2023): 1–18. http://dx.doi.org/10.1155/2023/6921960.

Full text
Abstract:
With the rapid development of computer and communication technology, embedded systems are widely used in smart devices. The increasing connectivity of these systems and the difficulties in providing comprehensive security have made such devices vulnerable to malicious attacks. Passive defense technologies and traffic-based intrusion detection technologies are not fully effective against such attacks. Trusted execution environment (TEE) technology can ensure system security against unknown attacks to some extent. Most researchers use TrustZone to implement TEE. However, the problem is that the
APA, Harvard, Vancouver, ISO, and other styles
8

Kato, Fumiyuki, Yang Cao, and Masatoshi Yoshikawa. "Olive: Oblivious Federated Learning on Trusted Execution Environment against the Risk of Sparsification." Proceedings of the VLDB Endowment 16, no. 10 (2023): 2404–17. http://dx.doi.org/10.14778/3603581.3603583.

Full text
Abstract:
Combining Federated Learning (FL) with a Trusted Execution Environment (TEE) is a promising approach for realizing privacy-preserving FL, which has garnered significant academic attention in recent years. Implementing the TEE on the server side enables each round of FL to proceed without exposing the client's gradient information to untrusted servers. This addresses usability gaps in existing secure aggregation schemes as well as utility gaps in differentially private FL. However, to address the issue using a TEE, the vulnerabilities of server-side TEEs need to be considered---this has not bee
APA, Harvard, Vancouver, ISO, and other styles
9

Pereira, Sérgio, Tiago Gomes, Jorge Cabral, and Sandro Pinto. "TREE: Bridging the gap between reconfigurable computing and secure execution." IACR Transactions on Cryptographic Hardware and Embedded Systems 2025, no. 3 (2025): 115–38. https://doi.org/10.46586/tches.v2025.i3.115-138.

Full text
Abstract:
Trusted Execution Environments (TEEs) have become a pivotal technology for securing a wide spectrum of security-sensitive applications. With modern computing systems shifting to heterogeneous architectures, integrating TEE support into these systems is paramount. One promising line of research has proposed leveraging FPGA technology to provide promising TEE solutions. Despite their potential, current implementations of FPGA-based TEEs have a set of drawbacks. Some solutions (i.e., MeetGo and ShEF) prioritize the secure loading of reconfigurable modules but lack compatibility with established l
APA, Harvard, Vancouver, ISO, and other styles
10

Kieu-Do-Nguyen, Binh, Khai-Duy Nguyen, Tuan-Kiet Dang, et al. "A Trusted Execution Environment RISC-V System-on-Chip Compatible with Transport Layer Security 1.3." Electronics 13, no. 13 (2024): 2508. http://dx.doi.org/10.3390/electronics13132508.

Full text
Abstract:
The Trusted Execution Environment (TEE) is designed to establish a safe environment that prevents the execution of unauthenticated programs. The nature of TEE is a continuous verification process with hashing, signing, and verifying. Such a process is called the Chain-of-Trust, derived from the Root-of-Trust (RoT). Typically, the RoT is pre-programmed, hard-coded, or embedded in hardware, which is locally produced and checked before booting. The TEE employs various cryptographic processes throughout the boot process to verify the authenticity of the bootloader. It also validates other sensitiv
APA, Harvard, Vancouver, ISO, and other styles
11

Li, Jun, Xinman Luo, and Hong Lei. "TrustHealth: Enhancing eHealth Security with Blockchain and Trusted Execution Environments." Electronics 13, no. 12 (2024): 2425. http://dx.doi.org/10.3390/electronics13122425.

Full text
Abstract:
The rapid growth of electronic health (eHealth) systems has led to serious security and privacy challenges, highlighting the critical importance of protecting sensitive healthcare data. Although researchers have employed blockchain to tackle data management and sharing within eHealth systems, substantial privacy concerns persist as a primary challenge. In this paper, we introduce TrustHealth, a secure data sharing system that leverages trusted execution environment (TEE) and blockchain technology. TrustHealth leverages blockchain to design smart contracts to offer robust hashing protection for
APA, Harvard, Vancouver, ISO, and other styles
12

Kato, Fumiyuki, Yang Cao, and Mastoshi Yoshikawa. "PCT-TEE: Trajectory-based Private Contact Tracing System with Trusted Execution Environment." ACM Transactions on Spatial Algorithms and Systems 8, no. 2 (2022): 1–35. http://dx.doi.org/10.1145/3490491.

Full text
Abstract:
Existing Bluetooth-based private contact tracing (PCT) systems can privately detect whether people have come into direct contact with patients with COVID-19. However, we find that the existing systems lack functionality and flexibility , which may hurt the success of contact tracing. Specifically, they cannot detect indirect contact (e.g., people may be exposed to COVID-19 by using a contaminated sheet at a restaurant without making direct contact with the infected individual); they also cannot flexibly change the rules of “risky contact,” such as the duration of exposure or the distance (both
APA, Harvard, Vancouver, ISO, and other styles
13

Gao, Haotian, Cong Yue, Tien Tuan Anh Dinh, Zhiyong Huang, and Beng Chin Ooi. "Enabling Secure and Efficient Data Analytics Pipeline Evolution with Trusted Execution Environment." Proceedings of the VLDB Endowment 16, no. 10 (2023): 2485–98. http://dx.doi.org/10.14778/3603581.3603589.

Full text
Abstract:
Modern data analytics pipelines are highly dynamic, as they are constantly monitored and fine-tuned by both data engineers and scientists. Recent systems managing pipelines ease creating, deploying, and tracking their evolution. However, privacy concerns emerge as many of them are deployed on the public cloud with less or no trust. Unfortunately, the unique nature of pipelines prevents the adoption of existing confidential computing techniques with different computational patterns and large performance overhead. Being a potential approach, trusted execution environments (TEEs) are efficient in
APA, Harvard, Vancouver, ISO, and other styles
14

Ng, Lucien K. L., Sherman S. M. Chow, Anna P. Y. Woo, Donald P. H. Wong, and Yongjun Zhao. "Goten: GPU-Outsourcing Trusted Execution of Neural Network Training." Proceedings of the AAAI Conference on Artificial Intelligence 35, no. 17 (2021): 14876–83. http://dx.doi.org/10.1609/aaai.v35i17.17746.

Full text
Abstract:
Deep learning unlocks applications with societal impacts, e.g., detecting child exploitation imagery and genomic analysis of rare diseases. Deployment, however, needs compliance with stringent privacy regulations. Training algorithms that preserve the privacy of training data are in pressing need. Purely cryptographic approaches can protect privacy, but they are still costly, even when they rely on two or more non-colluding servers. Seemingly-"trivial" operations in plaintext quickly become prohibitively inefficient when a series of them are "crypto-processed," e.g., (dynamic) quantization for
APA, Harvard, Vancouver, ISO, and other styles
15

Meftah, Souhail, Shuhao Zhang, Bharadwaj Veeravalli, and Khin Mi Mi Aung. "Revisiting the Design of Parallel Stream Joins on Trusted Execution Environments." Algorithms 15, no. 6 (2022): 183. http://dx.doi.org/10.3390/a15060183.

Full text
Abstract:
The appealing properties of secure hardware solutions such as trusted execution environment (TEE) including low computational overhead, confidentiality guarantee, and reduced attack surface have prompted considerable interest in adopting them for secure stream processing applications. In this paper, we revisit the design of parallel stream join algorithms on multicore processors with TEEs. In particular, we conduct a series of profiling experiments to investigate the impact of alternative design choices to parallelize stream joins on TEE including: (1) execution approaches, (2) partitioning sc
APA, Harvard, Vancouver, ISO, and other styles
16

Khurshid, Anum, Sileshi Demesie Yalew, Mudassar Aslam, and Shahid Raza. "TEE-Watchdog: Mitigating Unauthorized Activities within Trusted Execution Environments in ARM-Based Low-Power IoT Devices." Security and Communication Networks 2022 (May 25, 2022): 1–21. http://dx.doi.org/10.1155/2022/8033799.

Full text
Abstract:
Trusted execution environments (TEEs) are on the rise in devices all around us ranging from large-scale cloud-based solutions to resource-constrained embedded devices. With the introduction of ARM TrustZone-M, hardware-assisted trusted execution is now supported in IoT nodes. TrustZone-M provides isolated execution of security-critical operations and sensitive data-generating peripherals. However, TrustZone-M, like all other TEEs, does not provide a mechanism to monitor operations in the trusted areas of the device and software in the secure areas of an IoT device has access to the entire secu
APA, Harvard, Vancouver, ISO, and other styles
17

Li, Bao, Fucai Zhou, Jian Xu, Qiang Wang, Jiacheng Li, and Da Feng. "ROLQ-TEE: Revocable and Privacy-Preserving Optimal Location Query Based on Trusted Execution Environment." Applied Sciences 15, no. 3 (2025): 1641. https://doi.org/10.3390/app15031641.

Full text
Abstract:
With the advent of cloud computing, outsourced computing has emerged as an increasingly popular strategy to reduce the burden of local computation. Optimal location query (OLQ) is a computationally intensive task in the domain of big data outsourcing, which is designed to determine the optimal placement of a new facility from a set of candidate locations. However, location data are sensitive and cannot be shared with other enterprises, so privacy-preserving optimal location query becomes particularly important. Although some privacy-preserving works have been proposed, they still suffer from o
APA, Harvard, Vancouver, ISO, and other styles
18

Chen, Yuehai, Huarun Chen, Shaozhen Chen, et al. "DITES: A Lightweight and Flexible Dual-Core Isolated Trusted Execution SoC Based on RISC-V." Sensors 22, no. 16 (2022): 5981. http://dx.doi.org/10.3390/s22165981.

Full text
Abstract:
A Trusted Execution Environment (TEE) is an efficient way to secure information. To obtain higher efficiency, the building of a dual-core system-on-chip (SoC) with TEE security capabilities is the hottest topic. However, TEE SoCs currently commonly use complex processor cores such as Rocket, resulting in high resource usage. More importantly, the cryptographic unit lacks flexibility and ignores secure communication in dual cores. To address the above problems, we propose DITES, a dual-core TEE SoC based on a Reduced Instruction Set Computer-V (RISC-V). At first, we designed a fully isolated mu
APA, Harvard, Vancouver, ISO, and other styles
19

Sasy, Sajin, Aaron Johnson, and Ian Goldberg. "TEEMS: A Trusted Execution Environment based Metadata-protected Messaging System." Proceedings on Privacy Enhancing Technologies 2025, no. 4 (2025): 56–75. https://doi.org/10.56553/popets-2025-0119.

Full text
Abstract:
Ensuring privacy of online messaging remains a challenge. While the contents or data of online communications are often protected by end-to-end encryption, the metadata of communications are not. Metadata such as who is communicating with whom, how much, and how often, are leaked by popular messaging systems today. In the last four decades we have witnessed a rich literature of designs towards metadata-protecting communications systems (MPCS). While recent MPCS works often target metadata-protected messaging systems, no existing construction simultaneously attains four desirable properties for
APA, Harvard, Vancouver, ISO, and other styles
20

Jiang, Weijin, En Li, Wenying Zhou, Ying Yang, and Tiantian Luo. "IoT Access Control Model Based on Blockchain and Trusted Execution Environment." Processes 11, no. 3 (2023): 723. http://dx.doi.org/10.3390/pr11030723.

Full text
Abstract:
With the application and popularization of the Internet of Things (IoT), while the IoT devices bring us intelligence and convenience, the privacy protection issue has gradually attracted people’s attention. Access control technology is one of the important methods to protect privacy. However, the existing IoT access control technologies have extensive problems such as coarse-grainedness, weak auditability, lack of access process control, and excessive privileges, which make the security and privacy of our IoT devices face great threats. Based on this, a blockchain-based and encrypted currency-
APA, Harvard, Vancouver, ISO, and other styles
21

Zeng, Fanlang, Rui Chang, and Hongjian Liu. "Freesia: Verifying Correctness of TEE Communication with Concurrent Separation Logic." Proceedings of the ACM on Software Engineering 2, ISSTA (2025): 2045–67. https://doi.org/10.1145/3728967.

Full text
Abstract:
The Trusted Execution Environment (TEE), a security extension in modern processors, provides a secure runtime environment for sensitive code and data. Although TEEs are designed to protect applications and their private data, their large code bases often harbor vulnerabilities that could compromise data security. Even though some formal verification efforts have been directed toward the functionality and security of TEE standards and implementations, the verification of TEE correctness in concurrent scenarios remains insufficient. This paper introduces an enhancement for ensuring concurrency s
APA, Harvard, Vancouver, ISO, and other styles
22

Yuan, Jie, Yinghua Shen, Rui Xu, Xinghai Wei, and Dongxiao Liu. "Elevating Security in Migration: An Enhanced Trusted Execution Environment-Based Generic Virtual Remote Attestation Scheme." Information 15, no. 8 (2024): 470. http://dx.doi.org/10.3390/info15080470.

Full text
Abstract:
Cloud computing, as the most widely applied and prominent domain of distributed systems, has brought numerous advantages to users, including high resource sharing efficiency, strong availability, and excellent scalability. However, the complexity of cloud computing environments also introduces various risks and challenges. In the current landscape with numerous cloud service providers and diverse hardware configurations in cloud environments, addressing challenges such as establishing trust chains, achieving general-purpose virtual remote attestation, and ensuring secure virtual machine migrat
APA, Harvard, Vancouver, ISO, and other styles
23

Sebastian, D. Jonathan, Utkarsh Agrawal, Ali Tamimi, and Adam Hahn. "DER-TEE: Secure Distributed Energy Resource Operations Through Trusted Execution Environments." IEEE Internet of Things Journal 6, no. 4 (2019): 6476–86. http://dx.doi.org/10.1109/jiot.2019.2909768.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Han, Shumin, Kuixing Shen, Derong Shen, and Chuang Wang. "Enhanced Multi-Party Privacy-Preserving Record Linkage Using Trusted Execution Environments." Mathematics 12, no. 15 (2024): 2337. http://dx.doi.org/10.3390/math12152337.

Full text
Abstract:
With the world’s data volume growing exponentially, it becomes critical to link it and make decisions. Privacy-preserving record linkage (PPRL) aims to identify all the record information corresponding to the same entity from multiple data sources, without disclosing sensitive information. Previous works on multi-party PPRL methods typically adopt homomorphic encryption technology due to its ability to perform computations on encrypted data without needing to decrypt it first, thus maintaining data confidentiality. However, these methods have notable shortcomings, such as the risk of collusion
APA, Harvard, Vancouver, ISO, and other styles
25

Zhu, Linkai, Shanwen Hu, Xiaolian Zhu, Changpu Meng, and Maoyi Huang. "Enhancing the Security and Privacy in the IoT Supply Chain Using Blockchain and Federated Learning with Trusted Execution Environment." Mathematics 11, no. 17 (2023): 3759. http://dx.doi.org/10.3390/math11173759.

Full text
Abstract:
Federated learning has emerged as a promising technique for the Internet of Things (IoT) in various domains, including supply chain management. It enables IoT devices to collaboratively learn without exposing their raw data, ensuring data privacy. However, federated learning faces the threats of local data tampering and upload process attacks. This paper proposes an innovative framework that leverages Trusted Execution Environment (TEE) and blockchain technology to address the data security and privacy challenges in federated learning for IoT supply chain management. Our framework achieves the
APA, Harvard, Vancouver, ISO, and other styles
26

Song, Weiqiong, Shuai Guo, Jiwei Li, et al. "Security Authentication Framework Design for Electric Internet of Things." Journal of Physics: Conference Series 2356, no. 1 (2022): 012003. http://dx.doi.org/10.1088/1742-6596/2356/1/012003.

Full text
Abstract:
The intelligent terminal equipment of the electric internet of things (IoT) is vulnerable to network attacks when installing APPs from the application store. Encryption of the communication process can enhance security protection, but the key needs to be stored in the local equipment. When the equipment is attacked, the key is leaked easily resulting in communication security problems. To solve the above problems, we proposes a terminal APP security authentication mechanism based on TrustZone approach and OP-TEE (Open Source Trust Execution Environment) system to identify the identity informat
APA, Harvard, Vancouver, ISO, and other styles
27

Wang, Zhiyuan, and Yuezhi Zhou. "Analysis and Evaluation of Intel Software Guard Extension-Based Trusted Execution Environment Usage in Edge Intelligence and Internet of Things Scenarios." Future Internet 17, no. 1 (2025): 32. https://doi.org/10.3390/fi17010032.

Full text
Abstract:
With the extensive deployment and application of the Internet of Things (IoT), 5G and 6G technologies and edge intelligence, the volume of data generated by IoT and the number of intelligence applications derived from these data are rapidly growing. However, the absence of effective mechanisms to safeguard the vast data generated by IoT, along with the security and privacy of edge intelligence applications, hinders their further development and adoption. In recent years, Trusted Execution Environment (TEE) has emerged as a promising technology for securing cloud data storage and cloud processi
APA, Harvard, Vancouver, ISO, and other styles
28

Wang, Zhihong, Yongbiao Li, Dingcheng Li, et al. "Enabling Fairness-Aware and Privacy-Preserving for Quality Evaluation in Vehicular Crowdsensing: A Decentralized Approach." Security and Communication Networks 2021 (November 12, 2021): 1–11. http://dx.doi.org/10.1155/2021/9678409.

Full text
Abstract:
With the rapid development of vehicular crowdsensing, it becomes easier and more efficient for mobile devices to sense, compute, and measure various data. However, how to address the fair quality evaluation between the platform and participants while preserving the privacy of solutions is still a challenge. In the work, we present a fairness-aware and privacy-preserving scheme for worker quality evaluation by leveraging the blockchain, trusted execution environment (TEE), and machine learning technologies. Specifically, we build our framework atop the decentralized blockchain which can resist
APA, Harvard, Vancouver, ISO, and other styles
29

Noh, Yoongdoo, and Chanik Park. "CrossPay: A TEE (Trusted Execution Environment)-based Offchain Protocol for Real-Time Cross Chain Asset Transfer." KIISE Transactions on Computing Practices 28, no. 3 (2022): 160–74. http://dx.doi.org/10.5626/ktcp.2022.28.3.160.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Yan, Jiaxing, Yan Li, Sifan Yin, et al. "An Efficient Greedy Hierarchical Federated Learning Training Method Based on Trusted Execution Environments." Electronics 13, no. 17 (2024): 3548. http://dx.doi.org/10.3390/electronics13173548.

Full text
Abstract:
With the continuous development of artificial intelligence, effectively solving the problem of data islands under the premise of protecting user data privacy has become a top priority. Federal learning is an effective solution to the two significant dilemmas of data islands and data privacy protection. However, there are still some security problems in federal learning. Therefore, this study simulates the data distribution in a hardware-based trusted execution environment in the real world through two processing methods: independent identically distributed and non-independent identically distr
APA, Harvard, Vancouver, ISO, and other styles
31

Li, Rujia, Qin Wang, Qi Wang, David Galindo, and Mark Ryan. "SoK: TEE-Assisted Confidential Smart Contract." Proceedings on Privacy Enhancing Technologies 2022, no. 3 (2022): 711–31. http://dx.doi.org/10.56553/popets-2022-0093.

Full text
Abstract:
The blockchain-based smart contract lacks privacy, since the contract state and instruction code are exposed to the public. Combining smart-contract execution with Trusted Execution Environments provides an efficient solution, called TEE-assisted smart contracts (TCSC), for protecting the confidentiality of contract states. However, the combination approaches are varied, and a systematic study is absent. Newly released systems may fail to draw upon the experience learned from existing protocols, such as repeating known design mistakes or applying TEE technology in insecure ways. In this paper,
APA, Harvard, Vancouver, ISO, and other styles
32

Musale, Pratik, and Adam Lee. "Trust TEE?: Exploring the Impact of Trusted Execution Environments on Smart Home Privacy Norms." Proceedings on Privacy Enhancing Technologies 2023, no. 3 (2023): 5–23. http://dx.doi.org/10.56553/popets-2023-0067.

Full text
Abstract:
IoT devices like smart cameras and speakers provide convenience but can collect sensitive information within private spaces. While research has investigated user perception of comfort with information flows originating from these types of devices, little focus has been given to the role of the sensing hardware in influencing these sentiments. Given the proliferation of trusted execution environments (TEEs) across commodity- and server-class devices, we surveyed 1049 American adults using the Contextual Integrity framework to understand how the inclusion of cloud-based TEEs in IoT ecosystems ma
APA, Harvard, Vancouver, ISO, and other styles
33

Choi, Joseph I., and Kevin R. B. Butler. "Secure Multiparty Computation and Trusted Hardware: Examining Adoption Challenges and Opportunities." Security and Communication Networks 2019 (April 2, 2019): 1–28. http://dx.doi.org/10.1155/2019/1368905.

Full text
Abstract:
When two or more parties need to compute a common result while safeguarding their sensitive inputs, they use secure multiparty computation (SMC) techniques such as garbled circuits. The traditional enabler of SMC is cryptography, but the significant number of cryptographic operations required results in these techniques being impractical for most real-time, online computations. Trusted execution environments (TEEs) provide hardware-enforced isolation of code and data in use, making them promising candidates for making SMC more tractable. This paper revisits the history of improvements to SMC o
APA, Harvard, Vancouver, ISO, and other styles
34

Wei, WANG, SHAO Yu, DUAN Jia, and ZHANG Zehua. "Privacy-Preserving Computation:A Comprehensive Survey of Methods and Applications." Chinese Computer Sciences Review 1, no. 1 (2023): 1–12. http://dx.doi.org/10.48014/ccsr.20230517001.

Full text
Abstract:
This paper presents a comprehensive review of privacy-preserving computation, including its various methods, such as Trusted Environment Execution (TEE) computation, Secure Multi-Party Computation (SMPC) , Federated Learning (FL) , Differential Privacy (DP) , and Private Information Retrieval (PIR) , et. It also analyzes and compares these methods from the aspects of security, advantages/disadvantages, and risks. Additionally, this paper investigates the applications and development of privacy-preserving computation, which finally demonstrates that privacy-preserving computation has a signific
APA, Harvard, Vancouver, ISO, and other styles
35

Wang, Lianhai, Xiaoqian Liu, Wei Shao, et al. "A Blockchain-Based Privacy-Preserving Healthcare Data Sharing Scheme for Incremental Updates." Symmetry 16, no. 1 (2024): 89. http://dx.doi.org/10.3390/sym16010089.

Full text
Abstract:
With the rapid development of artificial intelligence (AI) in the healthcare industry, the sharing of personal healthcare data plays an essential role in advancing medical AI. Unfortunately, personal healthcare data sharing is plagued by challenges like ambiguous data ownership and privacy leakage. Blockchain, which stores the hash of shared data on-chain and ciphertext off-chain, is treated as a promising approach to address the above issues. However, this approach lacks a flexible and reliable mechanism for incremental updates of the same case data. To avoid the overhead of authentication, a
APA, Harvard, Vancouver, ISO, and other styles
36

Liu, Songran, Nan Guan, Zhishan Guo, and Wang Yi. "MiniTEE—A Lightweight TrustZone-Assisted TEE for Real-Time Systems." Electronics 9, no. 7 (2020): 1130. http://dx.doi.org/10.3390/electronics9071130.

Full text
Abstract:
While trusted execution environments (TEEs) provide industry standard security and isolation, TEE requests through secure monitor calls (SMCs) attribute to large time overhead and weakened temporal predictability. Moreover, as current available TEE solutions are designed for Linux and/or Android initially, it will encounter many constraints (e.g., driver libraries incompatible, large memory footprint, etc.) when integrating with low-end Real-Time Operating Systems, RTOSs. In this paper, we present MiniTEE to understand, evaluate and discuss the benefits and limitations when integrating TrustZo
APA, Harvard, Vancouver, ISO, and other styles
37

Koutroumpouchos, Nikolaos, Christoforos Ntantogian, and Christos Xenakis. "Building Trust for Smart Connected Devices: The Challenges and Pitfalls of TrustZone." Sensors 21, no. 2 (2021): 520. http://dx.doi.org/10.3390/s21020520.

Full text
Abstract:
TrustZone-based Trusted Execution Environments (TEEs) have been utilized extensively for the implementation of security-oriented solutions for several smart intra and inter-connected devices. Although TEEs have been promoted as the starting point for establishing a device root of trust, a number of published attacks against the most broadly utilized TEE implementations request a second view on their security. The aim of this research is to provide an analytical and educational exploration of TrustZone-based TEE vulnerabilities with the goal of pinpointing design and implementation flaws. To th
APA, Harvard, Vancouver, ISO, and other styles
38

Fang, Shuya, Qingquan Liu, Fengrui Zhang, Ningyan Chen, and Xin Li. "Application of Internet of Things and Blockchain in Information Security and Privacy Protection of Global Organizations." Journal of Organizational and End User Computing 35, no. 3 (2023): 1–16. http://dx.doi.org/10.4018/joeuc.323192.

Full text
Abstract:
Access control data will continue to be exposed to the threat of privacy leakage even if blockchain technology currently offers a new solution for the security and privacy of the internet of things (IoT). However, its usability and privacy are not completely leveraged. This paper first discusses the IoT and blockchain technology and then examines each technology's structural models in order to address the issue of information security and privacy protection for the global organization IoT based on blockchain. Second, the information security and privacy guarantee system based on blockchain is
APA, Harvard, Vancouver, ISO, and other styles
39

Yang, Xinying, Cong Yue, Wenhui Zhang, Yang Liu, Beng Chin Ooi, and Jianjun Chen. "SecuDB: An In-Enclave Privacy-Preserving and Tamper-Resistant Relational Database." Proceedings of the VLDB Endowment 17, no. 12 (2024): 3906–19. http://dx.doi.org/10.14778/3685800.3685815.

Full text
Abstract:
With the escalation in the demand for privacy-preserving and tamper-resistant data management and processing on the public cloud, an increasing number of mainstream databases start to provide always-encrypted and blockchain-like features, including Microsoft SQL Server, MongoDB, and Alibaba PolarDB. The recent progress in Trusted Execution Environment (TEE) technology has enabled the deployment of the complete database engine within TEE. This implementation ensures that data stored in memory, cache, and registers is encrypted, thereby maintaining the confidentiality of information. In this pap
APA, Harvard, Vancouver, ISO, and other styles
40

Le, Duc V., Lizzy Tengana Hurtado, Adil Ahmad, Mohsen Minaei, Byoungyoung Lee, and Aniket Kate. "A Tale of Two Trees: One Writes, and Other Reads." Proceedings on Privacy Enhancing Technologies 2020, no. 2 (2020): 519–36. http://dx.doi.org/10.2478/popets-2020-0039.

Full text
Abstract:
AbstractThe Bitcoin network has offered a new way of securely performing financial transactions over the insecure network. Nevertheless, this ability comes with the cost of storing a large (distributed) ledger, which has become unsuitable for personal devices of any kind. Although the simplified payment verification (SPV) clients can address this storage issue, a Bitcoin SPV client has to rely on other Bitcoin nodes to obtain its transaction history and the current approaches offer no privacy guarantees to the SPV clients.This work presents T3, a trusted hardware-secured Bitcoin full client th
APA, Harvard, Vancouver, ISO, and other styles
41

Niu, Yue, Ramy E. Ali, and Salman Avestimehr. "3LegRace: Privacy-Preserving DNN Training over TEEs and GPUs." Proceedings on Privacy Enhancing Technologies 2022, no. 4 (2022): 183–203. http://dx.doi.org/10.56553/popets-2022-0105.

Full text
Abstract:
Leveraging parallel hardware (e.g. GPUs) for deep neural network (DNN) training brings high computing performance. However, it raises data privacy concerns as GPUs lack a trusted environment to protect the data. Trusted execution environments (TEEs) have emerged as a promising solution to achieve privacypreserving learning. Unfortunately, TEEs’ limited computing power renders them not comparable to GPUs in performance. To improve the trade-off among privacy, computing performance, and model accuracy, we propose an asymmetric model decomposition framework, AsymML, to (1) accelerate training usi
APA, Harvard, Vancouver, ISO, and other styles
42

Zhu, Qinyu, Quan Chen, Yichen Liu, Zahid Akhtar, and Kamran Siddique. "Investigating TrustZone: A Comprehensive Analysis." Security and Communication Networks 2023 (April 14, 2023): 1–19. http://dx.doi.org/10.1155/2023/7369634.

Full text
Abstract:
The advent of the Internet and portable devices, including smartphones and watches, has brought unprecedented opportunities for embedded application systems developments. Along with these developments, there is an increasing need for embedded devices to handle important services, such as the ability to pay bills or manage bank accounts remotely via mobile phones. Such applications and developments have also highlighted the issues of cyberattacks and computing network security--these developments have made mobile phones a potential target for malware, trojans, and viruses, so it is critical to
APA, Harvard, Vancouver, ISO, and other styles
43

Reddy, Annapureddy Venkata Sai Kumar, and Gourinath Banda. "ElasticPay: Instant Peer-to-Peer Offline Extended Digital Payment System." Sensors 24, no. 24 (2024): 8034. https://doi.org/10.3390/s24248034.

Full text
Abstract:
The widespread reliance on paper-based currency poses significant drawbacks, such as counterfeiting, lack of transparency, and environmental impacts. While Central Bank Digital Currencies (CBDCs) address many of these issues, their dependence on continuous internet connectivity limits their usability in scenarios with poor or no network access. To overcome such limitations, this paper introduces ElasticPay, a novel Peer-to-Peer (P2P) Offline Digital Payment System that leverages advanced hardware security measures realised through Trusted Platform Modules (TPMs), Trusted Execution Environments
APA, Harvard, Vancouver, ISO, and other styles
44

Zhang, Meiyu, Qianying Zhang, Shijun Zhao, Zhiping Shi, and Yong Guan. "SoftME: A Software-Based Memory Protection Approach for TEE System to Resist Physical Attacks." Security and Communication Networks 2019 (March 4, 2019): 1–12. http://dx.doi.org/10.1155/2019/8690853.

Full text
Abstract:
The development of the Internet of Things has made embedded devices widely used. Embedded devices are often used to process sensitive data, making them the target of attackers. ARM TrustZone technology is used to protect embedded device data from compromised operating systems and applications. But as the value of the data stored in embedded devices increases, more and more effective physical attacks have emerged. However, TrustZone cannot resist physical attacks. We propose SoftME, an approach that utilizes the on-chip memory space to provide a trusted execution environment for sensitive appli
APA, Harvard, Vancouver, ISO, and other styles
45

Li, Xinyao, and Akhilesh Tyagi. "Cross-World Covert Channel on ARM Trustzone through PMU." Sensors 22, no. 19 (2022): 7354. http://dx.doi.org/10.3390/s22197354.

Full text
Abstract:
The TrustZone technology is incorporated in a majority of recent ARM Cortex A and Cortex M processors widely deployed in the IoT world. Security critical code execution inside a so-called secure world is isolated from the rest of the application execution within a normal world. It provides hardware-isolated area called a trusted execution environment (TEE) in the processor for sensitive data and code. This paper demonstrates a vulnerability in the secure world in the form of a cross-world, secure world to normal world, covert channel. Performance counters or Performance Monitoring Unit (PMU) e
APA, Harvard, Vancouver, ISO, and other styles
46

Lu, Xiaofeng, and Cheng Jiang. "TEEDAG: A High-Throughput Distributed Ledger Based on TEE and Directed Acyclic Graph." Electronics 12, no. 11 (2023): 2393. http://dx.doi.org/10.3390/electronics12112393.

Full text
Abstract:
With the arrival of the 5G era, the Internet of Things (IoT) has entered a new stage, and the amount of IoT data is growing rapidly. The traditional blockchain cannot handle massive amounts of data, which presents scalability challenges for blockchain technology. Existing blockchain improvement technologies such as off-chain payments, protocol improvements, and sharding techniques have performance bottlenecks and limitations in the data, which is rapidly growing. The blockchain is fundamentally a decentralized distributed ledger, and the traditional chain structure is inadequate for addressing
APA, Harvard, Vancouver, ISO, and other styles
47

Xu, Zihuan, and Lei Chen. "L2chain." Proceedings of the VLDB Endowment 16, no. 4 (2022): 986–99. http://dx.doi.org/10.14778/3574245.3574278.

Full text
Abstract:
With the rapid development of blockchain, the concept of decentralized applications (DApps), built upon smart contracts, has attracted much attention in academia and industry. However, significant issues w.r.t. system throughput, transaction confidentiality, and the security guarantee of the DApp transaction execution and order correctness hinder the border adoption of blockchain DApps. To address these issues, we propose L2chain, a novel blockchain framework aiming to scale the system through a layer-2 network where DApps process transactions in the layer-2 network and only the system state d
APA, Harvard, Vancouver, ISO, and other styles
48

Mo, Fan, Hamed Haddadi, Kleomenis Katevas, Eduard Marin, Diego Perino, and Nicolas Kourtellis. "PPFL." GetMobile: Mobile Computing and Communications 25, no. 4 (2022): 35–38. http://dx.doi.org/10.1145/3529706.3529715.

Full text
Abstract:
Mobile networks and devices provide the users with ubiquitous connectivity, while many of their functionality and business models rely on data analysis and processing. In this context, Machine Learning (ML) plays a key role and has been successfully leveraged by the different actors in the mobile ecosystem (e.g., application and Operating System developers, vendors, network operators, etc.). Traditional ML designs assume (user) data are collected and models are trained in a centralized location. However, this approach has privacy consequences related to data collection and processing. Such con
APA, Harvard, Vancouver, ISO, and other styles
49

Crocetti, Luca, Pietro Nannipieri, Stefano Di Matteo, and Sergio Saponara. "Design Methodology and Metrics for Robust and Highly Qualified Security Modules in Trusted Environments." Electronics 12, no. 23 (2023): 4843. http://dx.doi.org/10.3390/electronics12234843.

Full text
Abstract:
Cyberattacks and cybercriminal activities constitute one of the biggest threats in the modern digital era, and the frequency, efficiency, and severity of attacks have grown over the years. Designers and producers of digital systems try to counteract such issues by exploiting increasingly robust and advanced security mechanisms to provide secure execution environments aimed at preventing cyberattacks or, in the worst case, at containing intrusions by isolation. One of the most significative examples comes from General Purpose Processor (GPP) manufacturers such as Intel, AMD, and ARM, which in t
APA, Harvard, Vancouver, ISO, and other styles
50

Julian, Anitha, Gerardine Immaculate Mary, S. Selvi, Mayur Rele, and Muthukumaran Vaithianathan. "Blockchain based solutions for privacy-preserving authentication and authorization in networks." Journal of Discrete Mathematical Sciences and Cryptography 27, no. 2-B (2024): 797–808. http://dx.doi.org/10.47974/jdmsc-1956.

Full text
Abstract:
Securing sensitive user information and maintaining privacy during authentication and authorization processes is crucial in today’s interconnected digital world. This study investigates new approaches to tackle these obstacles by combining blockchain technology with Trusted Execution Environment (TEE). The proposed system introduces a new method that combines the advantages of both technologies to create a strong and privacy-focused framework for network security. The study assesses the effectiveness of the suggested system based on key parameters, focusing specifically on Transaction Throughp
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!