May 26, 2022, 1:20 a.m. | Liwei Guo, Kaiyang Zhao, Yiying Zhang, Felix Xiaozhu Lin

cs.CR updates on arXiv.org arxiv.org

A TrustZone TEE often invokes an external filesystem. While filedata can be
encrypted, the revealed file activities can leak secrets. To hide the file
activities from the filesystem and its OS, we propose Enigma, a deception-based
defense injecting sybil file activities as the cover of the actual file
activities.


Enigma contributes three new designs. (1) To make the deception credible, the
TEE generates sybil calls by replaying file calls from the TEE code under
protection. (2) To make sybil activities …

arm deception

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Information Security Engineers

@ D. E. Shaw Research | New York City

Werkstudent (w/m/d) - Cyber Security

@ IONOS | Karlsruhe, Germany

Security Operations Manager

@ BambooHR | Utah | Hybrid

Senior Risk and Compliance Analyst

@ Cricket.com | Hyderabad

Cyber Security Architect

@ Lilium | Munich