Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security 2015
DOI: 10.1145/2810103.2813719
|View full text |Cite
|
Sign up to set email alerts
|

Trusted Display on Untrusted Commodity Platforms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
8
1
1

Relationship

0
10

Authors

Journals

citations
Cited by 20 publications
(6 citation statements)
references
References 25 publications
0
6
0
Order By: Relevance
“…While many works study how to use a hypervisor to build a trusted path to users (e.g. [60][61][62][63][64]), little work has been done in the trusted hardware setting. SGXIO [16] provides a hybrid solution that combines SGX with hypervisor techniques to allow a trusted I/O path with unmodified devices.…”
Section: Discussion and Extensionsmentioning
confidence: 99%
“…While many works study how to use a hypervisor to build a trusted path to users (e.g. [60][61][62][63][64]), little work has been done in the trusted hardware setting. SGXIO [16] provides a hybrid solution that combines SGX with hypervisor techniques to allow a trusted I/O path with unmodified devices.…”
Section: Discussion and Extensionsmentioning
confidence: 99%
“…Prior work has attempted to reduce trust on privileged host [41] via hardware support on the GPU [38] or on the CPU [18]. Graviton [38] extends the GPU with support for secure resource management, and relies on a trusted GPU runtime hosted in a process-based CPU TEE to manage the TEE lifecycle.…”
Section: Related Workmentioning
confidence: 99%
“…For instance, Zhou et al propose a trusted path to a single USB device [69]. Yu et al demonstrate how to build a trusted path for display [70]. Filyanov et al discuss a pure uni-directional trusted path using the TPM and Intel TXT [71].…”
Section: Related Workmentioning
confidence: 99%