目录 ABSTRACTINTRODUCTIONBACKGROUND AND MOTIVATIONTrusted Execution Environments (TEEs)Conventional FPGA Security MechanismsRemote FPGAs-as-a-ServiceChallenges for Secure and Customized ComputingA lack of asymmetric keys.Presence of an untrusted ShellLack …