Author:
Xu Shiwei,Zhao Yizhi,Ren Zhengwei,Wu Lingjuan,Tong Yan,Zhang Huanguo
Publisher
Springer International Publishing
Reference22 articles.
1. Lebedev, I., Hogan, K., Devadas, S.: Invited paper: secure boot and remote attestation in the sanctum processor. In: Proceedings of the CSF, Oxford, UK, pp. 46–60 (2018)
2. Lee, S., Lee, J.-H.: TEE based session key establishment protocol for secure infotainment systems. Des. Autom. Embed. Syst. 22(3), 215–224 (2018). https://doi.org/10.1007/s10617-018-9212-5
3. Sawtooth. PoET 1.0 Specification. https://sawtooth.hyperledger.org/docs/core/nightly/master/architecture/poet.html. Accessed 1 May 2020
4. Machiry, A., Gustafson, E., Spensky, C., et al.: BOOMERANG: exploiting the semantic gap in trusted execution environments. In: Proceedings of the NDSS, San Diego, CA, USA (2017)
5. Bulck, J.V., Oswald, D., Marin, E., Aldoseri, A., Garcia, F.D., Piessens, F.: A tale of two worlds: assessing the vulnerability of enclave shielding runtimes. In: Proceedings of the CSS, London, UK, pp. 1741–1758 (2019)
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献