A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
iperfTZ: Understanding Network Bottlenecks for TrustZone-based Trusted Applications
[article]
2019
arXiv
pre-print
The growing availability of hardware-based trusted execution environments (TEEs) in commodity processors has recently advanced support (i.e., design, implementation and deployment frameworks) for network-based secure services. Examples of such TEEs include ARM TrustZone or Intel SGX, largely available in embedded, mobile and server-grade processors. TEEs shield services from compromised hosts, malicious users or powerful attackers. TEE-enabled devices are largely being deployed on the edge of
arXiv:1909.06662v1
fatcat:zwvh2tjsmfanjbxif7gi7n4v6i