A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Trusted computing building blocks for embedded linux-based ARM trustzone platforms
2008
Proceedings of the 3rd ACM workshop on Scalable trusted computing - STC '08
ARM follows a different approach to mobile platform security, by extending platforms with hardware supported ARM TrustZone security [3] mechanisms. ...
The MTM specification [13] published by the TCG is a platform independent approach to Trusted Computing explicitly allowing for a wide range of potential implementations. ...
A detailed discussion of the ARM TrustZone features, including an description of the closed-source TrustZone software stack developed by ARM and and Trusted Logic is given in [24] . ...
doi:10.1145/1456455.1456460
dblp:conf/ccs/Winter08
fatcat:x4waayswbzbwrlutiqngtweoyu
MQT-TZ: Hardening IoT Brokers Using ARM TrustZone
[article]
2020
arXiv
pre-print
We define a mutual TLS-based handshake and a two-layer encryption for end-to-end security using the TEE as a trusted proxy. ...
This paper presents MQT-TZ, a secure MQTT broker leveraging Arm TrustZone, a trusted execution environment (TEE) commonly found even on inexpensive devices largely available on the market (such as Raspberry ...
Lastly, we plan to implement a proof of concept version of MQT-TZ leveraging alternative software development kits for TRUST-ZONE such as OPENENCLAVE (https://openenclave.io/sdk/) and alternative TRUSTZONE-enabled ...
arXiv:2007.12442v2
fatcat:sdoepy7yjrearktaqez3ei4emu
Trusted language runtime (TLR)
2011
Proceedings of the 12th Workshop on Mobile Computing Systems and Applications - HotMobile '11
The TLR is lightweight because 1) it makes use of ARM TrustZone, hardware support that offers rich trusted computing primitives, and 2) it leverages the .NET MicroFramework, a language runtime for embedded ...
This paper presents the Trusted Language Runtime (TLR), a system for developing and running trusted applications on a smartphone. ...
Acknowledgements: We would like to thank the anonymous reviewers and Jaeyeon Jung, our shepherd, for their feedback. ...
doi:10.1145/2184489.2184495
dblp:conf/wmcsa/SantosRSW11
fatcat:c24u7nzdyzdwvmivytzeyqvk64
Enabling Secure and Usable Mobile Application: Revealing the Nuts and Bolts of software TPM in todays Mobile Devices
[article]
2016
arXiv
pre-print
In this paper we investigate the use of Trusted Platform Model (TPM) 2.0 to develop a secure application for smartphones using Windows Phone 8.1. ...
In particular, we suggest a framework based on remote attestation as a proxy to authenticate remote services, where the device is associated to the user and replaces the users credentials. ...
The authors would like to thank Andrew Paverd and Janne Uusilehto for many fruitful discussions. ...
arXiv:1606.02995v1
fatcat:c7ej4li4rvadnounxzjcsngzge
TrustOTP
2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security - CCS '15
In this paper, we present TrustOTP, a secure one-time password solution that can achieve both the flexibility of software tokens and the security of hardware tokens by using ARM TrustZone technique. ...
As the smartphones are increasingly gaining popularity nowadays, software-based OTP generators have been developed and installed into smartphones as software apps, which bring great convenience to the ...
[56] develops a flexible software emulation framework for TrustZone development. ...
doi:10.1145/2810103.2813692
dblp:conf/ccs/SunSWJ15
fatcat:wcyezrc5a5fupa4qewnsrwuzam
The Dual-Execution-Environment Approach: Analysis and Comparative Evaluation
[chapter]
2015
IFIP Advances in Information and Communication Technology
We introduce a comparative framework allowing dual-EE solutions to be evaluated across a common set of criteria. ...
In this paper, we revisit the dual-EE approach and propose a theoretical framework to systematize the design of dual-EE solutions regarding well-established primitives defined in the Multiple Independent ...
As for ARM TrustZone, it comes close to perfect score. ...
doi:10.1007/978-3-319-18467-8_37
fatcat:ptha3ok5ovhrffoec4ghhrrs54
Open-TEE -- An Open Virtual Trusted Execution Environment
2015
2015 IEEE Trustcom/BigDataSE/ISPA
It allows developers to develop and debug trusted applications with the same tools they use for developing software in general. ...
Tools and software needed to develop and debug trusted applications may be expensive or non-existent. In this paper, we describe Open-TEE, a virtual, hardware-independent TEE implemented in software. ...
Acknowledgments: We thank the participants of the user study for their time and their useful feedback. Thanks to Kumaripaba Athukorala for advice on conducting the user study. ...
doi:10.1109/trustcom.2015.400
dblp:conf/trustcom/McGillionDNA15
fatcat:saxzddga3rezlcgfltlgpta3ay
TrustICE: Hardware-Assisted Isolated Computing Environments on Mobile Devices
2015
2015 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks
ARM TrustZone technology can protect secure code in a secure domain from an untrusted normal domain. ...
We propose a novel TrustZonebased isolation framework named TrustICE to create isolated computing environments (ICEs) in the normal domain. ...
Comparison with Other Solutions Emulated hardware platforms with TrustZone support have been developed [26] , [27] ; however, those emulation frameworks do not contain many useful security features of ...
doi:10.1109/dsn.2015.11
dblp:conf/dsn/SunSWJW15
fatcat:qharcdjt3rbdbe4ovnys2trd4u
uTango: an open-source TEE for IoT devices
2022
IEEE Access
Recently, Arm has started to release Cortex-M MCUs enhanced with TrustZone technology (i.e., TrustZone-M), a system-wide security solution aiming at providing robust protection for IoT devices. ...
We demonstrate the benefits of UTANGO by conducting an extensive evaluation on a real TrustZone-M hardware platform, i.e., Arm Musca-B1. ...
and emulation. ...
doi:10.1109/access.2022.3152781
fatcat:u6dckk2ye5gzvcejg7z4nruk5u
uTango: an open-source TEE for IoT devices
[article]
2022
arXiv
pre-print
Recently, Arm has started to release Cortex-M MCUs enhanced with TrustZone technology (i.e., TrustZone-M), a system-wide security solution aiming at providing robust protection for IoT devices. ...
We demonstrate the benefits of uTango by conducting an extensive evaluation on a real TrustZone-M hardware platform, i.e., Arm Musca-B1. uTango will be open-sourced and freely available on GitHub in hopes ...
Finally, ASSURED [27] proposes a secure firmware update framework for TrustZone-M devices. Reliable systems for MCU-powered IoT devices. ...
arXiv:2102.03625v2
fatcat:brmjvgd5k5e37ebrumm5dhj7e4
Trustworthy Execution on Mobile Devices: What Security Properties Can My Mobile Platform Give Me?
[chapter]
2012
Lecture Notes in Computer Science
We also highlight shortcomings of existing proposals and make recommendations for future research that may yield practical, deployable results. ...
We systematize existing proposals for leveraging such primitives, and show that they can indeed strengthen the security properties available to applications and users, all without reducing the properties ...
The views and conclusions contained here are those of the authors and should not be interpreted as necessarily representing the official policies or endorsements, either express or implied, of CyLab, CMU ...
doi:10.1007/978-3-642-30921-2_10
fatcat:zcq7eutfrnh55gfxty4ogow7my
An Exploratory Study of Attestation Mechanisms for Trusted Execution Environments
[article]
2022
arXiv
pre-print
Attestation is a fundamental building block to establish trust over software systems. ...
This paper reviews existing remote attestation principles and compares the functionalities of current trusted execution environments as Intel SGX, Arm TrustZone and AMD SEV, as well as emerging RISC-V ...
Acknowledgments This publication incorporates results from the VEDLIoT project, which received funding from the European Union's Horizon 2020 research and innovation programme under grant agreement No ...
arXiv:2204.06790v2
fatcat:vx56vhjfunarlooogupiq6st2u
Hypervision Across Worlds
2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security - CCS '14
TrustZone-based Real-time Kernel Protection (TZ-RKP) is a novel system that provides real-time protection of the OS kernel using the ARM TrustZone secure world. ...
TZ-RKP puts its security monitor, which represents its entire Trusted Computing Base (TCB), in the TrustZone secure world; a safe isolated environment that is dedicated to security services. ...
Acknowledgments We would like to thank Xun Chen, Michael Grace, Kirk Swidowski, Vinod Ganapathy, and the anonymous reviewers ...
doi:10.1145/2660267.2660350
dblp:conf/ccs/AzabNSCBGMS14
fatcat:hdl457muqfahtfaelug6vok3y4
Virtualizing mixed-criticality systems: A survey on industrial trends and issues
2021
Future generations computer systems
Virtualization is gaining attraction in the industry as it promises a flexible way to integrate, manage, and re-use heterogeneous software components with mixed-criticality levels, on a shared hardware ...
In particular, we analyze how different virtualization approaches and solutions can impact isolation guarantees and testing/certification activities, and how they deal with dependability challenges. ...
In years, Xen developed the Xen Test Framework (XTF) [91] , a framework for both creating microkernel-based tests and a suite of tests built using the framework itself: prebuilt tests include assessment ...
doi:10.1016/j.future.2021.12.002
fatcat:4q277etxfjewlpmkjcn7by42pm
DBStore: A TrustZone-backed Database Management System for Mobile Applications
2018
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications
ARM TrustZone technology has been widely use to enhance the security of mobile devices by allowing for the creation of Trusted Execution Environments (TEE). ...
DBStore: A TrustZone-backed Database Management System for Mobile Applications. ...
ACKNOWLEDGEMENTS We thank the anonymous reviewers for their comments and suggestions. ...
doi:10.5220/0006883605620569
dblp:conf/icete/Ribeiro0D18
fatcat:hsqpdigurbhc7agfyfj5tnmygm
« Previous
Showing results 1 — 15 out of 164 results