skip to main content
10.1145/3319535.3364969acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
keynote

Hardware-assisted Trusted Execution Environments: Look Back, Look Ahead

Published: 06 November 2019 Publication History

Abstract

Over the last two decades, hardware-based isolated execution environments, commonly known as "trusted execution environments" or TEEs, have become widely deployed [1,2,3,4]. However, concerns about vulnerabilities (like the Foreshadow attacks [5]), and potential for abuse have been persistent and have recently become increasingly pronounced. In this talk, I will discuss the history of (mobile) TEEs [6], what motivated their design and large-scale deployment, and how they have evolved during the last two decades. I will then discuss some of their shortcomings and potential approaches for overcoming them. I will also briefly touch on other types of hardware security primitives that are being rolled out by processor manufacturers and the opportunities they offer for securing computing

Supplementary Material

WEBM File (p1687-asokan.webm)

References

[1]
N. Asokan, Jan-Erik Ekberg, Kari Kostiainen, Anand Rajan, Carlos V. Rozas, Ahmad-Reza Sadeghi, Steffen Schulz, Christian Wachsmann: Mobile Trusted Computing. Proceedings of the IEEE 102(8): 1189--1206 (2014)
[2]
Jan-Erik Ekberg, Kari Kostiainen, N. Asokan: The Untapped Potential of Trusted Execution Environments on Mobile Devices. IEEE Security & Privacy 12(4): 29--37 (2014)
[3]
ARM: ARM TrustZone, https://developer.arm.com/ip-products/security-ip/trustzone
[4]
Intel: Intel Software Guard Extensions, https://software.intel.com/en-us/sgx
[5]
Jo Van Bulck,et al: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution. USENIX Security Symposium 2018: 991--1008
[6]
Saara Matala, Thomas Nyman, N. Asokan: Historical insight into the development of Mobile TEEs, article in Aalto SSG blog, June 2019 http://blog.ssg.aalto.fi/2019/06/historical-insight-into-development-of.html

Cited By

View all
  • (2023)SoK: A Systematic Review of TEE Usage for Developing Trusted ApplicationsProceedings of the 18th International Conference on Availability, Reliability and Security10.1145/3600160.3600169(1-15)Online publication date: 29-Aug-2023
  • (2022)A Privacy-Preserving Mobile Crowdsensing Scheme Based on Blockchain and Trusted Execution EnvironmentIEICE Transactions on Information and Systems10.1587/transinf.2021BCP0001E105.D:2(215-226)Online publication date: 1-Feb-2022
  • (2022)Towards securely migrating webassembly enclavesProceedings of the 15th European Workshop on Systems Security10.1145/3517208.3523755(43-49)Online publication date: 5-Apr-2022
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
CCS '19: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security
November 2019
2755 pages
ISBN:9781450367479
DOI:10.1145/3319535
Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 06 November 2019

Check for updates

Author Tags

  1. hardware-assisted security
  2. trusted execution environments

Qualifiers

  • Keynote

Conference

CCS '19
Sponsor:

Acceptance Rates

CCS '19 Paper Acceptance Rate 149 of 934 submissions, 16%;
Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

Upcoming Conference

CCS '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)52
  • Downloads (Last 6 weeks)5
Reflects downloads up to 28 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2023)SoK: A Systematic Review of TEE Usage for Developing Trusted ApplicationsProceedings of the 18th International Conference on Availability, Reliability and Security10.1145/3600160.3600169(1-15)Online publication date: 29-Aug-2023
  • (2022)A Privacy-Preserving Mobile Crowdsensing Scheme Based on Blockchain and Trusted Execution EnvironmentIEICE Transactions on Information and Systems10.1587/transinf.2021BCP0001E105.D:2(215-226)Online publication date: 1-Feb-2022
  • (2022)Towards securely migrating webassembly enclavesProceedings of the 15th European Workshop on Systems Security10.1145/3517208.3523755(43-49)Online publication date: 5-Apr-2022
  • (2020)Confronting the Limitations of Hardware-Assisted SecurityIEEE Security and Privacy10.1109/MSEC.2020.301541318:5(6-7)Online publication date: 1-Sep-2020

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media