文章目录 AbstractIntroductionIsolation Support For Trusted ExecutionHardware TEEsOS Support Within TEEsThreatModel and System RequirementExisting isolation Approachs Spons and ShieldsOverviewUse Cases for Spon and Shield SeparationSpon API SSF implementati…