SoK: How not to architect your next-generation TEE malware?

Besides Intel’s SGX technology, there are long-running discussions on how trusted computing technologies can be used to cloak malware. Past research showed example methods of malicious activities utilising Flicker, Trusted Platform Module, and recently integrating with enclaves. We observe two ambig...

Full description

Bibliographic Details
Main Authors: Kucuk, KA, Moyle, S, Martin, A, Mereacre, A, Allott, N
Format: Conference item
Language:English
Published: Association for Computing Machinery 2023