Trusted execution environment

0Citations
Citations of this article
20Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Trusted execution environments are secure areas of central processors or devices that execute code with higher security than the rest of the device. Security is provided by encrypted memory regions called enclaves. Because the environment is isolated from the rest of the device, it is not affected by infection or compromise of the device. Trusted execution environments have applications for different usages, such as mobile phones, cloud data processing, or cryptocurrencies. Furthermore, since Trusted execution environments are part of a standard chipset, this inexpensive technology can be leveraged across many devices, resulting in increased security, especially in the mobile sector and IoT products.

Cite

CITATION STYLE

APA

Sommerhalder, M. (2023). Trusted execution environment. In Trends in Data Protection and Encryption Technologies (pp. 95–101). Springer Nature. https://doi.org/10.1007/978-3-031-33386-6_18

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free