Trustzone安全研究综述文章推荐

安全之安全(security²)博客目录导读


目录

[1] Muñoz-Gallego A J, Rios-del-Pozo R, Roman-Castro R, et al. A survey on the (in) security of trusted execution environments[J]. 2023.

[2] Zhu Q, Chen Q, Liu Y, et al. Investigating TrustZone: A Comprehensive Analysis[J]. Security and Communication Networks, 2023.

[3] Koutroumpouchos N , Ntantogian C , Xenakis C .Building Trust for Smart Connected Devices: The Challenges and Pitfalls of TrustZone[J].Sensors, 2021, 21(2):520.DOI:10.3390/s21020520.

[4] D. Cerdeira, N. Santos, P. Fonseca and S. Pinto, "SoK: Understanding the Prevailing Security Vulnerabilities in TrustZone-assisted TEE Systems," 2020 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, 2020, pp. 1416-1432, doi: 10.1109/SP40000.2020.00061.

[5] Pinto S , Santos N .Demystifying Arm TrustZone: A Comprehensive Survey[J].ACM Computing Surveys, 2019, 51(6):1-36.DOI:10.1145/3291047.


以时间顺序(由近及远)

[1] Muñoz-Gallego A J, Rios-del-Pozo R, Roman-Castro R, et al. A survey on the (in) security of trusted execution environments[J]. 2023.

Trustzone安全研究综述文章推荐_第1张图片

[2] Zhu Q, Chen Q, Liu Y, et al. Investigating TrustZone: A Comprehensive Analysis[J]. Security and Communication Networks, 2023.

Trustzone安全研究综述文章推荐_第2张图片

[3] Koutroumpouchos N , Ntantogian C , Xenakis C .Building Trust for Smart Connected Devices: The Challenges and Pitfalls of TrustZone[J].Sensors, 2021, 21(2):520.DOI:10.3390/s21020520.

Trustzone安全研究综述文章推荐_第3张图片

[4] D. Cerdeira, N. Santos, P. Fonseca and S. Pinto, "SoK: Understanding the Prevailing Security Vulnerabilities in TrustZone-assisted TEE Systems," 2020 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, 2020, pp. 1416-1432, doi: 10.1109/SP40000.2020.00061.

Trustzone安全研究综述文章推荐_第4张图片

Trustzone安全研究综述文章推荐_第5张图片

[5] Pinto S , Santos N .Demystifying Arm TrustZone: A Comprehensive Survey[J].ACM Computing Surveys, 2019, 51(6):1-36.DOI:10.1145/3291047.

Trustzone安全研究综述文章推荐_第6张图片

你可能感兴趣的:(ARM安全架构,arm,安全架构)