1. V. Costan and S. Devadas, "Intel SGX Explained.," IACR Cryptol. ePrint Arch., 2016.
2. S. Pinto and N. Santos, "Demystifying arm trustzone: A comprehensive survey," ACM Computing Surveys (CSUR), 2019.
3. R. Bahmani, F. Brasser, G. Dessouky, P. Jauernig, M. Klimmek, A.-R. Sadeghi, and E. Stapf, "CURE: A Security Architecture with CUstomizable and Resilient Enclaves," in USENIX Security Symposium, 2021.
4. A. M. Azab, P. Ning, J. Shah, Q. Chen, R. Bhutkar, G. Ganesh, J. Ma, and W. Shen, "Hypervision across worlds: Real-time kernel protection from the arm trustzone secure world," in ACM Conference on Computer and Communications Security (CCS), 2014.
5. X. Ge and T. Jaeger, "Sprobes: Enforcing Kernel Code Integrity on the TrustZone Architecture," in Mobile Security Technologies Workshop (MoST), 2014.