A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Filters
Building Trust for Smart Connected Devices: The Challenges and Pitfalls of TrustZone
2021
Sensors
The aim of this research is to provide an analytical and educational exploration of TrustZone-based TEE vulnerabilities with the goal of pinpointing design and implementation flaws. ...
TrustZone-based Trusted Execution Environments (TEEs) have been utilized extensively for the implementation of security-oriented solutions for several smart intra and inter-connected devices. ...
Conflicts of Interest: The authors declare no conflict of interest. ...
doi:10.3390/s21020520
pmid:33450919
fatcat:mamfndmbcjbl7cpnr2j6dlxir4
IoT Software Security Building Blocks
[chapter]
2019
Demystifying Internet of Things Security
In addition, AES-GCM, the Galois Counter Mode of AES, is further enhanced by combining the AES-NI instruction with carryless multiplication instructions to speed performance of the Galois integrity tag ...
of pages and
cache to avoid such side-channel attacks. ...
doi:10.1007/978-1-4842-2896-8_4
fatcat:5ffon6fjtnh6rfkpnbtwoxk7ou
Security through isolation for cloud and mobile
2021
We carefully consider the attributes of each platform and the specifics of the attacks we are trying to protect against to select isolation mechanisms that provide the necessary security benefit without ...
Two prevalent places this data is stored are on cloud platforms hosted by third parties and on mobile devices, which are easily lost or stolen and which run any of millions of untrusted third-party applications ...
When I began my grad career, one of my supervisors, William (Bill) Aiello, was also head of the department at the time. I therefore worked mostly with Andrew (Andy) Warfield, my other supervisor. ...
doi:10.14288/1.0401793
fatcat:aofnehnz2jhbrd6vtfqy7qkcau
DarkneTZ: Towards Model Privacy at the Edge using Trusted Execution Environments
[article]
2020
pre-print
Due to the limited memory of the edge device's TEE, we partition model layers into more sensitive layers (to be executed inside the device TEE), and a set of layers to be executed in the untrusted part ...
of the operating system. ...
This research was also funded by a gift from Huawei Technologies, a generous scholarship from the Chinese Scholarship Council, and a hardware gift from Arm. ...
doi:10.1145/3386901.3388946
arXiv:2004.05703v1
fatcat:24n6cpc2crga3ktm5s6b7zdvmu
Enclave Computing Paradigm: Hardware-assisted Security Architectures & Applications
2020
ARM TrustZone, which is widely available in mobile devices, is fundamentally limited to a single isolation domain. ...
The Trusted Execution Environment (TEE) concept overcomes the dependence of security critical components on the systems overall security. ...
The Ninja framework for malware analysis uses ARM TrustZone to transparently trace the execution of software on ARM devices [285] . ...
doi:10.25534/tuprints-00011912
fatcat:2xf7ax7tcvbhrn76cdvcesfj6e
Protecting applications using trusted execution environments
2020
Based on source-level annotations, it uses either dynamic or static code analysis to identify sensitive parts of an application. Taking into account the objectives of a small TCB size and low ho [...] ...
Implementing this interface while maintaining the security of sensitive application code and data is a fundamental challenge. ...
ACKNOWLEDGEMENTS First of all, I would like to thank Prof. Peter Pietzuch for his supervision, guidance, and encouragement throughout the last few years. ...
doi:10.25560/84843
fatcat:5iei362jgjc2xjwjpesxogp4oy