2020
DOI: 10.48550/arxiv.2010.15866
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

CURE: A Security Architecture with CUstomizable and Resilient Enclaves

Abstract: Security architectures providing Trusted Execution Environments (TEEs) have been an appealing research subject for a wide range of computer systems, from low-end embedded devices to powerful cloud servers. The goal of these architectures is to protect sensitive services in isolated execution contexts, called enclaves. Unfortunately, existing TEE solutions suffer from significant design shortcomings. First, they follow a one-size-fits-all approach offering only a single enclave type, however, different services… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
13
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(13 citation statements)
references
References 41 publications
0
13
0
Order By: Relevance
“…randomized cache line mapping to make the attacks computationally impractical [91], [79], [80], [98], [89], [97], [64], [63] or 2.) cache partitioning to provide strict isolation [30], [51], [103], [62], [22], [34], [105], [48], [99], [58], [6], [96], [52], [97], [23]. We discuss the works most related to CHUNKED-CACHE in more detail in Section VII.…”
Section: B Recent Defenses and Their Shortcomingsmentioning
confidence: 99%
See 4 more Smart Citations
“…randomized cache line mapping to make the attacks computationally impractical [91], [79], [80], [98], [89], [97], [64], [63] or 2.) cache partitioning to provide strict isolation [30], [51], [103], [62], [22], [34], [105], [48], [99], [58], [6], [96], [52], [97], [23]. We discuss the works most related to CHUNKED-CACHE in more detail in Section VII.…”
Section: B Recent Defenses and Their Shortcomingsmentioning
confidence: 99%
“…CHUNKED-CACHE targets computing systems which implement a TEE security architecture and contain a setassociative cache architecture. In the following, we first present our standard assumptions regarding the cache architecture, followed by our assumptions on the TEE security architecture which are aligned with existing academic [22], [58], [13], [6] and industry solutions [42], [46], [5].…”
Section: A System Modelmentioning
confidence: 99%
See 3 more Smart Citations