2019
DOI: 10.1016/j.iot.2019.100055
|View full text |Cite
|
Sign up to set email alerts
|

A comprehensive survey of hardware-assisted security: From the edge to the cloud

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0
2

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 49 publications
(16 citation statements)
references
References 16 publications
0
14
0
2
Order By: Relevance
“…Existing literature also includes surveys of TEE architectures (e.g., [85], [86]) as well as security properties (e.g., [87], [88]). Although these works cover TEEs across multiple processor architectures, none of them systematically catalog and analyze the various architectural design decisions underlying these TEE designs and analyze their advantages and disadvantages as we do in this paper.…”
Section: Related Workmentioning
confidence: 99%
“…Existing literature also includes surveys of TEE architectures (e.g., [85], [86]) as well as security properties (e.g., [87], [88]). Although these works cover TEEs across multiple processor architectures, none of them systematically catalog and analyze the various architectural design decisions underlying these TEE designs and analyze their advantages and disadvantages as we do in this paper.…”
Section: Related Workmentioning
confidence: 99%
“…Approaches and technologies under this type of security include hardwarebased hypervisors, such as the TPM chip, self-encrypting hard drive, unified extensible firmware interface (UEFI), virtualization technology, and AMD virtualization. Chip vendors and manufacturers are researching and developing security technologies based on various chips and firmware [32], [33]. Hardware security approaches are being used for mobile device security, beginning with the use of smart card ICs.…”
Section: A Hardware Securitymentioning
confidence: 99%
“…The hardware function can reduce the complexity of the software part to improve platform performance. Therefore, the industry is advocating a full range of hardware-assisted security methods including trusted computing, random number generation, crypto acceleration, malware detection [164]. At the same time, the academic community has also proposed many security solutions based on these industrial hardware trust anchors.…”
Section: Hardware-assisted Security Unitsmentioning
confidence: 99%