A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
SoK: Understanding the Prevailing Security Vulnerabilities in TrustZone-assisted TEE Systems
2020
2020 IEEE Symposium on Security and Privacy (SP)
Hundreds of millions of mobile devices worldwide rely on Trusted Execution Environments (TEEs) built with Arm TrustZone for the protection of security-critical applications (e.g., DRM) and operating system (OS) components (e.g., Android keystore). TEEs are often assumed to be highly secure; however, over the past years, TEEs have been successfully attacked multiple times, with highly damaging impact across various platforms. Unfortunately, these attacks have been possible by the presence of
doi:10.1109/sp40000.2020.00061
dblp:conf/sp/Cerdeira0FP20
fatcat:pzj3uu3vvfb4ra24pre2c5s3jm