Publication
Security and privacy-sensitive smartphone applications use trusted execution environments (TEEs) to protect sensitive operations from malicious code. By design, TEEs have privileged access to the entire system but expose little to no insight into their inner workings. Moreover, real-world TEEs enforce strict format and protocol interactions when communicating with trusted applications (TAs), which prohibits effective automated testing.
Edouard Bugnion, Neelu Shivprakash Kalani
Adrien Ghosn, Edouard Bugnion, Evangelos Marios Kogias, Mathias Josef Payer, Charly Nicolas Lucien Castes, Yuchen Qian, Neelu Shivprakash Kalani