Send email Copy Email Address
2024-04-10

Memory Corruption at the Border of Trusted Execution

Summary

Trusted execution environments provide strong security guarantees, like isolation and confidentiality, but are not immune from memory-safety violations. Our investigation of public trusted execution environment code based on symbolic execution and fuzzing reveals subtle memory safety issues.

Article

Date published

2024-04-10

Date last modified

2024-08-14