ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1903.04203
  4. Cited By
Security, Performance and Energy Trade-offs of Hardware-assisted Memory
  Protection Mechanisms
v1v2 (latest)

Security, Performance and Energy Trade-offs of Hardware-assisted Memory Protection Mechanisms

11 March 2019
Christian Gottel
Rafael Pires
Isabelly Rocha
Sébastien Vaucher
Pascal Felber
Marcelo Pasin
V. Schiavoni
ArXiv (abs)PDFHTML

Papers citing "Security, Performance and Energy Trade-offs of Hardware-assisted Memory Protection Mechanisms"

12 / 12 papers shown
Characterizing Trust Boundary Vulnerabilities in TEE Containers
Characterizing Trust Boundary Vulnerabilities in TEE Containers
Weijie Liu
H. G. Chen
Shuo Huai
Zhen Xu
W. Wang
Zhi Li
Zheli Liu
85
1
0
28 Aug 2025
An Experimental Evaluation of TEE technology Evolution: Benchmarking
  Transparent Approaches based on SGX, SEV, and TDX
An Experimental Evaluation of TEE technology Evolution: Benchmarking Transparent Approaches based on SGX, SEV, and TDXComputers & security (Comput. Secur.), 2024
L. Coppolino
S. DÁntonio
Davide Iasio
Giovanni Mazzeo
L. Romano
ELM
101
7
0
01 Aug 2024
Flexible remote attestation of pre-SNP SEV VMs using SGX enclaves
Flexible remote attestation of pre-SNP SEV VMs using SGX enclavesIEEE Access (IEEE Access), 2023
P. Antonino
Ante Derek
Wojciech Aleksander Wołoszyn
165
7
0
16 May 2023
Speeding up enclave transitions for IO-intensive applications
Speeding up enclave transitions for IO-intensive applications
Jakob Svenningsson
Nicolae Paladi
A. Vahidi
71
1
0
14 Dec 2021
Understanding TEE Containers, Easy to Use? Hard to Trust
Understanding TEE Containers, Easy to Use? Hard to Trust
Weijie Liu
Hongbo Chen
Luyi Xing
Zhi Li
Qiang Yan
Wenhao Wang
Haixu Tang
89
12
0
04 Sep 2021
IChannels: Exploiting Current Management Mechanisms to Create Covert
  Channels in Modern Processors
IChannels: Exploiting Current Management Mechanisms to Create Covert Channels in Modern ProcessorsInternational Symposium on Computer Architecture (ISCA), 2021
Jawad Haj-Yahya
Jeremie S. Kim
A. G. Yaglikçi
Ivan Puddu
Lois Orosa
Juan Gómez Luna
M. Alser
O. Mutlu
241
17
0
09 Jun 2021
SERVAS! Secure Enclaves via RISC-V Authenticryption Shield
SERVAS! Secure Enclaves via RISC-V Authenticryption ShieldEuropean Symposium on Research in Computer Security (ESORICS), 2021
Stefan Steinegger
David Schrammel
Samuel Weiser
Pascal Nasahl
Stefan Mangard
136
12
0
07 May 2021
WELES: Policy-driven Runtime Integrity Enforcement of Virtual Machines
WELES: Policy-driven Runtime Integrity Enforcement of Virtual Machines
W. Ożga
D. Quoc
Christof Fetzer
72
2
0
30 Apr 2021
KEVLAR-TZ: A Secure Cache for ARM TrustZone
KEVLAR-TZ: A Secure Cache for ARM TrustZoneIFIP International Conference on Distributed Applications and Interoperable Systems (DAIS), 2021
Oscar Benedito
R. Delgado-Gonzalo
V. Schiavoni
179
3
0
27 Apr 2021
Performance Analysis of Scientific Computing Workloads on Trusted
  Execution Environments
Performance Analysis of Scientific Computing Workloads on Trusted Execution Environments
Ayaz Akram
Anna Giannakou
V. Akella
Jason Lowe-Power
S. Peisert
90
8
0
25 Oct 2020
Distributed systems and trusted execution environments: Trade-offs and
  challenges
Distributed systems and trusted execution environments: Trade-offs and challenges
Rafael Pires
162
1
0
27 Jan 2020
Using Trusted Execution Environments for Secure Stream Processing of
  Medical Data
Using Trusted Execution Environments for Secure Stream Processing of Medical DataIFIP International Conference on Distributed Applications and Interoperable Systems (DAIS), 2019
Carlos Segarra
R. Delgado-Gonzalo
M. Lemay
Pierre-Louis Aublin
Peter R. Pietzuch
V. Schiavoni
113
23
0
17 Jun 2019
1
Page 1 of 1