Filters








164 Hits in 2.7 sec

Trusted computing building blocks for embedded linux-based ARM trustzone platforms

Johannes Winter
2008 Proceedings of the 3rd ACM workshop on Scalable trusted computing - STC '08  
ARM follows a different approach to mobile platform security, by extending platforms with hardware supported ARM TrustZone security [3] mechanisms.  ...  The MTM specification [13] published by the TCG is a platform independent approach to Trusted Computing explicitly allowing for a wide range of potential implementations.  ...  A detailed discussion of the ARM TrustZone features, including an description of the closed-source TrustZone software stack developed by ARM and and Trusted Logic is given in [24] .  ... 
doi:10.1145/1456455.1456460 dblp:conf/ccs/Winter08 fatcat:x4waayswbzbwrlutiqngtweoyu

MQT-TZ: Hardening IoT Brokers Using ARM TrustZone [article]

Carlos Segarra and Ricard Delgado-Gonzalo and Valerio Schiavoni
2020 arXiv   pre-print
We define a mutual TLS-based handshake and a two-layer encryption for end-to-end security using the TEE as a trusted proxy.  ...  This paper presents MQT-TZ, a secure MQTT broker leveraging Arm TrustZone, a trusted execution environment (TEE) commonly found even on inexpensive devices largely available on the market (such as Raspberry  ...  Lastly, we plan to implement a proof of concept version of MQT-TZ leveraging alternative software development kits for TRUST-ZONE such as OPENENCLAVE (https://openenclave.io/sdk/) and alternative TRUSTZONE-enabled  ... 
arXiv:2007.12442v2 fatcat:sdoepy7yjrearktaqez3ei4emu

Trusted language runtime (TLR)

Nuno Santos, Himanshu Raj, Stefan Saroiu, Alec Wolman
2011 Proceedings of the 12th Workshop on Mobile Computing Systems and Applications - HotMobile '11  
The TLR is lightweight because 1) it makes use of ARM TrustZone, hardware support that offers rich trusted computing primitives, and 2) it leverages the .NET MicroFramework, a language runtime for embedded  ...  This paper presents the Trusted Language Runtime (TLR), a system for developing and running trusted applications on a smartphone.  ...  Acknowledgements: We would like to thank the anonymous reviewers and Jaeyeon Jung, our shepherd, for their feedback.  ... 
doi:10.1145/2184489.2184495 dblp:conf/wmcsa/SantosRSW11 fatcat:c24u7nzdyzdwvmivytzeyqvk64

Enabling Secure and Usable Mobile Application: Revealing the Nuts and Bolts of software TPM in todays Mobile Devices [article]

Ahmad-Atamli Reineh, Giuseppe Petracca, Janne Uusilehto, Andrew Martin
2016 arXiv   pre-print
In this paper we investigate the use of Trusted Platform Model (TPM) 2.0 to develop a secure application for smartphones using Windows Phone 8.1.  ...  In particular, we suggest a framework based on remote attestation as a proxy to authenticate remote services, where the device is associated to the user and replaces the users credentials.  ...  The authors would like to thank Andrew Paverd and Janne Uusilehto for many fruitful discussions.  ... 
arXiv:1606.02995v1 fatcat:c7ej4li4rvadnounxzjcsngzge

TrustOTP

He Sun, Kun Sun, Yuewu Wang, Jiwu Jing
2015 Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security - CCS '15  
In this paper, we present TrustOTP, a secure one-time password solution that can achieve both the flexibility of software tokens and the security of hardware tokens by using ARM TrustZone technique.  ...  As the smartphones are increasingly gaining popularity nowadays, software-based OTP generators have been developed and installed into smartphones as software apps, which bring great convenience to the  ...  [56] develops a flexible software emulation framework for TrustZone development.  ... 
doi:10.1145/2810103.2813692 dblp:conf/ccs/SunSWJ15 fatcat:wcyezrc5a5fupa4qewnsrwuzam

The Dual-Execution-Environment Approach: Analysis and Comparative Evaluation [chapter]

Mohamed Sabt, Mohammed Achemlal, Abdelmadjid Bouabdallah
2015 IFIP Advances in Information and Communication Technology  
We introduce a comparative framework allowing dual-EE solutions to be evaluated across a common set of criteria.  ...  In this paper, we revisit the dual-EE approach and propose a theoretical framework to systematize the design of dual-EE solutions regarding well-established primitives defined in the Multiple Independent  ...  As for ARM TrustZone, it comes close to perfect score.  ... 
doi:10.1007/978-3-319-18467-8_37 fatcat:ptha3ok5ovhrffoec4ghhrrs54

Open-TEE -- An Open Virtual Trusted Execution Environment

Brian McGillion, Tanel Dettenborn, Thomas Nyman, N. Asokan
2015 2015 IEEE Trustcom/BigDataSE/ISPA  
It allows developers to develop and debug trusted applications with the same tools they use for developing software in general.  ...  Tools and software needed to develop and debug trusted applications may be expensive or non-existent. In this paper, we describe Open-TEE, a virtual, hardware-independent TEE implemented in software.  ...  Acknowledgments: We thank the participants of the user study for their time and their useful feedback. Thanks to Kumaripaba Athukorala for advice on conducting the user study.  ... 
doi:10.1109/trustcom.2015.400 dblp:conf/trustcom/McGillionDNA15 fatcat:saxzddga3rezlcgfltlgpta3ay

TrustICE: Hardware-Assisted Isolated Computing Environments on Mobile Devices

He Sun, Kun Sun, Yuewu Wang, Jiwu Jing, Haining Wang
2015 2015 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks  
ARM TrustZone technology can protect secure code in a secure domain from an untrusted normal domain.  ...  We propose a novel TrustZonebased isolation framework named TrustICE to create isolated computing environments (ICEs) in the normal domain.  ...  Comparison with Other Solutions Emulated hardware platforms with TrustZone support have been developed [26] , [27] ; however, those emulation frameworks do not contain many useful security features of  ... 
doi:10.1109/dsn.2015.11 dblp:conf/dsn/SunSWJW15 fatcat:qharcdjt3rbdbe4ovnys2trd4u

uTango: an open-source TEE for IoT devices

Daniel Oliveira, Tiago Gomes, Sandro Pinto
2022 IEEE Access  
Recently, Arm has started to release Cortex-M MCUs enhanced with TrustZone technology (i.e., TrustZone-M), a system-wide security solution aiming at providing robust protection for IoT devices.  ...  We demonstrate the benefits of UTANGO by conducting an extensive evaluation on a real TrustZone-M hardware platform, i.e., Arm Musca-B1.  ...  and emulation.  ... 
doi:10.1109/access.2022.3152781 fatcat:u6dckk2ye5gzvcejg7z4nruk5u

uTango: an open-source TEE for IoT devices [article]

Daniel Oliveira, Tiago Gomes, Sandro Pinto
2022 arXiv   pre-print
Recently, Arm has started to release Cortex-M MCUs enhanced with TrustZone technology (i.e., TrustZone-M), a system-wide security solution aiming at providing robust protection for IoT devices.  ...  We demonstrate the benefits of uTango by conducting an extensive evaluation on a real TrustZone-M hardware platform, i.e., Arm Musca-B1. uTango will be open-sourced and freely available on GitHub in hopes  ...  Finally, ASSURED [27] proposes a secure firmware update framework for TrustZone-M devices. Reliable systems for MCU-powered IoT devices.  ... 
arXiv:2102.03625v2 fatcat:brmjvgd5k5e37ebrumm5dhj7e4

Trustworthy Execution on Mobile Devices: What Security Properties Can My Mobile Platform Give Me? [chapter]

Amit Vasudevan, Emmanuel Owusu, Zongwei Zhou, James Newsome, Jonathan M. McCune
2012 Lecture Notes in Computer Science  
We also highlight shortcomings of existing proposals and make recommendations for future research that may yield practical, deployable results.  ...  We systematize existing proposals for leveraging such primitives, and show that they can indeed strengthen the security properties available to applications and users, all without reducing the properties  ...  The views and conclusions contained here are those of the authors and should not be interpreted as necessarily representing the official policies or endorsements, either express or implied, of CyLab, CMU  ... 
doi:10.1007/978-3-642-30921-2_10 fatcat:zcq7eutfrnh55gfxty4ogow7my

An Exploratory Study of Attestation Mechanisms for Trusted Execution Environments [article]

Jämes Ménétrey, Christian Göttel, Marcelo Pasin, Pascal Felber, Valerio Schiavoni
2022 arXiv   pre-print
Attestation is a fundamental building block to establish trust over software systems.  ...  This paper reviews existing remote attestation principles and compares the functionalities of current trusted execution environments as Intel SGX, Arm TrustZone and AMD SEV, as well as emerging RISC-V  ...  Acknowledgments This publication incorporates results from the VEDLIoT project, which received funding from the European Union's Horizon 2020 research and innovation programme under grant agreement No  ... 
arXiv:2204.06790v2 fatcat:vx56vhjfunarlooogupiq6st2u

Hypervision Across Worlds

Ahmed M. Azab, Peng Ning, Jitesh Shah, Quan Chen, Rohan Bhutkar, Guruprasad Ganesh, Jia Ma, Wenbo Shen
2014 Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security - CCS '14  
TrustZone-based Real-time Kernel Protection (TZ-RKP) is a novel system that provides real-time protection of the OS kernel using the ARM TrustZone secure world.  ...  TZ-RKP puts its security monitor, which represents its entire Trusted Computing Base (TCB), in the TrustZone secure world; a safe isolated environment that is dedicated to security services.  ...  Acknowledgments We would like to thank Xun Chen, Michael Grace, Kirk Swidowski, Vinod Ganapathy, and the anonymous reviewers  ... 
doi:10.1145/2660267.2660350 dblp:conf/ccs/AzabNSCBGMS14 fatcat:hdl457muqfahtfaelug6vok3y4

Virtualizing mixed-criticality systems: A survey on industrial trends and issues

Marcello Cinque, Domenico Cotroneo, Luigi De Simone, Stefano Rosiello
2021 Future generations computer systems  
Virtualization is gaining attraction in the industry as it promises a flexible way to integrate, manage, and re-use heterogeneous software components with mixed-criticality levels, on a shared hardware  ...  In particular, we analyze how different virtualization approaches and solutions can impact isolation guarantees and testing/certification activities, and how they deal with dependability challenges.  ...  In years, Xen developed the Xen Test Framework (XTF) [91] , a framework for both creating microkernel-based tests and a suite of tests built using the framework itself: prebuilt tests include assessment  ... 
doi:10.1016/j.future.2021.12.002 fatcat:4q277etxfjewlpmkjcn7by42pm

DBStore: A TrustZone-backed Database Management System for Mobile Applications

Pedro S. Ribeiro, Nuno Santos, Nuno O. Duarte
2018 Proceedings of the 15th International Joint Conference on e-Business and Telecommunications  
ARM TrustZone technology has been widely use to enhance the security of mobile devices by allowing for the creation of Trusted Execution Environments (TEE).  ...  DBStore: A TrustZone-backed Database Management System for Mobile Applications.  ...  ACKNOWLEDGEMENTS We thank the anonymous reviewers for their comments and suggestions.  ... 
doi:10.5220/0006883605620569 dblp:conf/icete/Ribeiro0D18 fatcat:hsqpdigurbhc7agfyfj5tnmygm
« Previous Showing results 1 — 15 out of 164 results