## trusted execution environments


---- ### cool resources
##### full autonomous agents * **[setting your pet rock free, by teleport (2024)](https://medium.com/@tee_hee_he/setting-your-pet-rock-free-3e7895201f46)** * **[the truth of ai agents, by phala (2024)](https://phala.network/posts/truth-of-AI-Agent)** * **[physical unclonable functions for socially unpredictable humans, by sxysun (2024)](https://www.youtube.com/watch?v=aLqlpa8ZIOw)**
##### sgx stuff * **[linux instalation guides](https://download.01.org/intel-sgx/latest/linux-latest/docs)** * **[intel SGX explained, by costan et al.](https://eprint.iacr.org/2016/086.pdf)** * **[secure computation in rust: using intel's SGX with teaclave && fortanix](https://blog.lambdaclass.com/secure-computation-in-rust-using-intels-sgx-instructions-with-teaclave-and-fortanix/)** * **[2fa zk-rollups using sgx, by j. drake](https://ethresear.ch/t/2fa-zk-rollups-using-sgx/14462)** * **[why multi-prover matters, sgx as a possible solution, by taiko labs](https://taiko.mirror.xyz/Kx1Mp4WJjd83K1KDEwp1pM7xi9QmpSahxJg3S_N7NE4)** * **[autonomous tees manifest, by poeticte](https://poeticte.ch/posts/autonomous-TEEs-manifesto.html)** * **[hardware-supported trusted execution environments, by m. schneider et al.](https://arxiv.org/pdf/2205.12742)**
##### cloud providers and framework * **[nitro enclaves at aws](https://aws.amazon.com/ec2/nitro/nitro-enclaves/)** * **[a few notes on aws nitro enclaves: attack surface, by p. platek](https://blog.trailofbits.com/2024/09/24/notes-on-aws-nitro-enclaves-attack-surface/)** * **[keystone enclave (open framework for architecting tee)](https://keystone-enclave.org/)**
##### attestations


* **[fortanix](https://edp.fortanix.com/docs/examples/attestation/)** * **[automata](https://www.ata.network/)**
##### quantum settings * **[is the security of quantum cryptography guaranteed by the laws of physics?, by bernstein](https://arxiv.org/pdf/1803.04520)** * **[the laws of physics and cryptographic security; by rudolph](https://arxiv.org/pdf/quant-ph/0202143)** * **[qtee, sarching for security through physics](https://github.com/sbellem/qtee)** * **[introduction to quantum information, by bt3gl](https://www.astro.sunysb.edu/steinkirch/books/qi.pdf)**
##### offensive * **[securing tee apps: a developer's guide, by prateek et al. (2025)](https://www.bedlamresear.ch/posts/securing-tee-apps/)** * **[the 5 levels of secure hardware, by g. konstantopoulos (2024)](https://www.paradigm.xyz/2024/11/the-5-levels-of-secure-hardware)** * **[openai's take on ai infrastructure threat model (2024)](https://openai.com/index/reimagining-secure-infrastructure-for-advanced-ai/)** * **[using memory errors to attack a virtual machine, by govindavajhala et al.](https://www.cs.princeton.edu/~appel/papers/memerr.pdf)** * **ztee, trustless suply chains, by q. kilbourn: [part I](https://writings.flashbots.net/ZTEE) and [part II](https://writings.flashbots.net/ZTEE2-Supply-Chains)**
##### on blockchains * **[tees: a primer, by a. shidham (2025)](https://a16zcrypto.com/posts/article/trusted-execution-environments-tees-primer/)** * **[the road towards an encrypted mempool on ethereum, by shutter (2025)](https://docs.shutter.network/docs/shutter/research/the_road_towards_an_encrypted_mempool_on_ethereum)** * **[demystifying remote attestation by taking it on-chain, by flashbots](https://collective.flashbots.net/t/demystifying-remote-attestation-by-taking-it-on-chain/2629)** * **[spacecoin, by d. bar et al. (leveraging satellite infra for tee-like functionality)](https://github.com/spacecoinxyz/research/blob/main/publications/Blue-Paper-Spacecoinxyz.pdf)** * **[multi-prover implementation on scroll (leveraging tees)](https://scroll.io/blog/scaling-security)**
##### code * **[liquefaction](https://github.com/key-encumbrance/liquefaction)** * smart contract key-encumbered wallet platform (i.e., key is not known by user or or admin, but generated by the application running in a tee)