Hardware-assisted Trusted Execution Environments Look Back, Look Ahead

N. Asokan*

*Corresponding author for this work

Research output: Contribution to conferenceAbstractScientificpeer-review

Abstract

Over the last two decades, hardware-based isolated execution environments, commonly known as "trusted execution environments" or TEEs, have become widely deployed [[1],[2],[3],[4]]. However, concerns about vulnerabilities (like the Foreshadow attacks [[5]]), and potential for abuse have been persistent and have recently become increasingly pronounced.

In this talk, I will discuss the history of (mobile) TEEs [[6]], what motivated their design and large-scale deployment, and how they have evolved during the last two decades. I will then discuss some of their shortcomings and potential approaches for overcoming them. I will also briefly touch on other types of hardware security primitives that are being rolled out by processor manufacturers and the opportunities they offer for securing computing.

Original languageEnglish
Pages1687-1687
Number of pages1
DOIs
Publication statusPublished - 2019
MoE publication typeNot Eligible
EventACM Conference on Computer and Communications Security - London, United Kingdom
Duration: 11 Nov 201915 Nov 2019
Conference number: 26

Conference

ConferenceACM Conference on Computer and Communications Security
Abbreviated titleCCS
Country/TerritoryUnited Kingdom
CityLondon
Period11/11/201915/11/2019

Keywords

  • Trusted execution environments
  • hardware-assisted security

Fingerprint

Dive into the research topics of 'Hardware-assisted Trusted Execution Environments Look Back, Look Ahead'. Together they form a unique fingerprint.

Cite this