Filters








6 Hits in 14.4 sec

Building Trust for Smart Connected Devices: The Challenges and Pitfalls of TrustZone

Nikolaos Koutroumpouchos, Christoforos Ntantogian, Christos Xenakis
2021 Sensors  
The aim of this research is to provide an analytical and educational exploration of TrustZone-based TEE vulnerabilities with the goal of pinpointing design and implementation flaws.  ...  TrustZone-based Trusted Execution Environments (TEEs) have been utilized extensively for the implementation of security-oriented solutions for several smart intra and inter-connected devices.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/s21020520 pmid:33450919 fatcat:mamfndmbcjbl7cpnr2j6dlxir4

IoT Software Security Building Blocks [chapter]

Sunil Cheruvu, Anil Kumar, Ned Smith, David M. Wheeler
2019 Demystifying Internet of Things Security  
In addition, AES-GCM, the Galois Counter Mode of AES, is further enhanced by combining the AES-NI instruction with carryless multiplication instructions to speed performance of the Galois integrity tag  ...  of pages and cache to avoid such side-channel attacks.  ... 
doi:10.1007/978-1-4842-2896-8_4 fatcat:5ffon6fjtnh6rfkpnbtwoxk7ou

Security through isolation for cloud and mobile

Patrick Colp
2021
We carefully consider the attributes of each platform and the specifics of the attacks we are trying to protect against to select isolation mechanisms that provide the necessary security benefit without  ...  Two prevalent places this data is stored are on cloud platforms hosted by third parties and on mobile devices, which are easily lost or stolen and which run any of millions of untrusted third-party applications  ...  When I began my grad career, one of my supervisors, William (Bill) Aiello, was also head of the department at the time. I therefore worked mostly with Andrew (Andy) Warfield, my other supervisor.  ... 
doi:10.14288/1.0401793 fatcat:aofnehnz2jhbrd6vtfqy7qkcau

DarkneTZ: Towards Model Privacy at the Edge using Trusted Execution Environments [article]

Fan Mo, Ali Shahin Shamsabadi, Kleomenis Katevas, Soteris Demetriou, Ilias Leontiadis, Andrea Cavallaro, Hamed Haddadi
2020 pre-print
Due to the limited memory of the edge device's TEE, we partition model layers into more sensitive layers (to be executed inside the device TEE), and a set of layers to be executed in the untrusted part  ...  of the operating system.  ...  This research was also funded by a gift from Huawei Technologies, a generous scholarship from the Chinese Scholarship Council, and a hardware gift from Arm.  ... 
doi:10.1145/3386901.3388946 arXiv:2004.05703v1 fatcat:24n6cpc2crga3ktm5s6b7zdvmu

Enclave Computing Paradigm: Hardware-assisted Security Architectures & Applications

Franz Ferdinand Peter Brasser
2020
ARM TrustZone, which is widely available in mobile devices, is fundamentally limited to a single isolation domain.  ...  The Trusted Execution Environment (TEE) concept overcomes the dependence of security critical components on the systems overall security.  ...  The Ninja framework for malware analysis uses ARM TrustZone to transparently trace the execution of software on ARM devices [285] .  ... 
doi:10.25534/tuprints-00011912 fatcat:2xf7ax7tcvbhrn76cdvcesfj6e

Protecting applications using trusted execution environments

Christian Priebe, Peter Pietzuch, Engineering And Physical Sciences Research Council
2020
Based on source-level annotations, it uses either dynamic or static code analysis to identify sensitive parts of an application. Taking into account the objectives of a small TCB size and low ho [...]  ...  Implementing this interface while maintaining the security of sensitive application code and data is a fundamental challenge.  ...  ACKNOWLEDGEMENTS First of all, I would like to thank Prof. Peter Pietzuch for his supervision, guidance, and encouragement throughout the last few years.  ... 
doi:10.25560/84843 fatcat:5iei362jgjc2xjwjpesxogp4oy