Abstract
Over the last two decades, hardware-based isolated execution environments, commonly known as "trusted execution environments" or TEEs, have become widely deployed [[1],[2],[3],[4]]. However, concerns about vulnerabilities (like the Foreshadow attacks [[5]]), and potential for abuse have been persistent and have recently become increasingly pronounced.
In this talk, I will discuss the history of (mobile) TEEs [[6]], what motivated their design and large-scale deployment, and how they have evolved during the last two decades. I will then discuss some of their shortcomings and potential approaches for overcoming them. I will also briefly touch on other types of hardware security primitives that are being rolled out by processor manufacturers and the opportunities they offer for securing computing.
Original language | English |
---|---|
Pages | 1687-1687 |
Number of pages | 1 |
DOIs | |
Publication status | Published - 2019 |
MoE publication type | Not Eligible |
Event | ACM Conference on Computer and Communications Security - London, United Kingdom Duration: 11 Nov 2019 → 15 Nov 2019 Conference number: 26 |
Conference
Conference | ACM Conference on Computer and Communications Security |
---|---|
Abbreviated title | CCS |
Country/Territory | United Kingdom |
City | London |
Period | 11/11/2019 → 15/11/2019 |
Keywords
- Trusted execution environments
- hardware-assisted security