Abstract
Trusted Execution Environments (TEEs) are a feature of modern central processing units (CPUs) that aim to provide a high assurance, isolated environment in which to run workloads that demand both confidentiality and integrity. Hardware and software components in the CPU isolate workloads, commonly referred to as Trusted Applications (TAs), from the main operating system (OS). This article aims to analyse the TEE ecosystem, determine its usability, and suggest improvements where necessary to make adoption easier. To better understand TEE usage, we gathered academic and practical examples from a total of 223 references. We summarise the literature and provide a publication timeline, along with insights into the evolution of TEE research and deployment. We categorise TAs into major groups and analyse the tools available to developers. Lastly, we evaluate trusted container projects, test performance, and identify the requirements for migrating applications inside them.
Author supplied keywords
Cite
CITATION STYLE
Paju, A., Javed, M. O., Nurmi, J., Savimäki, J., McGillion, B., & Brumley, B. B. (2023). SoK: A Systematic Review of TEE Usage for Developing Trusted Applications. In ACM International Conference Proceeding Series. Association for Computing Machinery. https://doi.org/10.1145/3600160.3600169
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.