SoK: A Systematic Review of TEE Usage for Developing Trusted Applications

Arttu Paju, Muhammad Owais Javed, Juha Nurmi, Juha Savimäki, Brian McGillion, Billy Bob Brumley

Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

4 Citations (Scopus)
145 Downloads (Pure)

Abstract

Trusted Execution Environments (TEEs) are a feature of modern central processing units (CPUs) that aim to provide a high assurance, isolated environment in which to run workloads that demand both confidentiality and integrity. Hardware and software components in the CPU isolate workloads, commonly referred to as Trusted Applications (TAs), from the main operating system (OS). This article aims to analyse the TEE ecosystem, determine its usability, and suggest improvements where necessary to make adoption easier. To better understand TEE usage, we gathered academic and practical examples from a total of 223 references. We summarise the literature and provide a publication timeline, along with insights into the evolution of TEE research and deployment. We categorise TAs into major groups and analyse the tools available to developers. Lastly, we evaluate trusted container projects, test performance, and identify the requirements for migrating applications inside them.
Original languageEnglish
Title of host publicationARES 2023 - 18th International Conference on Availability, Reliability and Security, Proceedings
PublisherACM
ISBN (Electronic)979-8-4007-0772-8
DOIs
Publication statusPublished - 29 Aug 2023
Publication typeA4 Article in conference proceedings
Event International Conference on Availability, Reliability and Security - Benevento, Italy
Duration: 29 Aug 20231 Sept 2023

Conference

Conference International Conference on Availability, Reliability and Security
Country/TerritoryItaly
CityBenevento
Period29/08/231/09/23

Publication forum classification

  • Publication forum level 1

Fingerprint

Dive into the research topics of 'SoK: A Systematic Review of TEE Usage for Developing Trusted Applications'. Together they form a unique fingerprint.

Cite this