SoK: How not to architect your next-generation TEE malware?
Besides Intel’s SGX technology, there are long-running discussions on how trusted computing technologies can be used to cloak malware. Past research showed example methods of malicious activities utilising Flicker, Trusted Platform Module, and recently integrating with enclaves. We observe two ambig...
Main Authors: | , , , , |
---|---|
Format: | Conference item |
Language: | English |
Published: |
Association for Computing Machinery
2023
|