Abstract
This chapter first introduces Trusted Execution Environments (TEEs) and presents high-level description of the protections offered to TEEs by the Trusted Computer Base (TCB), and how the protections can be realized. It then presents a list of existing academic and commercial secure processor architectures, and the types of TEEs they offer as examples of possible design choices. It also presents TEE-related assumptions. The chapter closes by listing limitations of today’s TCBs and the TEEs they create.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Szefer, J. (2019). Trusted Execution Environments. In: Principles of Secure Processor Architecture Design. Synthesis Lectures on Computer Architecture. Springer, Cham. https://doi.org/10.1007/978-3-031-01760-5_4
Download citation
DOI: https://doi.org/10.1007/978-3-031-01760-5_4
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-00632-6
Online ISBN: 978-3-031-01760-5
eBook Packages: Synthesis Collection of Technology (R0)eBColl Synthesis Collection 8