Trusted Execution Environment
Trusted Execution Environment
| Seminare | 2 SWS / 5 ECTS | 
| Veranstalter: | Fabian Franzen | 
| Zeit und Ort: | Preliminary Meeting: Monday, 13 July 2020, 14.30 till 15.15 h, Online Konferenz [Slides], Link: https://s.fhg.de/in-tum-seminare-wise20  | 
	  
| Beginn: | 
Course organizers
- Hendrik Meyer zum Felde
 - Christian Epple
 
Contents
Participants independently write a seminar paper about a challenging scientific topic and present, analyze, evaluate and discuss the results. The paper summarizes the essential concepts of the topic and includes a list of references.
Possible topics include:
- TEEs in general
- Comparison of existing Trusted Execution Environments (AMD SEV, ARM TrustZone, Intel SGX, ...)
 - Survey on the Effect of Plundervolt on TEEs
 - Survey on SDKs for Trusted Execution Environments
 - Intel (MK)TME as competitor to AMD SME/SEV
 - Keystone Enclaves on Risc-V
 
 - Intel Software Guard Extensions (SGX):
- Limitations and Possibilities of Intel SGX Enclaves with respect to communication and interaction with a TPM
 - Exploiting Speculative Execution
 - Emulating TPMs Using Secure Enclave Technologies
 
 - AMD Secure Encrypted Virtualization (SEV)
- Exploiting AMD SEV's missing integrity protection
 - Attacking AMD SEV's memory encryption
 
 
Students can also propose own topics.
Maximum number of participants: 10 students
