Trusted Execution Environment
Trusted Execution Environment
Seminare | 2 SWS / 5 ECTS |
Veranstalter: | Fabian Franzen |
Zeit und Ort: | Preliminary Meeting: Monday, 13 July 2020, 14.30 till 15.15 h, Online Konferenz [Slides], Link: https://s.fhg.de/in-tum-seminare-wise20 |
Beginn: |
Course organizers
- Hendrik Meyer zum Felde
- Christian Epple
Contents
Participants independently write a seminar paper about a challenging scientific topic and present, analyze, evaluate and discuss the results. The paper summarizes the essential concepts of the topic and includes a list of references.
Possible topics include:
- TEEs in general
- Comparison of existing Trusted Execution Environments (AMD SEV, ARM TrustZone, Intel SGX, ...)
- Survey on the Effect of Plundervolt on TEEs
- Survey on SDKs for Trusted Execution Environments
- Intel (MK)TME as competitor to AMD SME/SEV
- Keystone Enclaves on Risc-V
- Intel Software Guard Extensions (SGX):
- Limitations and Possibilities of Intel SGX Enclaves with respect to communication and interaction with a TPM
- Exploiting Speculative Execution
- Emulating TPMs Using Secure Enclave Technologies
- AMD Secure Encrypted Virtualization (SEV)
- Exploiting AMD SEV's missing integrity protection
- Attacking AMD SEV's memory encryption
Students can also propose own topics.
Maximum number of participants: 10 students