Tag

tee

0 views collected around this technical thread.

Deepin Linux
Deepin Linux
Jan 23, 2025 · Backend Development

Zero‑Copy Techniques in Linux: sendfile, mmap, splice and tee

This article explains the concept of zero‑copy in Linux, compares the four main system calls—sendfile, mmap, splice and tee—describes their APIs, internal mechanisms, performance characteristics, typical use‑cases and provides practical code examples for high‑performance network programming.

LinuxMMAPZero Copy
0 likes · 37 min read
Zero‑Copy Techniques in Linux: sendfile, mmap, splice and tee
AntTech
AntTech
Oct 22, 2024 · Information Security

Asterinas Confidential Computing Platform: Architecture, Core Components, and Real‑World Applications

The Asterinas open‑source confidential computing stack, released by leading Chinese research institutions and Ant Group, combines HyperEnclave, Occlum, and TrustFlow to provide a secure, nationally‑trusted TEE foundation for cloud, AI, and data‑intensive workloads, addressing the shortcomings of existing commercial TEEs and enabling trustworthy data flow across diverse industries.

AsterinasCloud SecurityOpen-source
0 likes · 8 min read
Asterinas Confidential Computing Platform: Architecture, Core Components, and Real‑World Applications
AntTech
AntTech
Oct 18, 2024 · Information Security

CNCC2024 Confidential Computing Forum – Schedule, Speakers, and Research Abstracts

The second Confidential Computing Forum at CNCC2024, held on October 26 in Hangzhou, gathers leading experts to discuss TEE‑based secure computing, present cutting‑edge research on confidentiality, side‑channel attacks, collaborative trust, and cryptographic applications, and outlines future directions for data security in the digital economy.

Data Securityconfidential computinginformation security
0 likes · 10 min read
CNCC2024 Confidential Computing Forum – Schedule, Speakers, and Research Abstracts
AntTech
AntTech
Apr 24, 2024 · Information Security

Beijing FinTech Alliance Releases Privacy Computing Interoperability Platform Technical Specification

Under the guidance of the People’s Bank of China, the Beijing FinTech Industry Alliance has published the 'Financial Industry Privacy Computing Interconnection Platform Technical Specification', a standard co‑authored by China UnionPay, major banks, universities, tech firms and telecom operators, with Ant Group playing a key role.

Ant GroupStandardfinancial technology
0 likes · 4 min read
Beijing FinTech Alliance Releases Privacy Computing Interoperability Platform Technical Specification
AntTech
AntTech
Jul 19, 2023 · Information Security

IEEE 2952-2023 Standard for Secure Computing Based on Trusted Execution Environment – Technical Overview

The IEEE 2952-2023 standard, jointly released by Ant Group and multiple partners, defines a comprehensive technical framework for secure computing using Trusted Execution Environments, covering isolation, confidentiality, compatibility, performance, availability, and security, and outlines reference implementations, cluster management, and remote attestation mechanisms.

IEEE Standardconfidential computingsecure computing
0 likes · 7 min read
IEEE 2952-2023 Standard for Secure Computing Based on Trusted Execution Environment – Technical Overview
AntTech
AntTech
Jul 7, 2023 · Information Security

Ant Group Announces Open‑Source Privacy Computing Framework “YinYu 1.0” and the First Domestic Financial‑Grade TEE Solution “HyperEnclave”

At the 2023 World AI Conference summit, Ant Group unveiled its YinYu Open‑Source Framework 1.0 and the HyperEnclave financial‑grade TEE, detailing their technical features, industry‑wide standards contributions, and how they aim to boost the usability, security, and interoperability of privacy computing for AI applications.

AIAnt GroupData Security
0 likes · 7 min read
Ant Group Announces Open‑Source Privacy Computing Framework “YinYu 1.0” and the First Domestic Financial‑Grade TEE Solution “HyperEnclave”
AntTech
AntTech
Jun 28, 2023 · Information Security

Research Report on Interoperability of Heterogeneous Trusted Execution Environments in Financial Privacy Computing

The report details a collaborative effort led by UnionPay and Ant Group to create a unified remote attestation framework that enables interoperability among diverse TEE solutions, demonstrating successful integration of five major TEE platforms and highlighting the significance for secure data flow in the financial sector.

Data Securityfinancial technologysecure enclave
0 likes · 6 min read
Research Report on Interoperability of Heterogeneous Trusted Execution Environments in Financial Privacy Computing
OPPO Kernel Craftsman
OPPO Kernel Craftsman
Jun 2, 2023 · Mobile Development

Android File‑Based Encryption (FBE) Key Management and Architecture Overview

The article explains Android’s multi‑layered file‑based encryption system, describing how FDE, FBE and metadata encryption work together, and detailing the end‑to‑end key‑management flow that spans the HAL, VOLD, Linux kernel, fscrypt, the Trusted Execution Environment and hardware crypto engines to generate, derive, and program per‑file encryption keys.

AndroidFile-Based Encryptionkernel
0 likes · 21 min read
Android File‑Based Encryption (FBE) Key Management and Architecture Overview
vivo Internet Technology
vivo Internet Technology
Apr 5, 2023 · Information Security

TrustZone Architecture: Hardware-Level Privacy Protection for Smartphones

TrustZone implements a hardware‑level privacy shield for smartphones by partitioning CPU, bus, memory, peripherals and interrupts into a Secure World and a Normal World, using ARMv8 exception levels and extensions such as SCR, TZPC, TZASC, GIC and MMU to isolate user data from non‑secure software.

ARM SecurityMemory ProtectionMobile Security
0 likes · 12 min read
TrustZone Architecture: Hardware-Level Privacy Protection for Smartphones
DataFunSummit
DataFunSummit
Mar 13, 2023 · Information Security

Unified Remote Attestation for TEE Interoperability: A Practical Overview

This article presents a comprehensive overview of TEE interoperability, describing the background of trusted execution environments, their remote attestation processes, a unified remote attestation framework, and the overall strategy for achieving cross‑TEE compatibility, including open‑source implementations and future directions.

Remote AttestationUnified Attestationinteroperability
0 likes · 9 min read
Unified Remote Attestation for TEE Interoperability: A Practical Overview
DataFunSummit
DataFunSummit
Feb 12, 2023 · Information Security

Privacy Computing: Technical Routes Overview and Ant Group’s Contributions

This article introduces and compares major privacy computing technologies—including MPC, federated learning, TEE, and proxy MPC—evaluating them across security, development cost, operational cost, accuracy, performance, participant scale, control, hardware cost, and trust, and then outlines Ant Group’s privacy computing framework, applications, and standards work.

Ant GroupData SecurityFederated Learning
0 likes · 8 min read
Privacy Computing: Technical Routes Overview and Ant Group’s Contributions
OPPO Kernel Craftsman
OPPO Kernel Craftsman
Dec 16, 2022 · Information Security

Analysis of OP-TEE SFS Secure Storage Implementation (OPTEE 3.18)

The article examines OP‑TEE 3.18’s SFS secure storage, detailing its GP API, kernel file‑system module, REE daemon interactions, file format with header, hash‑tree nodes, key hierarchy (SSK, TSK, FEK), and encryption using AES‑GCM, and highlights the single‑point‑of‑failure risk of the dirf.db directory.

EncryptionFile SystemOP-TEE
0 likes · 13 min read
Analysis of OP-TEE SFS Secure Storage Implementation (OPTEE 3.18)
AntTech
AntTech
Dec 14, 2022 · Artificial Intelligence

Privacy-Preserving Machine Learning for AI and Big Data Using Intel SGX, Occlum, and BigDL PPML

This article presents an end‑to‑end privacy‑preserving machine‑learning solution for AI and big‑data workloads built on Intel SGX, the open‑source TEE OS Occlum, and BigDL PPML, detailing its architecture, key features, deployment steps, and real‑world applications.

Big DataSGXdistributed computing
0 likes · 15 min read
Privacy-Preserving Machine Learning for AI and Big Data Using Intel SGX, Occlum, and BigDL PPML
OPPO Kernel Craftsman
OPPO Kernel Craftsman
Dec 2, 2022 · Information Security

Understanding ARM TrustZone TEE and SMC Calls: Architecture, Conventions, and Implementation

The article explains how ARM TrustZone creates a Secure World Trusted Execution Environment, details the REE‑to‑TEE interaction via Secure Monitor Calls, outlines AArch32/AArch64 register conventions, fast versus yielding SMCs, service registration, and the low‑level boot and handling flow of the Secure Monitor.

ARMKernelSMC
0 likes · 14 min read
Understanding ARM TrustZone TEE and SMC Calls: Architecture, Conventions, and Implementation
DataFunSummit
DataFunSummit
Nov 28, 2022 · Artificial Intelligence

Introduction to Federated Learning: Concepts, Key Technologies, and the Dianshi Federated Learning Platform

This article introduces the concept of federated learning, outlines its industry opportunities and challenges, explains the evolution of data‑sharing technologies, details core techniques such as MPC, TEE, and differential privacy, and presents the architecture and capabilities of the Dianshi federated learning platform.

AIFederated LearningMPC
0 likes · 20 min read
Introduction to Federated Learning: Concepts, Key Technologies, and the Dianshi Federated Learning Platform
DataFunSummit
DataFunSummit
Sep 18, 2022 · Information Security

Privacy Computing and Blockchain: Enabling Secure Data Collaboration

This article explains how privacy computing technologies such as federated learning, multi‑party computation, and trusted execution environments, combined with blockchain, address data sharing challenges in the digital economy by protecting privacy, ensuring compliance, and enabling secure, trusted collaboration across enterprises and government agencies.

BlockchainData SecuritySecure Data Sharing
0 likes · 11 min read
Privacy Computing and Blockchain: Enabling Secure Data Collaboration
DataFunSummit
DataFunSummit
Sep 11, 2022 · Information Security

Privacy and Reliability in Big Data Collaboration: Trusted Execution Environments and Blockchain Coordination

This article presents a technical overview of the security challenges in multi‑party big‑data collaboration and explains how Trusted Execution Environments (TEE) and blockchain can be combined to protect data privacy, ensure computation integrity, and enable traceable data usage in distributed systems.

Big DataBlockchaindistributed computing
0 likes · 12 min read
Privacy and Reliability in Big Data Collaboration: Trusted Execution Environments and Blockchain Coordination
AntTech
AntTech
Apr 6, 2021 · Information Security

Confidential Computing: Challenges, Solutions, and the Role of Rust in the SOFAEnclave Stack

The article explains how confidential computing, built on trusted execution environments like Intel SGX, addresses data‑in‑use security, outlines the technical hurdles developers face, and showcases Ant Group's open‑source SOFAEnclave components—Occlum, HyperEnclave, and KubeTEE—highlighting Rust’s pivotal contribution.

Cloud SecurityKubernetesRust
0 likes · 13 min read
Confidential Computing: Challenges, Solutions, and the Role of Rust in the SOFAEnclave Stack
OPPO Kernel Craftsman
OPPO Kernel Craftsman
Mar 5, 2021 · Information Security

Introduction to TEE (Trusted Execution Environment) and Its Application in Fingerprint Authentication

The article explains how Trusted Execution Environments (TEE), built on ARM TrustZone, provide a secure world separate from the Rich Execution Environment, detailing its architecture, GP API interactions, and how fingerprint enrollment and authentication are performed within TEE to protect sensitive biometric data.

ARM TrustZoneGP APIMobile Security
0 likes · 10 min read
Introduction to TEE (Trusted Execution Environment) and Its Application in Fingerprint Authentication
AntTech
AntTech
Jan 20, 2021 · Information Security

IEEE Approves First TEE-Based Secure Computing Standard Led by Ant Group

Ant Group has led the IEEE to approve the world’s first standard for secure computing based on Trusted Execution Environments (TEE), outlining framework, functions, and security requirements, and aims to protect data privacy and sensitive code across cloud, blockchain, AI, and other emerging applications.

IEEE Standarddata privacyinformation security
0 likes · 6 min read
IEEE Approves First TEE-Based Secure Computing Standard Led by Ant Group