and Mobile Computing, Networking and Communica-
tions.
Di Martino, B., Rak, M., Ficco, M., Esposito, A., Maisto,
S., and Nacchia, S. (2018). Internet of things reference
architectures, security and interoperability: A survey.
Internet of Things, 1:99–112.
Guan, L., Cao, C., Liu, P., Xing, X., Ge, X., Zhang, S., Yu,
M., and Jaeger, T. (2019). Building a trustworthy exe-
cution environment to defeat exploits from both cyber
space and physical space for arm. IEEE Transactions
on Dependable and Secure Computing, 16(3).
Intel (2016a). Intel Software Guard Extensions Developer
Guide. Intel Corporation.
Intel (2016b). Intel Software Guard Extensions SDK for
Linux OS Developer Reference. Intel Corporation.
Jain, P., Desai, S., Kim, S., Shih, M.-W., Lee, J., Choi, C.,
Shin, Y., Kim, T., Kang, B. B., and Han, D. (2016).
OpenSGX: An open platform for SGX research. In
Proc. of the Network and Distributed System Security
Symposium, San Diego, CA, USA. Internet Society.
Kouicem, D. E., Bouabdallah, A., and Lakhlef, H. (2018).
Internet of things security: A top-down survey. Com-
puter Networks, 141.
Kulkarni, V., Chapuis, B., and Garbinato, B. (2017).
Privacy-preserving location-based services by using
intel sgx. In Proceedings of the First International
Workshop on Human-Centered Sensing, Networking,
and Systems, New York, NY, USA. ACM.
Lesjak, C., Hein, D., and Winter, J. (2015). Hardware-
security technologies for industrial iot: Trustzone and
security controller. In 41st Annual Conference of the
IEEE Industrial Electronics Society.
Liang, X., Shetty, S., Zhao, J., Bowden, D., Li, D., and Liu,
J. (2017). Towards decentralized accountability and
self-sovereignty in healthcare systems. In Proceed-
ings of the International Conference on Information
and Communications Security.
Lipp, M., Gruss, D., Spreitzer, R., Maurice, C., and Man-
gard, S. (2016). Armageddon: Cache attacks on mo-
bile devices. In 25th USENIX Security Symposium),
Austin, TX. USENIX Association.
McKeen, F., Alexandrovich, I., Berenzon, A., Rozas, C. V.,
Shafi, H., Shanbhogue, V., and Savagaonkar, U. R.
(2013). Innovative instructions and software model
for isolated execution. In Proceedings of the 2nd In-
ternational Workshop on Hardware and Architectural
Support for Security and Privacy, Tel-Aviv, Israel.
ACM.
Milutinovic, M., He, W., Wu, H., and Kanwal, M. (2016).
Proof of luck: An efficient blockchain consensus pro-
tocol. In Proceedings of the 1st Workshop on System
Software for Trusted Execution, SysTEX ’16, New
York, NY, USA. Association for Computing Machin-
ery.
Moghimi, A., Irazoqui, G., and Eisenbarth, T. (2017).
CacheZoom: How SGX amplifies the power of cache
attacks. In Proceedings of the International Confer-
ence on Cryptographic Hardware and Embedded Sys-
tems, pages 69–90, Taipei, Taiwan. Springer.
Nguyen, H., Ivanov, R., Phan, L. T. X., Sokolsky, O.,
Weimer, J., and Lee, I. (2018). LogSafe: Secure and
Scalable Data Logger for IoT Devices. In IEEE/ACM
Third International Conference on Internet-of-Things
Design and Implementation (IoTDI), pages 141–152.
Ning, Z., Zhang, F., Shi, W., and Shi, W. (2017). Position
paper: Challenges towards securing hardware-assisted
execution environments. In Proceedings of the Hard-
ware and Architectural Support for Security and Pri-
vacy, New York, NY, USA. ACM.
Park, J. and Kwangjo Kim (2017). Tm-coin: Trustworthy
management of tcb measurements in iot. In IEEE In-
ternational Conference on Pervasive Computing and
Communications Workshops.
Peters, T., Lal, R., Varadarajan, S., Pappachan, P., and Kotz,
D. (2018). BASTION-SGX: Bluetooth and Architec-
tural Support for Trusted I/O on SGX. In Proc. of the
Intl Workshop on Hardware and Architectural Support
for Security and Privacy, New York, NY, USA. ACM.
Pettersen., R., Johansen., H. D., and Johansen., D. (2017).
Secure edge computing with arm trustzone. In Proc.
of the 2nd Intl Conference on Internet of Things, Big
Data and Security. INSTICC, SciTePress.
Pinto, S., Pereira, J., Gomes, T., Tavares, A., and Cabral, J.
(2017). Ltzvisor: Trustzone is the key. In Proceed-
ings of the 29th Euromicro Conference on Real-Time
Systems (ECRTS).
Pinto, S. and Santos, N. (2019). Demystifying arm trust-
zone: A comprehensive survey. ACM Comput. Surv.,
51(6).
Sabt, M., Achemlal, M., and Bouabdallah, A. (2015).
Trusted execution environment: What it is, and what
it is not. In 2015 IEEE Trustcom/BigDataSE/ISPA,
volume 1, pages 57–64.
Sampaio, L., Silva, F., Souza, A., Brito, A., and Felber, P.
(2017). Secure and privacy-aware data dissemination
for cloud-based applications. In Proceedings of the
10th International Conference on Utility and Cloud
Computing, page 47–56, New York, NY, USA. ACM.
Schwarz, M., Weiser, S., Gruss, D., Maurice, C., and Man-
gard, S. (2017). Malware Guard Extension: Using
SGX to conceal cache attacks. In Proceedings of
the 14th International Conference on Detection of In-
trusions and Malware, and Vulnerability Assessment,
Bonn, Alemanha. Springer.
Shih, M.-W., Lee, S., Kim, T., and Peinado, M. (2017). T-
SGX: Eradicating controlled-channel attacks against
enclave programs. In Proceedings of the Network and
Distributed System Security Symposium, San Diego,
CA, USA. Internet Society.
Silva, L., Barbosa, P., Silva, R., and Brito, A. (2018). Secu-
rity and privacy aware data aggregation on cloud com-
puting. Journal of Internet Services and Applications,
9.
Surdu, O. (2018). Reliable and secure firmware up-
date for internet of things (iot) devices. US Patent
US20180081666A1.
Valadares, D. C. G., da Silva, M. S. L., Brito, A. E. M.,
and Salvador, E. M. (2018). Achieving data dissem-
ination with security using FIWARE and Intel Soft-
ware Guard Extensions (SGX). In Proc. of the IEEE
Symposium on Computers and Communications, Na-
tal, RN, Brazil.
CLOSER 2021 - 11th International Conference on Cloud Computing and Services Science
120