安全之安全(security²)博客目录导读 目录 [1] Muñoz-Gallego A J, Rios-del-Pozo R, Roman-Castro R, et al. A survey on the (in) security of trusted execution environments[J]. 2023. [2] Zhu Q, Chen Q, Liu Y, et al. Investigating TrustZone: A Comprehensive Analysis[J]. Security and Communication Networks, 2023. [3] Koutroumpouchos N , Ntantogian C , Xenakis C .Building Trust for Smart Connected Devices: The Challenges and Pitfalls of TrustZone[J].Sensors, 2021, 21(2):520.DOI:10.3390/s21020520. [4] D. Cerdeira, N. Santos, P. Fonseca and S. Pinto, "SoK: Understanding the Prevailing Security Vulnerabilities in TrustZone-assisted TEE Systems," 2020 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, 2020, pp. 1416-1432, doi: 10.1109/SP40000.2020.00061. [5] Pinto S , Santos N .Demystifying Arm TrustZone: A Comprehensive Survey[J].ACM Computing Surveys, 2019, 51(6):1-36.DOI:10.1145/3291047. 以时间顺序(由近及远) [1] Muñoz-Gallego A J, Rios-del-Pozo R, Roman-Castro R, et al. A survey on the (in) security of trusted execution environments[J]. 2023. [2] Zhu Q, Chen Q, Liu Y, et al. Investigating TrustZone: A Compre