“We dig into the inner workings of trustlets, how different components work together to provide a Trusted Execution Environment, and how to attack them.[…]”
https://www.synopsys.com/blogs/software-security/cve-2020-7958-trustlet-tee-attack/
https://www.synopsys.com/blogs/software-security/cve-2020-7958/