A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Building a Trustworthy Execution Environment to Defeat Exploits from both Cyber Space and Physical Space for ARM
2018
IEEE Transactions on Dependable and Secure Computing
The rapid evolution of Internet-of-Things (IoT) technologies has led to an emerging need to make them smarter. However, the smartness comes at the cost of multi-vector security exploits. From cyber space, a compromised operating system could access all the data in a cloud-aware IoT device. From physical space, cold-boot attacks and DMA attacks impose a great threat to the unattended devices. In this paper, we propose TrustShadow that provides a comprehensively protected execution environment
doi:10.1109/tdsc.2018.2861756
fatcat:cge7n5y2fbfu5duj6zgqn5gre4