Cited By
View all- Hu JZeng FZhao YZhang ZZhang LZhao JChang RRen K(2024)ProveriT: A Parameterized, Composable, and Verified Model of TEE Protection ProfileIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2024.337531121:6(5341-5358)Online publication date: Nov-2024
- Witharana HChatterjee DMishra P(2024)Verifying Memory Confidentiality and Integrity of Intel TDX Trusted Execution Environments2024 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)10.1109/HOST55342.2024.10545349(44-54)Online publication date: 6-May-2024
- Shepherd CMarkantonakis KShepherd CMarkantonakis K(2024)Deployment Issues, Attacks, and Other ChallengesTrusted Execution Environments10.1007/978-3-031-55561-9_8(167-184)Online publication date: 22-Feb-2024
- Show More Cited By