TUM Logo

Trusted Execution Environment

Trusted Execution Environment  

Seminare 2 SWS / 5 ECTS
Veranstalter: Fabian Franzen
Zeit und Ort:

Preliminary Meeting: Monday, 13 July 2020, 14.30 till 15.15 h, Online Konferenz [Slides], Link:


Course organizers

  • Hendrik Meyer zum Felde
  • Christian Epple


Participants independently write a seminar paper about a challenging scientific topic and present, analyze, evaluate and discuss the results. The paper summarizes the essential concepts of the topic and includes a list of references.

Possible topics include:

  • TEEs in general
    • Comparison of existing Trusted Execution Environments (AMD SEV, ARM TrustZone, Intel SGX, ...)
    • Survey on the Effect of Plundervolt on TEEs
    • Survey on SDKs for Trusted Execution Environments
    • Intel (MK)TME as competitor to AMD SME/SEV
    • Keystone Enclaves on Risc-V
  • Intel Software Guard Extensions (SGX):
    • Limitations and Possibilities of Intel SGX Enclaves with respect to communication and interaction with a TPM
    • Exploiting Speculative Execution
    • Emulating TPMs Using Secure Enclave Technologies
  • AMD Secure Encrypted Virtualization (SEV)
    • Exploiting AMD SEV's missing integrity protection
    • Attacking AMD SEV's memory encryption

Students can also propose own topics.

Maximum number of participants: 10 students