How trusted execution environments fuel research on microarchitectural attacks

Michael Schwarz, Daniel Gruss

Research output: Contribution to journalArticlepeer-review


Trusted execution environments (TEEs) enabled research in scenarios where highest-privileged attackers had precise control over systems and microarchitecture. Insights gained from such attacks facilitated the discovery of non-TEE attacks, such as Spectre (as well as Foreshadow from within virtual machines).

Original languageEnglish
Article number9107096
Pages (from-to)18-27
Number of pages10
JournalIEEE Security & Privacy
Issue number5
Publication statusPublished - 1 Sept 2020

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Electrical and Electronic Engineering
  • Law

Cite this